Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 249
- Security measures 231
- Computer networks 192
- Penetration testing (Computer security) 109
- Hackers 82
- Engineering & Applied Sciences 72
- Computer crimes 47
- Computer Science 44
- Hacking 43
- Internet 37
- Data protection 35
- Operating systems (Computers) 30
- Electrical & Computer Engineering 29
- Examinations 29
- Certification 27
- Prevention 27
- Kali Linux 26
- Telecommunications 26
- Electronic data processing personnel 24
- Computer hackers 23
- Computers 22
- Development 22
- Application software 20
- Wittgenstein, Ludwig 20
- Historia 19
- Information technology 19
- Management 19
- Linux 18
- Access control 17
- Web sites 17
-
701Publicado 2014Tabla de Contenidos: “…Sobering Numbers; 3. Know Your Enemy: Hackers versus Crackers; 4. Motives; 5. The Crackers' Tools of the Trade; Our "Unsecured" Wireless World; 6. …”
Libro electrónico -
702por Thomas, David B., 1952-Tabla de Contenidos: “…A VERY COOL SCENARIO; STEP UP AND MEET THE MILLENNIAL GENERATION; JUST WHAT YOU NEEDED: ANOTHER "CONVERGENCE"; CHAPTER 2: The New Mode of Production; SOCIAL MEDIA, TEAMWORK, AND COLLABORATION; MAPPING SOCIAL MEDIA TO RESULTS; ACCELERATING PRODUCT DEVELOPMENT; DRIVING KNOWLEDGE INTO AND ACROSS THE ORGANIZATION; CROWD SOURCING . . .; WE'RE ALL HACKERS NOW; CHAPTER 3: The Social Enterprise; FORGET MURPHY'S LAW; MORE IMPORTANT THAN MONEY ?…”
Publicado 2010
Libro electrónico -
703Publicado 2014Tabla de Contenidos: “…NotesChapter 7: Social Media and Digital Protest; Social Media: A Tool for Disruption, a Model for Change; The Hacker Group Anonymous; Anonymous Is an "Anti" Outfit of Malcontents; In Reckless Move, Anonymous Targeted Law Enforcement; Anonymous: Making All Information Free for All; In Pursuit of the Anonymous Definition of Civil Liberties; Anarchaos: In the Image of Anonymous; Notes; Part III: Protecting the Brand: Actions Executive Management Must Take to Reduce Cyber Risk; Chapter 8: Managing the Brand When the Worst Occurs; Be Prepared; 1. …”
Libro electrónico -
704Publicado 2018“…About This Book Detect and avoid various attack types that put the privacy of a system at risk Leverage Python to build efficient code and eventually build a robust environment Learn about securing wireless applications and information gathering on a web server Who This Book Is For If you are a Python programmer, a security researcher, or an ethical hacker and are interested in penetration testing with the help of Python, then this book is for you. …”
Libro electrónico -
705Publicado 2017“…By the end of this book, you'll get the hang of bypassing different defenses, after which you'll learn how hackers use the network to gain access into different systems. …”
Libro electrónico -
706Publicado 2013Tabla de Contenidos: “…-- Macht der Computer und Gegenmacht der Nutzer -- Hacker als Agenten des Fortschritts? -- Verantwortung für Datensicherheit -- Regulierte Selbstregulierung als pragmatisches Konzept -- Die Pläne von Parteien und Regierungen -- Was also heisst Netzpolitik? …”
Libro electrónico -
707Publicado 2021Tabla de Contenidos: “…Introduction : mind state and history in Britain 1960-2010 / George Ikkos and Nick Bouras -- Historical perspectives in mental health & psychiatry / Joanna Bourke -- International context / Edward Shorter -- Liberty's command : liberal ideology, the mixed economy and the British welfare state / Graham Scambler -- Social theory, psychiatry and mental health services / Rob Poole & Catherine Robinson -- A sociological perspective on psychiatric epidemiology in Britain / David Pilgrim and Anne Rogers -- Life, change and charisma : memories of psychiatric hospitals in the 1960's / Thomas Stephenson & Claire Hilton -- Mental asylums, social exclusion and public scandals / Louise Hide -- Mental health law : 'legalism' and 'medicalism'- 'old' and 'new' / George Szmukler & Larry Gostin -- Ken Clarke in conversation with Peter Tyrer : my role in justice and health / Peter Tyrer -- UK mental health policy and practice / Jon Glasby, Jerry Tew & Sarah-Jane Fenton -- Mental health policy and economics in Britain / Paul McCrone -- True confessions of a new managerialist / Elaine Murphy -- Subjectivity, citizenship and mental health : service user perspectives / Peter Beresford & Liz Brosnan -- The voluntary sector / Paul Farmer and Emily Blackshaw -- Women in UK psychiatry and mental health / Gianetta Rands -- Biological psychiatry in the UK and beyond / Stephen Lawrie -- The pharmaceutical industry and the standardisation of psychiatric practice / David Healy -- The evolution of psychiatric practice in Britain / Allan Beveridge -- The changing roles of the professions in psychiatry and mental health-psychiatric (mental health) nursing / Kevin Gournay & Peter Carter -- Critical friends : antipsychiatry and clinical psychology / Tom Burns & John Hall -- Changing generations I : children, adolescents and young people / Arnon Bentovim -- Changing generations II : the challenges of ageism in mental health policy / Claire Hilton -- Changing services I : clinical psychiatric perspective on community and primary care psychiatry mental health services / Trevor Turner -- Changing services II : from colony to community : people with developmental intellectual disability / Peter Carpenter -- Drugs, drug harms and drug laws in the UK - lessons from history / Ilana Crome & David Nutt -- Homelessness and mental health / Philip Timms -- From fear and pity to parity, politics and public mental health / Peter Byrne -- The origins of the dangerous and severe personality disorder programme in England / Peter Tyrer -- Psychiatry and mentally disordered offenders in England / John Gunn & Pamela Taylor -- Community psychiatry : a work in progress / Tom Craig -- UK deinstitutionalisation : neoliberal values and mental health / Andrew Scull -- Dealing with the melancholy void : responding to parents who experience pregnancy loss and perinatal death / Hedy Cleaver & Wendy Rose -- Work, unemployment and mental health / Jed Boardman and Miles Rinaldi -- Sexual diversity and UK psychiatry and mental health / Annie Bartlett -- Race, state and mind / Doreen Joseph & Kam Bhui -- Migrants and asylum seekers / Peter Hughes & Cornelius Katona -- Religion, spirituality and mental health / Esther Ansah-Asamoah, Jamie Hacker Hughes, Ahmed Hankir & Christopher C. H. Cook -- Soldiers, veterans and psychological casualties : legacies of N Ireland, Falklands, Afghanistan and Iraq / Edgar Jones -- Epilogue : mind, state, society and "our psychiatric future" / George Ikkos and Nick Bouras…”
Libro electrónico -
708
-
709Publicado 2019Tabla de Contenidos: “…-- The Island Story -- The Beverage Story -- 34 The Best Sales Interview Questions and Answers -- Sales Hacker Blog Post -- Interview Q & -- A -- Strange Questions -- 35 Interviewing Essentials -- 1. …”
Libro electrónico -
710Publicado 2015“…Leverage the power of Wireshark to troubleshoot your networking issues by using effective packet analysis techniques and performing improved protocol analysis About This Book Gain hands-on experience of troubleshooting errors in TCP/IP and SSL protocols through practical use cases Identify and overcome security flaws in your network to get a deeper insight into security analysis This is a fast-paced book that focuses on quick and effective packet captures through practical examples and exercises Who This Book Is For If you are a network or system administrator who wants to effectively capture packets, a security consultant who wants to audit packet flows, or a white hat hacker who wants to view sensitive information and remediate it, this book is for you. …”
Libro electrónico -
711Publicado 2014“…Successful cyberattacks can damage your organisation, no matter who is behind them The goals of the cyberterrorist, the cybercriminal, the cyberactivist and the state-sponsored hacker may not be the same – but the outcomes can be equally devastating. …”
Libro electrónico -
712Publicado 2009Tabla de Contenidos: “…Ciencia, tecnología y sociedad; Las culturas de Internet: la configuración sociotécnica de la red de redes; TIC y determinismo tecnológico; Internet y sociedad de la información; Internet: penetración social y orígenes; La cultura científica; La cultura hacker; Los rasgos básicos de Internet; La configuración sociotécnica; Bibliografía…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
713por Rittinghouse, John W.Tabla de Contenidos: “…; Threats to Personal Privacy; Fraud and Theft; Internet Fraud; Employee Sabotage; Infrastructure Attacks; Malicious Hackers; Malicious Coders; Industrial Espionage; Social Engineering; Educate Staff and Security Personnel; Managing Access; Physical Access; Access Control; Access Control Models; Password Management…”
Publicado 2005
Libro electrónico -
714por Perry, Bruce W.Tabla de Contenidos: “…Validate Unique UsernamesThe Server Handshake; For Those Server Hackers...; 25. Validate Credit Card Numbers; Shooting the Luhn; 26. …”
Publicado 2006
Libro electrónico -
715por Seibold, ChrisTabla de Contenidos: “…Deleting an AccountHACK 05: Become an Administrator for a Moment; Desktop Root; Command-Line Root; Enabling the Root Account; HACK 06: Behold the Power of PLIST; PLIST Files for Hackers; 2 HACKS FOR THE NET; HACK 07: Change Your Browser; Firefox; Google Browser Sync; Greasemonkey; Trim Firefox's fat on Intel Macs; Opera; Shiira: A WebKit-Based Safari Alternative; Change Your Default Browser; HACK 08: Safari: More Than Meets the Eye; Safari Tricks; Safari Add On: Saft-The Do-It-All Sidekick; HACK 09: Browser Agnosticism; Portable Passwords; Liberate Your Bookmarks…”
Publicado 2008
Libro electrónico -
716Publicado 2020Tabla de Contenidos: “…Ausnahmen -- Daten speichern -- Zusammenfassung -- Code testen -- Funktionen testen -- Klassen testen -- Zusammenfassung -- Projekte -- Alien Invasion -- Das eigene Kampfschiff -- Das Projekt planen -- Pygame installieren -- Erste Schritte für das Spielprojekt -- Das Bild eines Raumschiffs hinzufügen -- Refactoring: Die Methoden _check_events() und _update_screen() -- Das Schiff bewegen -- Zwischenstand -- Geschosse -- Zusammenfassung -- Die Außerirdischen -- Überblick über das Projekt -- Das erste Invasionsschiff -- Die Invasionsflotte erstellen -- Die Flotte in Bewegung setzen -- Invasoren abschießen -- Spielende -- Zusammenfassung -- Das Wertungssystem -- Eine Play-Schaltfläche hinzufügen -- Levels -- Die Punktwertung -- Zusammenfassung -- Datenvisualisierung -- Daten generieren -- Matplotlib installieren -- Einfache Liniendiagramme -- Zufallsbewegungen -- Würfeln mit Plotly -- Zusammenfassung -- Daten herunterladen -- Das Dateiformat CSV -- Globale Daten im JSON-Format visualisieren -- Zusammenfassung -- APIs -- Web-APIs -- Angaben zu Repositories mit Plotly visualisieren -- Die API von Hacker News -- Zusammenfassung -- Webanwendungen -- Erste Schritte mit Django -- Ein Projekt einrichten -- Eine App anlegen -- Seiten erstellen: die Startseite von Learning Log -- Weitere Seiten erstellen -- Zusammenfassung -- Benutzerkonten -- Dateneingabe durch die Benutzer -- Benutzerkonten einrichten -- Die Benutzer als Besitzer ihrer eigenen Daten -- Zusammenfassung -- Eine App gestalten und bereitstellen -- Learning Log gestalten -- Learning Log bereitstellen -- Zusammenfassung -- Nachwort -- Installation und Fehlerbehebung -- Python unter Windows -- Python unter macOS -- Python unter Linux -- Schlüsselwörter und integrierte Funktionen -- Texteditoren und IDEs -- Die Einstellungen von Sublime Text anpassen -- Weitere Texteditoren und IDEs -- Hilfe finden…”
Libro electrónico -
717por Ibañez Rodríguez, MargaritaTabla de Contenidos: “…EL ARTE EN ACCIÓN: LA FILOSOFÍA HACKER -- 10. CAMBIOS PRODUCIDOS EN EL ARTE POR SU INCLUSIÓN EN EL SISTEMA-RED -- 10.1. …”
Publicado 2012
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
718Publicado 2007“…Fuzzing has been around for a while, but is making a transition from hacker home-grown tool to commercial-grade quality assurance…”
Libro electrónico -
719Publicado 2007“…The EC-Council offers certification for ethical hacking and computer forensics. Their ethical hacker exam has become very popular as an industry gauge and we expect the forensics exam to follow suit. …”
Libro electrónico -
720por Upton, Eben“…Cowritten with Gareth Halfacree, this guide gets you up and running on Raspberry Pi, whether you're an educator, hacker, hobbyist, or kid. Learn how to connect your Pi to other hardware, install software, write bas…”
Publicado 2012
Libro electrónico