Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 249
- Security measures 231
- Computer networks 192
- Penetration testing (Computer security) 109
- Hackers 82
- Engineering & Applied Sciences 72
- Computer crimes 47
- Computer Science 44
- Hacking 43
- Internet 37
- Data protection 35
- Operating systems (Computers) 30
- Electrical & Computer Engineering 29
- Examinations 29
- Certification 27
- Prevention 27
- Kali Linux 26
- Telecommunications 26
- Electronic data processing personnel 24
- Computer hackers 23
- Computers 22
- Development 22
- Application software 20
- Wittgenstein, Ludwig 20
- Historia 19
- Information technology 19
- Management 19
- Linux 18
- Access control 17
- Web sites 17
-
681Publicado 2010Tabla de Contenidos: “…Government As a Platform; Government As a Platform; Lesson 1: Open Standards Spark Innovation and Growth; Lesson 2: Build a Simple System and Let It Evolve; Lesson 3: Design for Participation; A Robustness Principle for Government; Lesson 4: Learn from Your "Hackers"…”
Libro electrónico -
682
-
683por Reyes, AnthonyTabla de Contenidos: “…Incident Response: Live Forensics and InvestigationsIntroduction; Postmortmem versus Live Forensics; Today's Live Methods; Case Study: Live versus Postmortem; Computer Analysis for the Hacker Defender Program; Network Analysis; Summary; Special Thanks; References; Solutions Fast Track; Frequently Asked Questions; Chapter 6. …”
Publicado 2007
Libro electrónico -
684Publicado 2006Tabla de Contenidos: “…Layer 4: The Transport Layer; Introduction; Connection-Oriented versus Connectionless Protocols; Protocols at the Transport Layer; The Hacker's Perspective; Scanning the Network; Operating System Fingerprinting; Detecting Scans on Your Network; Defending the Transport Layer; Transport Layer Project-Setting Up Snort; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 6. …”
Libro electrónico -
685por Groth, DavidTabla de Contenidos: “…Understanding and Defending against Hacker AttacksDoD Security Standards; Understanding Encryption; Security Policies; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 9: Fault Tolerance and Disaster Recovery; Assessing Fault Tolerance and Disaster Recovery Needs; Power Management; Disk System Fault Tolerance; Backup Considerations; Virus Protection; Software Revisions; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 10: Network Troubleshooting; Narrowing Down the Problem; Troubleshooting Steps; The Troubleshooter's Resources…”
Publicado 2006
Libro electrónico -
686Publicado 2014Tabla de Contenidos: “…Front Cover; Social Engineering Penetration Testing; Copyright Page; Contents; Foreword; Acknowledgements; About the Authors; About the Technical Editor; 1 An Introduction to Social Engineering; Introduction; Defining social engineering; Examples from the movies; Sneakers; Hackers; Matchstick Men; Dirty Rotten Scoundrels; The Imposter; Famous social engineers; Kevin Mitnik; Frank Abagnale; Badir brothers; Chris Hadnagy; Chris Nickerson; Real-world attacks; The RSA breach; The Buckingham Palace breach; The Financial Times breach; The Microsoft XBox breach; Operation Camion; Summary…”
Libro electrónico -
687Publicado 2015Tabla de Contenidos: “…; Professional Roles; Hackers (White, Gray, and Black); Digital Forensics Examiner; Cyber Intelligence Analyst; Cyber Security Engineer; Penetration Tester…”
Libro electrónico -
688por Edge, RyanTabla de Contenidos: “…Cover -- Title Page -- Copyright -- Dedication -- Contributors -- Table of Contents -- Preface -- Chapter 1: Building a Counter App with History Tracking to Establish Fundamentals -- Technical requirements -- Understanding the foundations - widgets, elements, and render objects -- Setting up the project -- Creating an enhanced counter app -- The title widget -- The counter widget -- The history widget -- Manually caching a widget -- Making everything constant -- Summary -- Further reading -- Chapter 2: Building a Race Standings App -- Technical requirements -- Setting up the project -- Localization and internationalization -- Routes management -- Adding a custom font -- Creating the race standings app -- The HomePage widget -- The NextRaces widget -- Summary -- Further reading -- Chapter 3: Building a Todo Application Using Inherited Widgets and Provider -- Technical requirements -- Sharing dependencies in a Flutter application -- Setting up the project -- Creating the Todo application -- Using InheritedWidget for state management -- Refactoring with Provider -- Summary -- Further reading -- Chapter 4: Building a Native Settings Application Using Material and Cupertino Widgets -- Technical requirements -- Understanding that everything is a widget -- Setting up the project -- Building a platform-specific UI -- Building an iOS-specific UI with CupertinoApp -- Building an Android-specific UI with MaterialApp -- Summary -- Further reading -- Chapter 5: Exploring Navigation and Routing with a Hacker News Clone -- Technical requirements -- Setting up the project -- Understanding navigation -- Imperative routing with Navigator 1.0 -- Declarative routing with Navigator 2.0 -- Simplifying Navigator 2.0 with GoRouter -- Summary -- Further reading -- Chapter 6: Building a Simple Contact Application with Forms and Gestures -- Technical requirements…”
Publicado 2022
Libro electrónico -
689Publicado 2016Tabla de Contenidos: “…, Lina Eklund (Stockholm University, Sweden)Chapter 2 - Between Aliens, Hackers, and Birds: Non-Casual Mobile Games and Mobile Game Design, Brendan Keogh (RMIT University, Australia)Chapter 3 - Casual Gaming: The Changing Role of the Designer, Laureline Chiapello (University of Montréal, Canada)Chapter 4 - Discussions with Developers: Free2Play and the Changing Landscape of Games Development, Tom Phillips (CREATe/University of East Anglia, UK)Part II: Reasons to Play -- Chapter 5 - The Sociality of Asynchronicity: Social Network Games and Family Bonding, Kelly Bourdreau and Mia Consalvo (Concordia University, Canada)Chapter 6 - The Rise of Affection Games: The Private Lives of Mobile Devices, Lindsay Grace (American University, USA)Chapter 7 - Mobile Games and Ambient Play, Larissa Hjorth (RMIT University, Australia) and Ingrid Richardson (Murdoch University, Australia)Chapter 8 - Affect and Social Value in Freemium Games, Fanny Ramirez (Rutgers University, USA)Part III: Locative Play -- Chapter 9 - Riding in Cars with Strangers: A Comparative Analysis of Chinese and American Teamwork in Ingress, Stacy Blasiola, Miao Feng and Adrienne Massanari (University of Illinois at Chicago, USA)Chapter 10 - COMM [secure]: Locatedness and Pseudo-Anonymity While Playing Ingress, Erin Stark (Curtin University, Australia)Chapter 11 - Rewriting Neighbourhoods: Zombies, Run! …”
Libro electrónico -
690por Rodríguez Ibáñez, MargaritaTabla de Contenidos: “…El arte en acción: la filosofía hacker. 10. Cambios producidos en el arte por su inclusión en el sistema-red. 10.1. …”
Publicado 2012
Libro -
691Publicado 2016“…Linux Server Security: Hack and Defend presents a detailed guide for experienced administrators, aspiring hackers and other IT professionals seeking a more advanced understanding of Linux security. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
692
-
693Publicado 2024Tabla de Contenidos: “…-- Viewing Source is your friend -- Thinking like a hacker -- Certifying your greatness -- Are they worth getting? …”
Libro electrónico -
694Publicado 2018Tabla de Contenidos: “…-- THE HUSTLER, THE HIPSTER AND THE HACKER -- THINK OF THE END BEFORE YOU BEGIN -- CHOOSE YOUR BOARD WISELY -- AVOID THE SNAKE OIL -- RECAP -- WHAT'S NEXT -- CHAPTER 4 IDEAS ARE CHEAP! …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
695Publicado 2015Tabla de Contenidos: “…; Hardware Requirements; Physical Hardware; Equipment You Already Have; New Equipment Purchases; Used Equipment Purchases; Online Auctions; Thrift Stores; Company Sales; Virtual Hardware; VMware; VirtualBox; Hacker Hardware; Software Requirements; Operating Systems; Microsoft Windows; Linux; Navigating in Linux; Linux Basics; Mac OS X; Software and Applications; Learning Applications; Hacking Software; Summary; Key Terms…”
Libro electrónico -
696por Garfinkel, SimsonTabla de Contenidos: “…Defend in depthRisk Management Means Common Sense; Compliance Audits; Outsourcing Options; Formulating Your Plan of Action; Choosing a Vendor; Get a referral and insist on references; Beware of soup-to-nuts; Insist on breadth of background; People; "Reformed" hackers; Monitoring Services; Final Words on Outsourcing; The Problem with Security Through Obscurity; Keeping Secrets; Responsible Disclosure; Summary; Part II; Chapter 4. …”
Publicado 2003
Libro electrónico -
697por Meggelen, Jim VanTabla de Contenidos: “…A Telephony Revolution; Massive Change Requires Flexible Technology; Asterisk: The Hacker's PBX; Asterisk: The Professional's PBX; The Asterisk Community; The Asterisk Wiki; The IRC Channels; Asterisk User Groups; The Asterisk Documentation Project; The Business Case; This Book; 2. …”
Publicado 2007
Libro electrónico -
698Publicado 2009Tabla de Contenidos: “…Sobering numbers; 3. Know your enemy: hackers versus crackers; 4. Motives; 5. Tools of the trade; 6. …”
Libro electrónico -
699por Long, JohnnyTabla de Contenidos: “…Protecting Yourself from Google Hackers; Introduction; A Good, Solid Security Policy; Web Server Safeguards; HackingYour Own Site; Getting Help from Google; Summary; Solutions Fast Track…”
Publicado 2008
Libro electrónico -
700por Canavan, TomTabla de Contenidos: “…CMS Security Handbook; Contents; Introduction; Chapter 1 Introduction to CMS Security and Operations; Target Acquired; Operational Considerations; Educating Your Employees and End Users; Raising Security Awareness; Training on Information Security Policies; Providing a Standard Protocol for Threat Reporting; Ensuring E-mail Security; Applying Patches and Updates; Being Aware and Staying Safe; Looking at Your Site Through the Eyes of a Hacker; Steps to Gaining Access to Your Site; Researching; Googling Away; Using Google Hacking Tools (Dorks); Footprinting; Using NMAP for Nefarious Means…”
Publicado 2011
Libro electrónico