Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 250
- Security measures 231
- Computer networks 192
- Penetration testing (Computer security) 109
- Hackers 82
- Engineering & Applied Sciences 72
- Computer crimes 48
- Computer Science 44
- Hacking 43
- Internet 37
- Data protection 35
- Operating systems (Computers) 30
- Electrical & Computer Engineering 29
- Examinations 29
- Certification 27
- Prevention 27
- Kali Linux 26
- Telecommunications 26
- Computer hackers 24
- Electronic data processing personnel 24
- Computers 22
- Development 22
- Application software 20
- Information technology 19
- Management 19
- Linux 18
- Access control 17
- Web sites 17
- Computer software 16
- Microsoft Windows (Computer file) 15
-
621Publicado 2008Tabla de Contenidos: “…DEL EMPRESARIO CALVINISTA A LA CULTURA DEL HACKER -- 1.13. SALARIO FAMILIAR Y SALARIO PATRIARCAL -- 1.14. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
622por Zdziarski, Jonathan A.“…In this clear and concise book, veteran hacker Jonathan Zdziarski -- one of the original hackers of the iPhone -- explains the iPhone's native environment and how you can build software for this device using its Objective-C, C, and C++ development frameworks. …”
Publicado 2008
Libro electrónico -
623por Gómez Vieites, ÁlvaroTabla de Contenidos: “…AMENAZAS A LA SEGURIDAD Y TIPOS DE ATAQUES INFORMÁTICOS; 2.1 CLASIFICACIÓN DE LOS INTRUSOS EN LAS REDES; 2.1.1 Hackers; 2.1.2 Crackers (blackhats)…”
Publicado 2014
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
624por McLaughlin, BrettTabla de Contenidos: “…DVHS on a Budget; 2.8.2. Enter the Hackers; 2.8.3. Modding the VCR; 2.8.4. A DVHS Application; 16. …”
Publicado 2005
Libro electrónico -
625por McNab, Chris 1980-Tabla de Contenidos: “…Network Security Assessment; Preface; CESG CHECK; Hackers Defined; Organization; Audience; Mirror Site for Tools Mentioned in This Book; Using Code Examples; Conventions Used in This Book; Comments and Questions; Acknowledgments; 1. …”
Publicado 2004
Libro electrónico -
626por Freeman, AdamTabla de Contenidos: “…The User; 1.2.7. The Hacker/Cracker; 1.3. Understanding Software Security; 1.3.2. …”
Publicado 2003
Libro electrónico -
627
-
628por Schwartz, Randal L.“…If you're just getting started with Perl, this is the book you want-whether you're a programmer, system administrator, or web hacker. Nicknamed ""the Llama"" by two generations of users, this bestseller closely follows the popular introductory Perl course taught by the authors since 1991. …”
Publicado 2011
Libro electrónico -
629Publicado 2012Tabla de Contenidos: “…EL CIBERESPACIO COMO MUNDO SEGURO Y CONFORTABLE -- VALENTINA. NUESTRA HACKER LOCAL -- SEGUNDA PARTE. RESULTADOS Y CONCLUSIONES -- CAPÍTULO 5. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
630Publicado 2015Tabla de Contenidos: “…Cover; Title Page; Copyright; Contents; Preface; About the Authors; Chapter 1 Network Security Overview; 1.1 Mission and Definitions; 1.2 Common Attacks and Defense Mechanisms; 1.2.1 Eavesdropping; 1.2.2 Cryptanalysis; 1.2.3 Password Pilfering; 1.2.4 Identity Spoofing; 1.2.5 Buffer-Overflow Exploitations; 1.2.6 Repudiation; 1.2.7 Intrusion; 1.2.8 Traffic Analysis; 1.2.9 Denial of Service Attacks; 1.2.10 Malicious Software; 1.3 Attacker Profiles; 1.3.1 Hackers; 1.3.2 Script Kiddies; 1.3.3 Cyber Spies; 1.3.4 Vicious Employees; 1.3.5 Cyber Terrorists; 1.3.6 Hypothetical Attackers…”
Libro electrónico -
631Publicado 2017Tabla de Contenidos: “…Kelley, Suzette D. Tardif, Sander O. Hacker, and Amanda Bettis \n -- 30. Managing Husbandry Programs Involving Experimental Hazards by James R. …”
Libro electrónico -
632
-
633“…"James Bach and Robert Werner’s How to Secure Your H-1B Visa is written for both employers and the workers they hire." Andrew Hacker, "The Frenzy about High-Tech Talent", The New York Review of Books, July 9, 2015 The H-1B visa is the gateway for the world’s best and brightest to live and work in the United States as IT professionals, engineers, scientists, professors, doctors, nurses, and researchers. …”
Libro electrónico -
634Publicado 2013Tabla de Contenidos: “…Conclusion -- 8 Make Your Plane Look Good at Night -- Overall Considerations -- Major Ways to Illuminate Aircraft -- Color at Night -- Electroluminescent Wire -- How El-Wire Works -- Powering El-Wire -- Soldering an Inverter for BEC Power -- Soldering El-Wire -- Stripping the El-Wire -- Soldering the El-Wire to Male Header Pins -- Simple Decoration -- LED-Based Approaches -- Single-Point LEDs -- Strip LEDs -- High-Power LEDs and Fiberoptics -- Other Illumination Options -- Weight Considerations -- BEC-Powered Lighting -- Robustness -- Conclusion -- 9 Other Shapes -- Inorganic Produce -- Banana -- Carrot -- Strawberry -- Flying Heart -- SketchUp Is Your Friend -- Travel Flack -- Bat -- Crystal Towel -- Semi-Circle -- Manta Ray -- Design -- Evolving the Moving Fins -- The Radio -- The Build -- Flying -- 3D Banana -- Conclusion -- 10 Aerodynamics for the Hacker -- Lift -- Conditions for Lift: Positive Aerodynamic Angle of Attack and Airflow -- Lift, Part 1 -- Lift, Part 2 -- Pitch, Roll, and Yaw -- Center of Gravity (CG) -- Reflex and Flying Wings -- Reasoning about Lift -- Drag -- Glide Ratio -- Conclusion -- 11 Hack the Flack: Make and Fly Your Own Design -- Getting the Idea -- Prototyping -- A Plank -- Designing and Building a Novel Design -- Building the Powered Version -- Scaling Up from the Glider Proof of Concept -- Structural Considerations -- Placing Equipment -- Flight Testing -- New Shapes by Morphing Old Ones -- Incremental Refinement -- Conclusion -- 12 Simulators, Autopilots, Video, and Buddy Boxing -- Flight Simulators -- Flying Model Simulator (FMS) -- CRRCsim -- Autopilots -- Copilot CPD4 -- Full Autopilot -- Video from the Air -- Passive Video -- First-Person Video (FPV) -- Buddy Boxing a.k.a. …”
Libro electrónico -
635Publicado 2016“…The second edition of this popular cookbook provides more than 240 hands-on recipes for running this tiny low-cost computer with Linux, programming it with Python, and hooking up sensors, motors, and other hardware—including Arduino and the Internet of Things. Prolific hacker and author Simon Monk also teaches basic principles to help you use new technologies with Raspberry Pi as its ecosystem continues to develop. …”
Libro electrónico -
636por Northrup, Tony, 1974-“…From fearless neophytes to tool-wielding masterminds, the home hacker in any geek will find new inspiration and plenty of hands-on guidance to take on a variety of home-transforming projects once relegated to the world of sci-fi. …”
Publicado 2005
Libro electrónico -
637por Fullam, Scott“… Put a hacker in a room with a Furby for a weekend and you'll hear a conversation that's fairly one-sided in its originality. …”
Publicado 2004
Libro electrónico -
638por Sánchez Belmont, OscarTabla de Contenidos: “…4.5 Enfoque preventivo de protección de la información, riesgo y evaluación de la vulnerabilidad -- 4.5.1 Estructuras inteligentes de seguridad en la empresa -- 4.5.2 Inteligencia corporativa en el análisis de un proyecto de hacker -- 4.6 Tiempos en los que se acentúan ataques de espionaje industrial -- 4.6.1 La industria del espionaje y la seriedad con la que se debe tomar -- Bibliografía…”
Publicado 2018
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
639por Ganz, KathrinTabla de Contenidos: “…Subjektpositionen im politischen Diskurs der digitalen Gesellschaft -- Inhalt -- Abbildungen -- Tabellen -- 1 Einleitung -- 1.1 Erkenntnisinteresse und Fragestellung -- 1.2 Theoretischer und empirischer Zugang -- 1.3 Aufbau der Studie -- 2 Die Netzbewegung -- 2.1 Zum Stand der Forschung -- 2.2 Von tuwat.txt bis Freiheit statt Angst: Zur Entwicklungder Netzbewegung -- 2.2.1 Hacker_innen und die Netzkultur der 1980er Jahre -- 2.2.2 Netzkritik, Hacktivismus und Gegenöffentlichkeiten -- 2.2.3 Entstehung und Weiterentwicklung der Netzbewegung -- 2.3 Online und offline: Bewegungskultur und Ressourcen der Internetszene -- 2.3.1 Internetszenen als Vergemeinschaftungskontexte -- 2.3.2 Internet-Aktivismus und Bewegungskultur -- 2.3.3 Überlegungen zur kollektiven Identität der Netzbewegung -- 2.4 Das Konfliktfeld Netzpolitik -- 2.4.1 Netzpolitik als Politikfeld -- 2.4.2 Kämpfe um den Zugang zum Internet -- 2.4.3 Kämpfe um den Zugang zu Inhalten -- 2.4.4 Kämpfe um Eigentumsrechte und informationelle Güter -- 2.4.5 Kämpfe um Privacy -- 2.5 Die Netzbewegung als Hegemonieprojekt -- 3 Intersektionalität und Hegemonie -- 3.1 Intersektionalität -- 3.1.1 Zur Genealogie des intersektionalen Paradigmas -- 3.1.2 Die intersektionale Mehrebenenanalyse -- 3.2 Hegemonietheorie -- 3.2.1 Elemente des Sozialen: Diskurs und Artikulation -- 3.2.2 Grenzen des Diskurses: Antagonismus, Dislokation und soziale Heterogenität -- 3.2.3 Artikulationen des Politischen: Hegemonie und leerer Signifikant -- 3.3 Subjektpositionen im politischen Diskurs -- 3.3.1 Theorie-Differenzen: Praktiken, Artikulation und kapitalistische Hegemonie -- 3.3.2 Subjektpositionen -- 3.3.3 Die Materialisierungsebenen intersektionaler Wechselwirkungen -- 3.4 Zwischenfazit -- 4 Zum methodischen Vorgehen -- 4.1 Feldzugang und die Position der Forschenden im Feld…”
Publicado 2017
Electrónico -
640Publicado 2017Tabla de Contenidos: “…Cover -- Title Page -- Copyright -- About the Author -- About the Technical Editor -- Credits -- Acknowledgments -- Contents at a glance -- Contents -- Foreword -- Introduction -- Coming Full Circle -- Advanced Persistent Threat (APT) -- Next Generation Technology -- "Hackers" -- Forget Everything You Think You Know About Penetration Testing -- How This Book Is Organized -- Chapter 1: Medical Records (In)security -- An Introduction to Simulating Advanced Persistent Threat -- Background and Mission Briefing -- Payload Delivery Part 1: Learning How to Use the VBA Macro -- How NOT to Stage a VBA Attack -- Examining the VBA Code -- Avoid Using Shellcode -- Automatic Code Execution -- Using a VBA/VBS Dual Stager -- Keep Code Generic Whenever Possible -- Code Obfuscation -- Enticing Users -- Command and Control Part 1: Basics and Essentials -- The Attack -- Bypassing Authentication -- Summary -- Exercises -- Chapter 2: Stealing Research -- Background and Mission Briefing -- Payload Delivery Part 2: Using the Java Applet for Payload Delivery -- Java Code Signing for Fun and Profit -- Writing a Java Applet Stager -- Create a Convincing Pretext -- Signing the Stager -- Notes on Payload Persistence -- Microsoft Windows -- Linux -- OSX -- Command and Control Part 2: Advanced Attack Management -- Adding Stealth and Multiple System Management -- Implementing a Command Structure -- Building a Management Interface -- The Attack -- Situational Awareness -- Using AD to Gather Intelligence -- Analyzing AD Output -- Attack Against Vulnerable Secondary System -- Credential Reuse Against Primary Target System -- Summary -- Exercises -- Chapter 3: Twenty-First Century Heist -- What Might Work? …”
Libro electrónico