Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 249
- Security measures 231
- Computer networks 192
- Penetration testing (Computer security) 109
- Hackers 82
- Engineering & Applied Sciences 72
- Computer crimes 47
- Computer Science 44
- Hacking 43
- Internet 37
- Data protection 35
- Operating systems (Computers) 30
- Electrical & Computer Engineering 29
- Examinations 29
- Certification 27
- Prevention 27
- Kali Linux 26
- Telecommunications 26
- Electronic data processing personnel 24
- Computer hackers 23
- Computers 22
- Development 22
- Application software 20
- Wittgenstein, Ludwig 20
- Historia 19
- Information technology 19
- Management 19
- Linux 18
- Access control 17
- Web sites 17
-
661por Osborn, Steven. author“…What do you get when you combine an electronics hobbyist, hacker, garage mechanic, kitchen table inventor, tinkerer, and entrepreneur? …”
Publicado 2013
Libro electrónico -
662Publicado 2013“…If you are an Android hacker, or if you are very well versed in security concerns of the platform, this book is not for you. …”
Libro electrónico -
663por Grothaus, Michael“…Unleash your iPhone and take it to the limit using secret tips and techniques from gadget hacker Erica Sadun. Fast and fun to read, Taking Your iPod touch 4 to the Max is fully updated to show you how get the most out of Apple's OS 4. …”
Publicado 2010
Libro electrónico -
664Publicado 2024Tabla de Contenidos: “…Zompetti -- Canons of rhetoric : building blocks for speech construction / Adrienne E. Hacker-Daniel and Christopher J. Oldenberg -- Public speaking and theatre : a joint tradition / Kyle A. …”
Libro -
665por Hoffman, Daniel 1972-Tabla de Contenidos: “…Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control; About the Author; Credits; Contents; Acknowledgments; Introduction; An Ethical Hacker's Perspective; Misconceptions Abound; The Flow of This Book; What You'll Learn; Questions to Ask Yourself as You Read This Book; Chapter 1: Understanding Terms and Technologies; Who Is the Trusted Computing Group?…”
Publicado 2008
Libro electrónico -
666por Stevens, ChrisTabla de Contenidos: “…WHAT APPLE LEARNED FROM THE FIRST SUCCESSFUL APPSA RENAISSANCE IN GAMING; SUMMARY; CHAPTER 4: THE GOLD RUSH; A TASTE OF SUCCESS; FEELING THE APPILLIONAIRE BUZZ; THE FALLACY OF EASY MONEY; SUMMARY; CHAPTER 5:THE FIRST MILLION; A BOX OF DELIGHTS; THE BOY GENIUS; THE HACKER ARMY GROWS; APPS INVADE BY STEALTH; THE BEDROOM PROGRAMMER AWAKES; SUMMARY; PART II: THE APPILLIONAIRES; CHAPTER 6: DOODLE JUMP; CROATIAN DREAMS; BUBBLEWRAP; IF AT FIRST YOU DON'T SUCCEED . . .; TIC TAC TOE; A HAND-BUILT LOOK AND FEEL; DOODLE JUMP IS BORN; DOODLE JUMP 2 IS BORN; HOW DOODLE JUMP CHANGED THEIR LIVES; SUMMARY…”
Publicado 2011
Libro electrónico -
667Publicado 2022Tabla de Contenidos: “…Cybersecurity Claims Under Non-Cyber Coverage -- 3. "The Hackers Did This": Data Breach Lawsuits and Commercial General Liability Insurance -- Negligent Cybersecurity and Liability for Data Breaches -- Zurich v. …”
Libro electrónico -
668Publicado 2018Tabla de Contenidos: “…-- Secure design -- Summary -- Questions -- Further reading -- Chapter 8: Secure Coding Best Practices -- Secure coding industry best practices -- Establishing secure coding baselines -- Secure coding awareness training -- Tool evaluation -- Tool optimization -- High-risk module review -- Manual code review tools -- Secure code scanning tools -- Secure compiling -- Common issues in practice -- Summary -- Questions -- Further reading -- Chapter 9: Case Study - Security and Privacy by Design -- Case study background -- Secure architecture review -- Authentication -- Authorization -- Session management -- Data input/output -- Privacy by design -- Summary of security and privacy frameworks -- Third-party component management -- Summary -- Questions -- Further reading -- Chapter 10: Security-Testing Plan and Practices -- Security-testing knowledge kit -- Security-testing plan templates -- Security-testing objective -- Security-testing baseline -- Security-testing environment -- Testing strategy -- High-risk modules -- Recommended security-testing tools -- Web security testing -- Privacy -- Security-testing domains -- Thinking like a hacker -- Exploits and CVE -- Hacker techniques -- Malware Information -- Security-Training environment -- Summary -- Questions -- Further reading -- Chapter 11: Whitebox Testing Tips -- Whitebox review preparation -- Viewing the whole project -- High-risk module -- Whitebox review checklist -- Top common issues -- Secure coding patterns and keywords -- Case study - Java struts security review -- Struts security review approaches -- Struts security checklist -- Struts security strings search in struts.xml and API -- Summary -- Questions -- Further reading…”
Libro electrónico -
669Publicado 2006Tabla de Contenidos: “…Juris -- De la política en los medios a la política en red: Internet y el proceso político / Araba Sey y Manuel Castells -- Televisión, Internet y elaboración de la identidad / Imma Tubellla -- Globalización, identidad y redes de televisión: mediación comunitaria y respuestas globales en la India multicultural / Anshu Chatterjee -- La ética hacker como cultura de la era de la información / Pekka Himanen…”
Libro -
670Publicado 2016Tabla de Contenidos: “…; Why should We care About Privacy?; Caution: Hackers at Work; Serious Business; References; Chapter 2 - The Snowden Revelations; A glance at the history books; You say incident, I say sham; let's call the whole thing off; Revelations, or just more of the same?…”
Libro electrónico -
671Publicado 2014Tabla de Contenidos: “…Intro -- Half Title -- Title Page -- Contents -- Introduction -- 100 Ideas that Changed the Web -- No.1 The Mundaneum -- No.2 The Space Race -- No.3 Hypertext -- No.4 The Modem -- No.5 Graphical User Interface -- No.6 The Mouse -- No.7 Markup Language -- No.8 XANADU -- No.9 The Personal Computer -- No.10 The Internet -- No.11 Internet Service Provider -- No.12 Bulletin Board Systems -- No.13 Hackers -- No.14 Cyberpunk -- No.15 Internet Protocol Suite -- No.16 Desktop Publishing -- No.17 Hypercard -- No.18 Graphics Interchange Format -- No.19 The Emoticon -- No.20 The Domain Name System -- No.21 The Project -- No.22 Web Browser -- No.23 The Cookie -- No.24 The JPEG -- No.25 Pornography -- No.26 Search -- No.27 WIFI -- No.28 Open Source -- No.29 Netiquette -- No.30 Apache Web Server -- No.31 Content Management Systems -- No.32 Web Analytics -- No.33 Massively Multi-Player Online Gaming -- No.34 Webcam -- No.35 Web Standards -- No.36 Geocities -- No.37 The Banner Ad -- No.38 Web Auction -- No.39 User-Centred Design -- No.40 Net Art -- No.41 Digital Fragility -- No.42 Information Architecture -- No.43 Web Chat -- No.44 Cascading Style Sheets -- No.45 Metadata -- No.46 The Webby Awards -- No.47 Pay Per Click -- No.48 Web Mapping -- No.49 Blogging -- No.50 Scaleable Vector Graphics -- No.51 Webmail -- No.52 Viral Content -- No.53 Internet Meme -- No.54 The Digital Wallet -- No.55 Ecommerce -- No.56 Collaborative Filtering -- No.57 The Drudge Report -- No.58 RSS Feeds -- No.59 Web Streaming -- No.60 The Independence Of Cyberspace -- No.61 The Blair Witch Project -- No.62 Peer-To-Peer -- No.63 Broadband -- No.64 Creative Commons -- No.65 The Dot-Com Bubble -- No.66 Web Tv -- No.67 The WIKI -- No.68 Infographics -- No.69 Augmented Reality -- No.70 Captcha -- No.71 Photo Sharing -- No.72 Podcast -- No.73 The Long Tail -- No.74 AJAX…”
Libro electrónico -
672Publicado 2023Tabla de Contenidos: “…The State of the Metaverse -- Chapter 18 Crypto FUD -- The Long Arm of the Law -- Energy Use -- Volatility, Centralization, and Quantum Computing -- Chapter 19 Crypto Warnings -- Hackers -- Bridge Hacks -- Scammers -- Rug-Pulls -- Vaporware -- Exit Scams -- Ponzi Schemes -- Contagion -- Chapter 20 The Future of Crypto -- Crypto Grows Up -- Stablecoins -- Blockchain Equities -- The Flippening -- Regenerative Finance -- Universal Basic Income -- Chapter 21 Where Do You Go from Here? …”
Libro electrónico -
673Publicado 2006Tabla de Contenidos: “…Juris -- De la política en los medios a la política en red: Internet y el proceso político / Araba Sey y Manuel Castells -- Televisión, Internet y elaboración de la identidad / Imma Tubellla -- Globalización, identidad y redes de televisión: mediación comunitaria y respuestas globales en la India multicultural / Anshu Chatterjee -- La ética hacker como cultura de la era de la información / Pekka Himanen…”
991005292949706719 -
674Publicado 2006Tabla de Contenidos: “…; STATUTORY AND REGULATORY COMPLIANCE; CONTRACTUAL LIABILITY; TORT LIABILITY; CONCLUSION; GLOSSARY; CROSS REFERENCES; REFERENCES; Hackers, Crackers, and Computer Criminals; INTRODUCTION; DEFINITIONS AND EXAMPLES; TACTICS, TECHNOLOGIES, AND TECHNIQUES…”
Libro electrónico -
675Publicado 2002Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico
-
676Publicado 2023Tabla de Contenidos: “…-- Chapter 16 A Professor and a Hacker-Academia and Cybersecurity -- Chapter 17 Free Hand or Bear Hug-The State's Role in the World of Innovation -- The Yozma Program: Government-funded venture capital -- The innovation and bureaucracy authority -- Capital of the Negev, capital of cybersecurity -- Just keep out of the way -- The prime minister's agenda -- Chapter 18 Small and Nimble-Being a Small Island-Nation in the Middle East Is Not Such a Bad Start -- Hackathons lead to global thinking -- The "American Dream" -- Backs against the wall -- Two degrees of separation -- Chapter 19 "Bro"-What Makes Israel's Culture an Incubator of Cybersecurity Innovation? …”
Libro electrónico -
677por Tellis, Gerard J.Tabla de Contenidos: “…The Hot-Stove Effect: Learning from FailureThe Expectations Effect: Hope Versus Reality; Innovation's Gain-Loss Function: Type 1 and 2 Errors; Case Histories; Gambling on an Embryonic Market: Toyota's Prius; Initial Stage: Striving for Kakushin (''Rapid Innovation'')-Aim High; Experimentation-Undaunted by Failure; Slow Takeoff-A Testament of Toyota's Faith and Patience; Eventual Success; Gambling on Growth: Amazon.com; Gambling on Vision: Facebook; Hatch of an Idea in a Dorm Room; Bet on Silicon Valley; Risk-Loving Hacker Culture; News Feed Crisis; To Sell or Not to Sell…”
Publicado 2013
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
678por Libicki, Martin C.Tabla de Contenidos: “…-- Enforce laws against hacking -- Disassociate from freelance hackers -- Discourage commercial espionage -- Be careful about the obligation to suppress cyber traffic -- How do we enforce norms? …”
Publicado 2012
Libro electrónico -
679Publicado 2015Tabla de Contenidos: “…Bike Plus Tape -- Kinetic Sculpture Racer -- Summary -- Chapter 4. Bike Hacker's Workbench -- The Essential Bike Mechanic's Toolkit -- Bike Stand -- Bottom Bracket Tool -- Cable Cutter -- Cable Puller -- Chain Breaker -- Chainring Nut Wrench -- Chain Wear Indicator -- Chain Whip -- CO2 Inflator -- Cone Wrenches -- Crank Puller -- Freewheel Remover -- Grease -- Hex Wrench -- Key Wrench -- Lockring Remover -- Multitool -- Pedal Wrench -- Pressure Gauge -- Rasp and Patches -- Screwdrivers -- Socket Set -- Spoke Wrench -- Tire Levers…”
Libro electrónico -
680Publicado 2010Tabla de Contenidos: “…Contents; Recipe Index; List of Interviews; Preface; Chapter 1: Hello, Kitchen!; Think Like a Hacker; Functional Fixedness; A Few Words on Nutrition; Tips for Newbies; Picking a Recipe; Reading Between the Lines; Cooking for One; Cooking for Others; Chapter 2: Initializing the Kitchen; Approaching the Kitchen; Calibrating Your Instruments; Prepping Ingredients; Kitchen Equipment; Bare Minimum Equipment; Standard Kitchen Equipment; Kitchen Organization; O(1) Retrieval; Functional Grouping; Uniform Storage Containers; Counter Layout; Kitchen Pruning; Giving Kitchen Tools As Gifts…”
Libro electrónico