Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 250
- Security measures 231
- Computer networks 192
- Penetration testing (Computer security) 109
- Hackers 82
- Engineering & Applied Sciences 72
- Computer crimes 48
- Computer Science 44
- Hacking 43
- Internet 37
- Data protection 35
- Operating systems (Computers) 30
- Electrical & Computer Engineering 29
- Examinations 29
- Certification 27
- Prevention 27
- Kali Linux 26
- Telecommunications 26
- Computer hackers 24
- Electronic data processing personnel 24
- Computers 22
- Development 22
- Application software 20
- Information technology 19
- Management 19
- Linux 18
- Access control 17
- Web sites 17
- Computer software 16
- Microsoft Windows (Computer file) 15
-
41
-
42Publicado 2023Tabla de Contenidos: “…Reconnaissance for Ethical Hackers: Focus on the starting point of data breaches and explore essential steps for successful pentesting…”
Libro electrónico -
43
-
44
-
45Publicado 1993Biblioteca Universidad de Deusto (Otras Fuentes: Biblioteca Universitat Ramon Llull)Libro
-
46
-
47
-
48
-
49
-
50Publicado 2023Materias:Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico
-
51
-
52
-
53Publicado 2020Libro electrónico
-
54Publicado 2015“…See your app through a hacker's eyes to find the real sources of vulnerability The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. …”
Libro electrónico -
55Publicado 2024Materias:Grabación no musical
-
56
-
57por Stuttard, Dafydd, 1972-Tabla de Contenidos: “…Chapter 13: Automating Bespoke AttacksChapter 14: Exploiting Information Disclosure; Chapter 15: Attacking Compiled Applications; Chapter 16: Attacking Application Architecture; Chapter 17: Attacking the Web Server; Chapter 18: Finding Vulnerabilities in Source Code; Chapter 19: A Web Application Hacker's Toolkit; Chapter 20: A Web Application Hacker's Methodology; Index…”
Publicado 2008
Libro electrónico -
58por Stuttard, Dafydd, 1972-Tabla de Contenidos: “…The Web Application Hacker's Handbook; Contents; Introduction; Chapter 1 Web Application (In)security; The Evolution of Web Applications; Common Web Application Functions; Benefits of Web Applications; Web Application Security; ""This Site Is Secure""; The Core Security Problem: Users Can Submit Arbitrary Input; Key Problem Factors; The New Security Perimeter; The Future of Web Application Security; Summary; Chapter 2 Core Defense Mechanisms; Handling User Access; Authentication; Session Management; Access Control; Handling User Input; Varieties of Input; Approaches to Input Handling…”
Publicado 2011
Libro electrónico -
59por Bathurst, RobTabla de Contenidos: “…Half Title; The Hacker's Guide to OS X; Copyright; Contents; Foreword; 1 Introduction; Why You are Reading This Book?…”
Publicado 2013
Libro electrónico -
60