Mostrando 661 - 680 Resultados de 1,058 Para Buscar '"hacker"', tiempo de consulta: 0.09s Limitar resultados
  1. 661
    por Osborn, Steven. author
    Publicado 2013
    “…What do you get when you combine an electronics hobbyist, hacker, garage mechanic, kitchen table inventor, tinkerer, and entrepreneur? …”
    Libro electrónico
  2. 662
    Publicado 2013
    “…If you are an Android hacker, or if you are very well versed in security concerns of the platform, this book is not for you. …”
    Libro electrónico
  3. 663
    por Grothaus, Michael
    Publicado 2010
    “…Unleash your iPhone and take it to the limit using secret tips and techniques from gadget hacker Erica Sadun. Fast and fun to read, Taking Your iPod touch 4 to the Max is fully updated to show you how get the most out of Apple's OS 4. …”
    Libro electrónico
  4. 664
    Publicado 2024
    Tabla de Contenidos: “…Zompetti -- Canons of rhetoric : building blocks for speech construction / Adrienne E. Hacker-Daniel and Christopher J. Oldenberg -- Public speaking and theatre : a joint tradition / Kyle A. …”
    Libro
  5. 665
    por Hoffman, Daniel 1972-
    Publicado 2008
    Tabla de Contenidos: “…Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control; About the Author; Credits; Contents; Acknowledgments; Introduction; An Ethical Hacker's Perspective; Misconceptions Abound; The Flow of This Book; What You'll Learn; Questions to Ask Yourself as You Read This Book; Chapter 1: Understanding Terms and Technologies; Who Is the Trusted Computing Group?…”
    Libro electrónico
  6. 666
    por Stevens, Chris
    Publicado 2011
    Tabla de Contenidos: “…WHAT APPLE LEARNED FROM THE FIRST SUCCESSFUL APPSA RENAISSANCE IN GAMING; SUMMARY; CHAPTER 4: THE GOLD RUSH; A TASTE OF SUCCESS; FEELING THE APPILLIONAIRE BUZZ; THE FALLACY OF EASY MONEY; SUMMARY; CHAPTER 5:THE FIRST MILLION; A BOX OF DELIGHTS; THE BOY GENIUS; THE HACKER ARMY GROWS; APPS INVADE BY STEALTH; THE BEDROOM PROGRAMMER AWAKES; SUMMARY; PART II: THE APPILLIONAIRES; CHAPTER 6: DOODLE JUMP; CROATIAN DREAMS; BUBBLEWRAP; IF AT FIRST YOU DON'T SUCCEED . . .; TIC TAC TOE; A HAND-BUILT LOOK AND FEEL; DOODLE JUMP IS BORN; DOODLE JUMP 2 IS BORN; HOW DOODLE JUMP CHANGED THEIR LIVES; SUMMARY…”
    Libro electrónico
  7. 667
    Publicado 2022
    Tabla de Contenidos: “…Cybersecurity Claims Under Non-Cyber Coverage -- 3. "The Hackers Did This": Data Breach Lawsuits and Commercial General Liability Insurance -- Negligent Cybersecurity and Liability for Data Breaches -- Zurich v. …”
    Libro electrónico
  8. 668
    Publicado 2018
    Tabla de Contenidos: “…-- Secure design -- Summary -- Questions -- Further reading -- Chapter 8: Secure Coding Best Practices -- Secure coding industry best practices -- Establishing secure coding baselines -- Secure coding awareness training -- Tool evaluation -- Tool optimization -- High-risk module review -- Manual code review tools -- Secure code scanning tools -- Secure compiling -- Common issues in practice -- Summary -- Questions -- Further reading -- Chapter 9: Case Study - Security and Privacy by Design -- Case study background -- Secure architecture review -- Authentication -- Authorization -- Session management -- Data input/output -- Privacy by design -- Summary of security and privacy frameworks -- Third-party component management -- Summary -- Questions -- Further reading -- Chapter 10: Security-Testing Plan and Practices -- Security-testing knowledge kit -- Security-testing plan templates -- Security-testing objective -- Security-testing baseline -- Security-testing environment -- Testing strategy -- High-risk modules -- Recommended security-testing tools -- Web security testing -- Privacy -- Security-testing domains -- Thinking like a hacker -- Exploits and CVE -- Hacker techniques -- Malware Information -- Security-Training environment -- Summary -- Questions -- Further reading -- Chapter 11: Whitebox Testing Tips -- Whitebox review preparation -- Viewing the whole project -- High-risk module -- Whitebox review checklist -- Top common issues -- Secure coding patterns and keywords -- Case study - Java struts security review -- Struts security review approaches -- Struts security checklist -- Struts security strings search in struts.xml and API -- Summary -- Questions -- Further reading…”
    Libro electrónico
  9. 669
    Publicado 2006
    Tabla de Contenidos: “…Juris -- De la política en los medios a la política en red: Internet y el proceso político / Araba Sey y Manuel Castells -- Televisión, Internet y elaboración de la identidad / Imma Tubellla -- Globalización, identidad y redes de televisión: mediación comunitaria y respuestas globales en la India multicultural / Anshu Chatterjee -- La ética hacker como cultura de la era de la información / Pekka Himanen…”
    Libro
  10. 670
    Publicado 2016
    Tabla de Contenidos: “…; Why should We care About Privacy?; Caution: Hackers at Work; Serious Business; References; Chapter 2 - The Snowden Revelations; A glance at the history books; You say incident, I say sham; let's call the whole thing off; Revelations, or just more of the same?…”
    Libro electrónico
  11. 671
    Publicado 2014
    Tabla de Contenidos: “…Intro -- Half Title -- Title Page -- Contents -- Introduction -- 100 Ideas that Changed the Web -- No.1 The Mundaneum -- No.2 The Space Race -- No.3 Hypertext -- No.4 The Modem -- No.5 Graphical User Interface -- No.6 The Mouse -- No.7 Markup Language -- No.8 XANADU -- No.9 The Personal Computer -- No.10 The Internet -- No.11 Internet Service Provider -- No.12 Bulletin Board Systems -- No.13 Hackers -- No.14 Cyberpunk -- No.15 Internet Protocol Suite -- No.16 Desktop Publishing -- No.17 Hypercard -- No.18 Graphics Interchange Format -- No.19 The Emoticon -- No.20 The Domain Name System -- No.21 The Project -- No.22 Web Browser -- No.23 The Cookie -- No.24 The JPEG -- No.25 Pornography -- No.26 Search -- No.27 WIFI -- No.28 Open Source -- No.29 Netiquette -- No.30 Apache Web Server -- No.31 Content Management Systems -- No.32 Web Analytics -- No.33 Massively Multi-Player Online Gaming -- No.34 Webcam -- No.35 Web Standards -- No.36 Geocities -- No.37 The Banner Ad -- No.38 Web Auction -- No.39 User-Centred Design -- No.40 Net Art -- No.41 Digital Fragility -- No.42 Information Architecture -- No.43 Web Chat -- No.44 Cascading Style Sheets -- No.45 Metadata -- No.46 The Webby Awards -- No.47 Pay Per Click -- No.48 Web Mapping -- No.49 Blogging -- No.50 Scaleable Vector Graphics -- No.51 Webmail -- No.52 Viral Content -- No.53 Internet Meme -- No.54 The Digital Wallet -- No.55 Ecommerce -- No.56 Collaborative Filtering -- No.57 The Drudge Report -- No.58 RSS Feeds -- No.59 Web Streaming -- No.60 The Independence Of Cyberspace -- No.61 The Blair Witch Project -- No.62 Peer-To-Peer -- No.63 Broadband -- No.64 Creative Commons -- No.65 The Dot-Com Bubble -- No.66 Web Tv -- No.67 The WIKI -- No.68 Infographics -- No.69 Augmented Reality -- No.70 Captcha -- No.71 Photo Sharing -- No.72 Podcast -- No.73 The Long Tail -- No.74 AJAX…”
    Libro electrónico
  12. 672
    Publicado 2023
    Tabla de Contenidos: “…The State of the Metaverse -- Chapter 18 Crypto FUD -- The Long Arm of the Law -- Energy Use -- Volatility, Centralization, and Quantum Computing -- Chapter 19 Crypto Warnings -- Hackers -- Bridge Hacks -- Scammers -- Rug-Pulls -- Vaporware -- Exit Scams -- Ponzi Schemes -- Contagion -- Chapter 20 The Future of Crypto -- Crypto Grows Up -- Stablecoins -- Blockchain Equities -- The Flippening -- Regenerative Finance -- Universal Basic Income -- Chapter 21 Where Do You Go from Here? …”
    Libro electrónico
  13. 673
    Publicado 2006
    Tabla de Contenidos: “…Juris -- De la política en los medios a la política en red: Internet y el proceso político / Araba Sey y Manuel Castells -- Televisión, Internet y elaboración de la identidad / Imma Tubellla -- Globalización, identidad y redes de televisión: mediación comunitaria y respuestas globales en la India multicultural / Anshu Chatterjee -- La ética hacker como cultura de la era de la información / Pekka Himanen…”
    991005292949706719
  14. 674
    Publicado 2006
    Tabla de Contenidos: “…; STATUTORY AND REGULATORY COMPLIANCE; CONTRACTUAL LIABILITY; TORT LIABILITY; CONCLUSION; GLOSSARY; CROSS REFERENCES; REFERENCES; Hackers, Crackers, and Computer Criminals; INTRODUCTION; DEFINITIONS AND EXAMPLES; TACTICS, TECHNOLOGIES, AND TECHNIQUES…”
    Libro electrónico
  15. 675
    Publicado 2002
    Libro electrónico
  16. 676
    Publicado 2023
    Tabla de Contenidos: “…-- Chapter 16 A Professor and a Hacker-Academia and Cybersecurity -- Chapter 17 Free Hand or Bear Hug-The State's Role in the World of Innovation -- The Yozma Program: Government-funded venture capital -- The innovation and bureaucracy authority -- Capital of the Negev, capital of cybersecurity -- Just keep out of the way -- The prime minister's agenda -- Chapter 18 Small and Nimble-Being a Small Island-Nation in the Middle East Is Not Such a Bad Start -- Hackathons lead to global thinking -- The "American Dream" -- Backs against the wall -- Two degrees of separation -- Chapter 19 "Bro"-What Makes Israel's Culture an Incubator of Cybersecurity Innovation? …”
    Libro electrónico
  17. 677
    por Tellis, Gerard J.
    Publicado 2013
    Tabla de Contenidos: “…The Hot-Stove Effect: Learning from FailureThe Expectations Effect: Hope Versus Reality; Innovation's Gain-Loss Function: Type 1 and 2 Errors; Case Histories; Gambling on an Embryonic Market: Toyota's Prius; Initial Stage: Striving for Kakushin (''Rapid Innovation'')-Aim High; Experimentation-Undaunted by Failure; Slow Takeoff-A Testament of Toyota's Faith and Patience; Eventual Success; Gambling on Growth: Amazon.com; Gambling on Vision: Facebook; Hatch of an Idea in a Dorm Room; Bet on Silicon Valley; Risk-Loving Hacker Culture; News Feed Crisis; To Sell or Not to Sell…”
    Libro electrónico
  18. 678
    por Libicki, Martin C.
    Publicado 2012
    Tabla de Contenidos: “…-- Enforce laws against hacking -- Disassociate from freelance hackers -- Discourage commercial espionage -- Be careful about the obligation to suppress cyber traffic -- How do we enforce norms? …”
    Libro electrónico
  19. 679
    Publicado 2015
    Tabla de Contenidos: “…Bike Plus Tape -- Kinetic Sculpture Racer -- Summary -- Chapter 4. Bike Hacker's Workbench -- The Essential Bike Mechanic's Toolkit -- Bike Stand -- Bottom Bracket Tool -- Cable Cutter -- Cable Puller -- Chain Breaker -- Chainring Nut Wrench -- Chain Wear Indicator -- Chain Whip -- CO2 Inflator -- Cone Wrenches -- Crank Puller -- Freewheel Remover -- Grease -- Hex Wrench -- Key Wrench -- Lockring Remover -- Multitool -- Pedal Wrench -- Pressure Gauge -- Rasp and Patches -- Screwdrivers -- Socket Set -- Spoke Wrench -- Tire Levers…”
    Libro electrónico
  20. 680
    Publicado 2010
    Tabla de Contenidos: “…Contents; Recipe Index; List of Interviews; Preface; Chapter 1: Hello, Kitchen!; Think Like a Hacker; Functional Fixedness; A Few Words on Nutrition; Tips for Newbies; Picking a Recipe; Reading Between the Lines; Cooking for One; Cooking for Others; Chapter 2: Initializing the Kitchen; Approaching the Kitchen; Calibrating Your Instruments; Prepping Ingredients; Kitchen Equipment; Bare Minimum Equipment; Standard Kitchen Equipment; Kitchen Organization; O(1) Retrieval; Functional Grouping; Uniform Storage Containers; Counter Layout; Kitchen Pruning; Giving Kitchen Tools As Gifts…”
    Libro electrónico