Mostrando 621 - 640 Resultados de 942 Para Buscar '"hacker"', tiempo de consulta: 0.10s Limitar resultados
  1. 621
    Publicado 2008
    Tabla de Contenidos: “…DEL EMPRESARIO CALVINISTA A LA CULTURA DEL HACKER -- 1.13. SALARIO FAMILIAR Y SALARIO PATRIARCAL -- 1.14. …”
    Libro electrónico
  2. 622
    por Zdziarski, Jonathan A.
    Publicado 2008
    “…In this clear and concise book, veteran hacker Jonathan Zdziarski -- one of the original hackers of the iPhone -- explains the iPhone's native environment and how you can build software for this device using its Objective-C, C, and C++ development frameworks. …”
    Libro electrónico
  3. 623
    por Gómez Vieites, Álvaro
    Publicado 2014
    Tabla de Contenidos: “…AMENAZAS A LA SEGURIDAD Y TIPOS DE ATAQUES INFORMÁTICOS; 2.1 CLASIFICACIÓN DE LOS INTRUSOS EN LAS REDES; 2.1.1 Hackers; 2.1.2 Crackers (blackhats)…”
    Libro electrónico
  4. 624
    por McLaughlin, Brett
    Publicado 2005
    Tabla de Contenidos: “…DVHS on a Budget; 2.8.2. Enter the Hackers; 2.8.3. Modding the VCR; 2.8.4. A DVHS Application; 16. …”
    Libro electrónico
  5. 625
    por McNab, Chris 1980-
    Publicado 2004
    Tabla de Contenidos: “…Network Security Assessment; Preface; CESG CHECK; Hackers Defined; Organization; Audience; Mirror Site for Tools Mentioned in This Book; Using Code Examples; Conventions Used in This Book; Comments and Questions; Acknowledgments; 1. …”
    Libro electrónico
  6. 626
    por Freeman, Adam
    Publicado 2003
    Tabla de Contenidos: “…The User; 1.2.7. The Hacker/Cracker; 1.3. Understanding Software Security; 1.3.2. …”
    Libro electrónico
  7. 627
    Publicado 2007
    Libro electrónico
  8. 628
    por Schwartz, Randal L.
    Publicado 2011
    “…If you're just getting started with Perl, this is the book you want-whether you're a programmer, system administrator, or web hacker. Nicknamed ""the Llama"" by two generations of users, this bestseller closely follows the popular introductory Perl course taught by the authors since 1991. …”
    Libro electrónico
  9. 629
    Publicado 2012
    Tabla de Contenidos: “…EL CIBERESPACIO COMO MUNDO SEGURO Y CONFORTABLE -- VALENTINA. NUESTRA HACKER LOCAL -- SEGUNDA PARTE. RESULTADOS Y CONCLUSIONES -- CAPÍTULO 5. …”
    Libro electrónico
  10. 630
    Publicado 2015
    Tabla de Contenidos: “…Cover; Title Page; Copyright; Contents; Preface; About the Authors; Chapter 1 Network Security Overview; 1.1 Mission and Definitions; 1.2 Common Attacks and Defense Mechanisms; 1.2.1 Eavesdropping; 1.2.2 Cryptanalysis; 1.2.3 Password Pilfering; 1.2.4 Identity Spoofing; 1.2.5 Buffer-Overflow Exploitations; 1.2.6 Repudiation; 1.2.7 Intrusion; 1.2.8 Traffic Analysis; 1.2.9 Denial of Service Attacks; 1.2.10 Malicious Software; 1.3 Attacker Profiles; 1.3.1 Hackers; 1.3.2 Script Kiddies; 1.3.3 Cyber Spies; 1.3.4 Vicious Employees; 1.3.5 Cyber Terrorists; 1.3.6 Hypothetical Attackers…”
    Libro electrónico
  11. 631
    Publicado 2017
    Tabla de Contenidos: “…Kelley, Suzette D. Tardif, Sander O. Hacker, and Amanda Bettis \n -- 30. Managing Husbandry Programs Involving Experimental Hazards by James R. …”
    Libro electrónico
  12. 632
    Publicado 2017
    Libro electrónico
  13. 633
    “…"James Bach and Robert Werner’s How to Secure Your H-1B Visa is written for both employers and the workers they hire." Andrew Hacker, "The Frenzy about High-Tech Talent", The New York Review of Books, July 9, 2015 The H-1B visa is the gateway for the world’s best and brightest to live and work in the United States as IT professionals, engineers, scientists, professors, doctors, nurses, and researchers. …”
    Libro electrónico
  14. 634
    Publicado 2013
    Tabla de Contenidos: “…Conclusion -- 8 Make Your Plane Look Good at Night -- Overall Considerations -- Major Ways to Illuminate Aircraft -- Color at Night -- Electroluminescent Wire -- How El-Wire Works -- Powering El-Wire -- Soldering an Inverter for BEC Power -- Soldering El-Wire -- Stripping the El-Wire -- Soldering the El-Wire to Male Header Pins -- Simple Decoration -- LED-Based Approaches -- Single-Point LEDs -- Strip LEDs -- High-Power LEDs and Fiberoptics -- Other Illumination Options -- Weight Considerations -- BEC-Powered Lighting -- Robustness -- Conclusion -- 9 Other Shapes -- Inorganic Produce -- Banana -- Carrot -- Strawberry -- Flying Heart -- SketchUp Is Your Friend -- Travel Flack -- Bat -- Crystal Towel -- Semi-Circle -- Manta Ray -- Design -- Evolving the Moving Fins -- The Radio -- The Build -- Flying -- 3D Banana -- Conclusion -- 10 Aerodynamics for the Hacker -- Lift -- Conditions for Lift: Positive Aerodynamic Angle of Attack and Airflow -- Lift, Part 1 -- Lift, Part 2 -- Pitch, Roll, and Yaw -- Center of Gravity (CG) -- Reflex and Flying Wings -- Reasoning about Lift -- Drag -- Glide Ratio -- Conclusion -- 11 Hack the Flack: Make and Fly Your Own Design -- Getting the Idea -- Prototyping -- A Plank -- Designing and Building a Novel Design -- Building the Powered Version -- Scaling Up from the Glider Proof of Concept -- Structural Considerations -- Placing Equipment -- Flight Testing -- New Shapes by Morphing Old Ones -- Incremental Refinement -- Conclusion -- 12 Simulators, Autopilots, Video, and Buddy Boxing -- Flight Simulators -- Flying Model Simulator (FMS) -- CRRCsim -- Autopilots -- Copilot CPD4 -- Full Autopilot -- Video from the Air -- Passive Video -- First-Person Video (FPV) -- Buddy Boxing a.k.a. …”
    Libro electrónico
  15. 635
    Publicado 2016
    “…The second edition of this popular cookbook provides more than 240 hands-on recipes for running this tiny low-cost computer with Linux, programming it with Python, and hooking up sensors, motors, and other hardware—including Arduino and the Internet of Things. Prolific hacker and author Simon Monk also teaches basic principles to help you use new technologies with Raspberry Pi as its ecosystem continues to develop. …”
    Libro electrónico
  16. 636
    por Northrup, Tony, 1974-
    Publicado 2005
    “…From fearless neophytes to tool-wielding masterminds, the home hacker in any geek will find new inspiration and plenty of hands-on guidance to take on a variety of home-transforming projects once relegated to the world of sci-fi. …”
    Libro electrónico
  17. 637
    por Fullam, Scott
    Publicado 2004
    “… Put a hacker in a room with a Furby for a weekend and you'll hear a conversation that's fairly one-sided in its originality. …”
    Libro electrónico
  18. 638
    por Sánchez Belmont, Oscar
    Publicado 2018
    Tabla de Contenidos: “…4.5 Enfoque preventivo de protección de la información, riesgo y evaluación de la vulnerabilidad -- 4.5.1 Estructuras inteligentes de seguridad en la empresa -- 4.5.2 Inteligencia corporativa en el análisis de un proyecto de hacker -- 4.6 Tiempos en los que se acentúan ataques de espionaje industrial -- 4.6.1 La industria del espionaje y la seriedad con la que se debe tomar -- Bibliografía…”
    Libro electrónico
  19. 639
    por Ganz, Kathrin
    Publicado 2017
    Tabla de Contenidos: “…Subjektpositionen im politischen Diskurs der digitalen Gesellschaft -- Inhalt -- Abbildungen -- Tabellen -- 1 Einleitung -- 1.1 Erkenntnisinteresse und Fragestellung -- 1.2 Theoretischer und empirischer Zugang -- 1.3 Aufbau der Studie -- 2 Die Netzbewegung -- 2.1 Zum Stand der Forschung -- 2.2 Von tuwat.txt bis Freiheit statt Angst: Zur Entwicklungder Netzbewegung -- 2.2.1 Hacker_innen und die Netzkultur der 1980er Jahre -- 2.2.2 Netzkritik, Hacktivismus und Gegenöffentlichkeiten -- 2.2.3 Entstehung und Weiterentwicklung der Netzbewegung -- 2.3 Online und offline: Bewegungskultur und Ressourcen der Internetszene -- 2.3.1 Internetszenen als Vergemeinschaftungskontexte -- 2.3.2 Internet-Aktivismus und Bewegungskultur -- 2.3.3 Überlegungen zur kollektiven Identität der Netzbewegung -- 2.4 Das Konfliktfeld Netzpolitik -- 2.4.1 Netzpolitik als Politikfeld -- 2.4.2 Kämpfe um den Zugang zum Internet -- 2.4.3 Kämpfe um den Zugang zu Inhalten -- 2.4.4 Kämpfe um Eigentumsrechte und informationelle Güter -- 2.4.5 Kämpfe um Privacy -- 2.5 Die Netzbewegung als Hegemonieprojekt -- 3 Intersektionalität und Hegemonie -- 3.1 Intersektionalität -- 3.1.1 Zur Genealogie des intersektionalen Paradigmas -- 3.1.2 Die intersektionale Mehrebenenanalyse -- 3.2 Hegemonietheorie -- 3.2.1 Elemente des Sozialen: Diskurs und Artikulation -- 3.2.2 Grenzen des Diskurses: Antagonismus, Dislokation und soziale Heterogenität -- 3.2.3 Artikulationen des Politischen: Hegemonie und leerer Signifikant -- 3.3 Subjektpositionen im politischen Diskurs -- 3.3.1 Theorie-Differenzen: Praktiken, Artikulation und kapitalistische Hegemonie -- 3.3.2 Subjektpositionen -- 3.3.3 Die Materialisierungsebenen intersektionaler Wechselwirkungen -- 3.4 Zwischenfazit -- 4 Zum methodischen Vorgehen -- 4.1 Feldzugang und die Position der Forschenden im Feld…”
    Electrónico
  20. 640
    Publicado 2017
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright -- About the Author -- About the Technical Editor -- Credits -- Acknowledgments -- Contents at a glance -- Contents -- Foreword -- Introduction -- Coming Full Circle -- Advanced Persistent Threat (APT) -- Next Generation Technology -- "Hackers" -- Forget Everything You Think You Know About Penetration Testing -- How This Book Is Organized -- Chapter 1: Medical Records (In)security -- An Introduction to Simulating Advanced Persistent Threat -- Background and Mission Briefing -- Payload Delivery Part 1: Learning How to Use the VBA Macro -- How NOT to Stage a VBA Attack -- Examining the VBA Code -- Avoid Using Shellcode -- Automatic Code Execution -- Using a VBA/VBS Dual Stager -- Keep Code Generic Whenever Possible -- Code Obfuscation -- Enticing Users -- Command and Control Part 1: Basics and Essentials -- The Attack -- Bypassing Authentication -- Summary -- Exercises -- Chapter 2: Stealing Research -- Background and Mission Briefing -- Payload Delivery Part 2: Using the Java Applet for Payload Delivery -- Java Code Signing for Fun and Profit -- Writing a Java Applet Stager -- Create a Convincing Pretext -- Signing the Stager -- Notes on Payload Persistence -- Microsoft Windows -- Linux -- OSX -- Command and Control Part 2: Advanced Attack Management -- Adding Stealth and Multiple System Management -- Implementing a Command Structure -- Building a Management Interface -- The Attack -- Situational Awareness -- Using AD to Gather Intelligence -- Analyzing AD Output -- Attack Against Vulnerable Secondary System -- Credential Reuse Against Primary Target System -- Summary -- Exercises -- Chapter 3: Twenty-First Century Heist -- What Might Work? …”
    Libro electrónico