Mostrando 601 - 620 Resultados de 1,058 Para Buscar '"hacker"', tiempo de consulta: 0.08s Limitar resultados
  1. 601
    Security awareness for Dummies
    Security Awareness for Dummies
    Publicado 2022
    “…One recent study estimated that a hacker attack occurs somewhere every 37 seconds. Since security programs are only as effective as a team's willingness to follow their rules and protocols, it's increasingly necessary to have not just a widely accessible gold standard of security, but also a practical plan for rolling it out and getting others on board with following it. …”
    Libro electrónico
  2. 602
    Publicado 2021
    “…Hacker und Haecksen zählen zur Avantgarde der Computerisierung. …”
    Libro
  3. 603
    Publicado 2022
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- About the Author -- Acknowledgments -- Contents -- Foreword -- Introduction -- Chapter 1 Step 1: Foster a Strong Security Culture -- Kevin Mitnick, Human Hacker Extraordinaire -- The Importance of a Strong Security Culture -- Hackers Are the Bad Guys, Right? …”
    Libro electrónico
  4. 604
    Publicado 2018
    Tabla de Contenidos: “…Testing overview -- 1.3. Writing a Hacker News application -- 1.4. Vue testing overview -- Summary -- Chapter 2. …”
    Libro electrónico
  5. 605
    por Schneier, Bruce
    Publicado 2014
    Tabla de Contenidos: “…News Media Strategies for Survival for JournalistsSecurity and Function Creep; Weighing the Risk of Hiring Hackers; Should Enterprises Give In to IT Consumerization at the Expense of Security?…”
    Libro electrónico
  6. 606
    Publicado 2018
    “…Become an ethical hacker that can hack and secure computer systems About This Video You will learn how networks work, basic network terminology, and how devices communicate with each other. …”
    Video
  7. 607
    Publicado 2016
    “…If a major event such as a terrorist attack, 7.2 earthquake, tsunami, or hacker attack were to disrupt business operations, would your organization be prepared to respond to the financial, political, and social impacts? …”
    Libro electrónico
  8. 608
    Publicado 2020
    “…The third edition of this popular cookbook provides more than 200 hands-on recipes that show you how to run this tiny low-cost computer with Linux; program it with Python; hook it up to sensors, motors, and Arduino boards; and even use it with the internet of things (IoT). Prolific hacker and author Simon Monk also teaches basic principles to help you use new technologies with the Raspberry Pi. …”
    Libro electrónico
  9. 609
    Publicado 2017
    “…In this video, the prolific hacker, author, and not-evil-at-all genius Dr. Simon Monk cooks up a batch of easy-to-follow lessons that will give all inventive souls the ingredients they need to start baking their own makings. …”
    Video
  10. 610
    por Bragg, Roberta
    Publicado 2005
    “…Conrad, MCSE 2003, Server+, Certified Ethical Hacker James@accusource.net "Full of relevant and insightful information. …”
    Libro electrónico
  11. 611
    por Rubini, Alessandro
    Publicado 2001
    “…You don't have to be a kernel hacker to understand and enjoy this book; all you need is an understanding of C and some background in Unix system calls. …”
    Libro electrónico
  12. 612
    por Spivey, Mark D.
    Publicado 2006
    “…Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results. …”
    Libro electrónico
  13. 613
    Publicado 2020
    “…It's everything an ethical hacker needs to know about a SQL injection attack. …”
    Video
  14. 614
    Publicado 2019
    “…Penetrationstests mit mimikatz von Pass-the-Hash über Kerberoasting bis hin zu Golden Tickets Funktionsweise und Schwachstellen der Windows Local Security Authority (LSA) und des Kerberos-Protokolls Alle Angriffe leicht verständlich und Schritt für Schritt erklärt mimikatz ist ein extrem leistungsstarkes Tool für Angriffe auf das Active Directory. Hacker können damit auf Klartextpasswörter, Passwort-Hashes sowie Kerberos Tickets zugreifen, ihre Rechte in fremden Systemen ausweiten und so die Kontrolle über ganze Firmennetzwerke übernehmen. …”
    Libro electrónico
  15. 615
    Publicado 2018
    “…Study smarter and pass your ITIL, A+, Network+, Security+, Certified Ethical Hacker (CEH), CISSP, or other exams easier About This Video This course increases the odds of success for those who have failed on previous attempts on their A+, Network+, Security+, CSA+, ITIL, CEH, or CISSP exams. …”
    Video
  16. 616
    Publicado 2012
    “…Before you can effectively implement security technologies and techniques, you need to make sense of this complex and quickly evolving world of hackers and malware, as well as the tools to combat them. …”
    Libro electrónico
  17. 617
    Publicado 2024
    “…Überall im Internet sind Unternehmen und böswillige Hacker auf Ihre Daten aus. Hier lernen Sie anhand leicht verständlicher Schritt-für-Schritt-Anleitungen, wie Sie Ihr System mit einer Firewall und zusätzlichen Tools absichern, Ihre Daten und E-Mails verschlüsseln, privat surfen, eine sichere VPN-Verbindung herstellen, eine eigene private Cloud betreiben und vieles mehr. …”
    Libro electrónico
  18. 618
  19. 619
    Publicado 2022
    Tabla de Contenidos: “…Hacking Rules: Facilitating Inclusivity in Hacker- and Makerspaces -- Part II Engaging Narratives -- 5. …”
    Libro electrónico
  20. 620
    Publicado 2007
    Tabla de Contenidos: “…IS audit process -- Technology and audit -- IS audit function knowledge -- IS risk and fundamental auditing concepts -- Standards and guidelines for IS auditing -- Internal controls concepts knowledge -- Risk management of the IS function -- Audit planning process -- Audit management -- Audit evidence process -- Audit reporting follow-up -- Information systems/information technology governance -- Management -- Strategic planning -- Management issues -- Support tools and frameworks -- Governance techniques -- Systems and infrastructure lifecycle management -- Information systems planning -- Information management and usage -- Development, acquisition, and maintenance of information systems -- Impact of information technology on the business processes and solutions -- Software development -- Audit and control of purchased packages -- Audit role in feasibility studies and conversions -- Audit and development of application controls -- Information technology service delivery and support -- Technical infrastructure -- Service center management -- Protection of information assets -- Information assets security management -- Logical information technology security -- Applied information technology security -- Physical and environmental security -- Business continuity and disaster recovery -- Protection of the information technology architecture and assets: disaster recovery planning -- Insurance -- Advanced is auditing -- Auditing e-commerce systems -- Auditing UNIX / LINUX -- Auditing windows -- Foiling the system hackers -- Investigating information technology fraud -- Appendices -- Appendix A Ethics and standards for the IS auditor -- Appendix B Audit program for application systems auditing -- Appendix C Logical access control audit program -- Appendix D Audit program for auditing UNIX / LINUX Environments -- Appendix E Audit program for auditing windows XP/2000 environments…”
    Libro electrónico