Mostrando 721 - 740 Resultados de 942 Para Buscar '"hacker"', tiempo de consulta: 0.07s Limitar resultados
  1. 721
    por Hyde, Randall
    Publicado 2010
    “…Widely respected by hackers of all kinds, The Art of Assembly Language teaches programmers how to understand assembly language and how to use it to write powerful, efficient code. …”
    Libro electrónico
  2. 722
    por Chandra, Praphul
    Publicado 2005
    “…As a result, truly ""bulletproof"" wireless security is now more than a desirable feature--instead, it's a necessity to protect essential personal and business data from hackers and eavesdroppers.In this handy reference, Praphul Chandra gives you the conceptual and practical tools every RF, wireless, and network engineer needs for high-security wireless ap…”
    Libro electrónico
  3. 723
    Publicado 2025
    “…With large print and clear figures, you'll learn essential tasks like emailing, browsing the internet, creating and viewing digital photos, and staying safe from hackers and viruses. In no time you'll be shopping online and video calling family from across the country…”
    Libro electrónico
  4. 724
    Publicado 2015
    “… Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company's secrets. …”
    Libro electrónico
  5. 725
    Publicado 2010
    “…This easy-to-follow tutorial is ideal for designers, artists, hackers, makers, and anyone interested in creating sensor-based systems. …”
    Video
  6. 726
    Publicado 2021
    “…From Stephen Levy-the author who made "hackers" a household word-comes this account of a revolution that is already affecting every citizen in the twenty-first century. …”
    Grabación no musical
  7. 727
    Publicado 2022
    “…Keep yourself and your company out of the news by protecting your Linux systems from hackers, crackers, and attackers! This course will not only teach you the security concepts and guidelines that will keep your Linux servers safe, it will walk you through hardening measures step-by-step. …”
    Video
  8. 728
    Publicado 2022
    “…Welcome to Audio Learning from Assemble You. Hackers conduct cyber attacks to steal information, sabotage one or more systems, or bring down a working network. …”
    Grabación no musical
  9. 729
    Publicado 2020
    “…Vivirás una historia excitante llena de hackers, especulación y movimientos políticos disruptores. …”
    Libro
  10. 730
    Publicado 2024
    “…In the third edition of this book, cyber intelligence expert Jeffrey Caruso explores the latest developments in cyber espionage and warfare, including the growing role of civilian hackers, the use of social media for nefarious purposes, and the targeting of nonmilitary infrastructure. …”
    Libro electrónico
  11. 731
    Publicado 2024
    “…Learn how to write code for authentication for WebAPI security so they can be secured from unauthorized access of outsiders, hackers or users. The video starts with an introduction about API security where you will learn what is authentication and various ways to authenticate an API. …”
    Vídeo online
  12. 732
    Publicado 2017
    “…He holds the LPIC-1, Linux+, SUSE CLA Linux Administrator, Network+, A+, Security+, Solaris Administrator, and Certified Ethical Hacker certifications…”
    Video
  13. 733
    Publicado 2015
    “…Human nature – easy prey for hackers? Human behaviour is complex and inconsistent, making it a rich hunting ground for would-be hackers and a significant risk to the security of your organization . …”
    Libro electrónico
  14. 734
    Publicado 2022
    “…El viernes 25 de noviembre de 2022, los equipos participantes de la III edición de #hack4edu, presentan sus proyectos tras 48 horas de trabajo en el hackatón organizado por ProFuturo y la Universidad Pontificia de Salamanca, con la colaboración de Cátedras Telefónica y las universidades adheridas. Más de 100 hackers de 12 universidades y 6 países, compartirán las soluciones tecnológicas desarrolladas para los más de 25 retos planteados. …”
    Acceso desde SUMMA.
    Video
  15. 735
    Publicado 2022
    “…No one can escape this wave and be immune to security attacks, which continue to evolve, gradually reducing the level of expertise needed by hackers. It is high time for each and every user to acquire basic knowledge of computer security, which would enable them to mitigate the threats they may face both personally and professionally. …”
    Libro electrónico
  16. 736
    Publicado 2017
    “…Our connected world today generates unimaginable volumes of data, and sometimes that information can be the key to helping law enforcement and corporate investigators solve crimes or reveal intrusions by hackers into a network. Memory analysis is important for incident responders and cases for which there is essential evidence that could be lost when a system is powered off. …”
    Video
  17. 737
    Publicado 2022
    “…Tras la sesión inaugural y durante 48 horas, los días 23 y 24 de noviembre, más de 100 hackers de 12 universidades y 6 países trabajarán en equipos para resolver alguno de los más de 25 retos planteados. …”
    Acceso desde Summa.
    Video
  18. 738
    Publicado 2017
    “…The workbenches of hobbyists, hackers, and makers have become overrun with microcontrollers , computers-on-a-chip that power homebrewed video games, robots, toys, and more. …”
    Libro electrónico
  19. 739
    por Di Cataldo, Giuseppe. author
    Publicado 2016
    “…You will learn how it is manipulated to take control of a computer system, as well as the countermeasures that system designers set up to avoid this. Neither a guide for hackers nor an all-out theory book, this book is ideal for anyone studying computer security who wants to learn by doing. …”
    Libro electrónico
  20. 740
    Publicado 2017
    Tabla de Contenidos: “…-- -- List of Contributors xix -- Foreword xxiii -- Preface xxvii -- Acknowledgments xxix -- Part I INTERNET OF THINGS 1 -- 1 Internet of Things and Data Analytics in the Cloud with Innovation and Sustainability 3 /Hwaiyu Geng -- 1.1 Introduction 3 -- 1.2 The IoT and the Fourth Industrial Revolution 4 -- 1.3 Internet of Things Technology 6 -- 1.4 Standards and Protocols 11 -- 1.5 IoT Ecosystem 11 -- 1.6 Definition of Big Data 13 -- 1.7 IoT, Data Analytics, and Cloud Computing 18 -- 1.8 Creativity, Invention, Innovation, and Disruptive Innovation 18 -- 1.9 Polya's “How to Solve it” 20 -- 1.10 Business Plan and Business Model 20 -- 1.11 Conclusion and Future Perspectives 23 -- 2 Digital Services and Sustainable Solutions 29 /Rikke Gram-Hansen -- 2.1 Introduction 29 -- 2.2 Why IoT is not Just “Nice to Have” 30 -- 2.3 Services in a Digital Revolution 32 -- 2.4 Mobile Digital Services and the Human Sensor 32 -- 2.5 Not Just Another App 33 -- 2.6 The Hidden Life of Things 34 -- 2.7 The Umbrellas are not what they Seem 35 -- 2.8 Interacting with the Invisible 36 -- 2.9 Society as Open Source 36 -- 2.10 Learn from your Hackers 37 -- 2.11 Ensuring High-Quality Services to Citizens 37 -- 2.12 Government as a Platform 38 -- 2.13 Conclusion 38 -- 3 The Industrial Internet of Things (Iiot): Applications and Taxonomy 41 /Stan Schneider -- 3.1 Introduction to the IioT 41 -- 3.2 Some Examples of Iiot Applications 43 -- 3.3 Toward a Taxonomy of the Iiot 52 -- 3.4 Standards and Protocols for Connectivity 66 -- 3.5 Connectivity Architecture for the Iiot 73 -- 3.6 Data-Centricity Makes Dds Different 79 -- 3.7 The Future of the Iiot 80 -- 4 Strategic Planning for Smarter Cities 83 /Jonathan Reichental -- 4.1 Introduction 83 -- 4.2 What is a Smart City? …”
    Libro electrónico