Mostrando 761 - 780 Resultados de 942 Para Buscar '"hacker"', tiempo de consulta: 0.07s Limitar resultados
  1. 761
    Publicado 2019
    “…Written for security engineers, hackers, and those with a basic working knowledge of C/C++ and x86-64, Practical Binary Analysis will teach you in-depth how binary programs work and help you acquire the tools and techniques needed to gain more control and insight into binary programs. …”
    Libro electrónico
  2. 762
    Publicado 2003
    “…Our new Hacks books are written in the spirit of the true hackers -- the people who drive innovation…”
    Libro electrónico
  3. 763
    Publicado 2008
    “…. • In 2004, known software weaknesses let a hacker invade T-Mobile, capturing everything from passwords to Paris Hilton’s photos... • In 2005, 23,900 Toyota Priuses were recalled for software errors that could cause the cars to shut down at highway speeds... • In 2006 dubbed “The Year of Cybercrime,” 7,000 software vulnerabilities were discovered that hackers could use to access private information... • In 2007, operatives in two nations brazenly exploited software vulnerabilities to cripple the infrastructure and steal trade secrets from other sovereign nations... …”
    Libro electrónico
  4. 764
    por McClure, Stuart
    Publicado 2002
    “…--Lance Spitzner, Founder, The Honeynet Project Whether it's petty defacing or full-scale cyber robbery, hackers are moving to the Web along with everyone else. …”
    Libro electrónico
  5. 765
    Publicado 2023
    “…Whether you are concerned about protecting your mobile devices against malware and hackers or looking to build a foundation in cybersecurity, this course is designed to provide you with the knowledge and skills you need. …”
    Video
  6. 766
    Publicado 2024
    “…In a time when the average cyberattack costs a company $9.48 million, organizations are desperate for qualified database administrators and software professionals. Hackers are more innovative than ever before. Increased cybercrime means front-end applications and back-end databases must be finetuned for a strong security posture. …”
    Libro electrónico
  7. 767
    Publicado 2022
    “…What strategies are enabling technology leaders to thrive in this fast-changing landscape and stay calm in the midst of a world filled with ransomware, online deception, and nation-state hackers? The Day After Mayday is a business book, a communication toolkit offering stories, strategies, tactics, and outlook with key extracts and lessons learned from top C-executive leaders around the world. …”
    Libro electrónico
  8. 768
    Publicado 2018
    “…What You Will Learn Work with virtual machines and Kali Linux Carry out penetration testing of your operating systems Bypass Windows Defender and other antivirus software Use key website and network attacks Who This Video Is For Network security experts, web security specialists, application security experts, penetration testers, and ethical hackers…”
    Video
  9. 769
    Publicado 2017
    “…Many organizations operate mission critical systems with the help of open source libraries, unaware that some of these libraries include vulnerabilities that hackers can easily exploit. This type of vulnerability led to the 2017 Equifax breach. …”
    Libro electrónico
  10. 770
    Publicado 2022
    “…This book uses a hand-on approach to teach you how to write secure web applications and will highlight how hackers attack applications along with a broad arsenal of defenses. …”
    Libro electrónico
  11. 771
    Publicado 2020
    “…The International Journal of Proof-of-Concept or Get The Fuck Out is a celebrated collection of short essays on computer security, reverse engineering and retrocomputing topics by many of the world's most famous hackers. The journal covers topics like reverse engineering, retro-computing, and systems internals. …”
    Libro electrónico
  12. 772
    Publicado 2019
    “…The combatants are citizens, activists, politicians, pundits, coders, conspiracists, trolls, agitators, hackers, and journalists. At stake are the nation's bedrock principles: equal rights, fair elections, freedom of speech, racial justice, and the rule of law. …”
    Grabación no musical
  13. 773
    Publicado 2024
    “…This book gives clear instructions for deploying a great defense-in-depth strategy to defeat hackers and malware. Written by the lead data-driven defense evangelist at the world's number one anti-phishing company, KnowBe4, Inc., this guide shows you how to create an enduring, integrated cybersecurity culture. - Learn what social engineering and phishing are, why they are so dangerous to your cybersecurity, and how to defend against them - Educate yourself and other users on how to identify and avoid phishing scams, to stop attacks before they begin - Discover the latest tools and strategies for locking down data when phishing has taken place, and stop breaches from spreading - Develop technology and security policies that protect your organization against the most common types of social engineering and phishing…”
    Grabación no musical
  14. 774
    Publicado 2018
    “…The first stop for your security needs when using Go, covering host, network, and cloud security for ethical hackers and defense against intrusion About This Book First introduction to Security with Golang Adopting a Blue Team/Red Team approach Take advantage of speed and inherent safety of Golang Works as an introduction to security for Golang developers Works as a guide to Golang security packages for recent Golang beginners Who This Book Is For Security with Go is aimed at developers with basics in Go to the level that they can write their own scripts and small programs without difficulty. …”
    Libro electrónico
  15. 775
    Publicado 2020
    “…But in today's increasingly complex business environment, serving on a board also means working to address detailed issues such as increasing diversity on the board itself and in the organization, ensuring a risk-mitigation plan that prepares the organization for everything from hackers to sexual predators, and navigating big-picture challenges such as the unprecedented pace of change and disruption-all while managing financials and shareholder expectations.We've combed through hundreds of articles in the Harvard Business Review archive and selected the ten most important ones to help you address classic challenges such as increasing diversity, ensuring a culture that reflects company values, and providing strategic oversight while also addressing emerging issues such as shareholder activism, cybersecurity, and ever-shifting regulations…”
    Grabación musical
  16. 776
    por Ellis, Sean
    Publicado 2017
    “…It seems hard to believe today, but there was a time when Air Bnb was the best-kept secret known of travel hackers and couch surfers, Pintrest was a niche web site frequented only by bakers and crafters, LinkedIn was an exclusive network for C-suite executives and top-level recruiters, Facebook was My Space's sorry step-brother, and Uber was a scrappy upstart that didn't stand a chance against the Goliath that was New York City Yellow Cabs. …”
    Libro electrónico
  17. 777
    Publicado 2008
    “…The trade secrets of hackers he shares with us are mind boggling! You won’t let your guard down after learning what Jim has actually done to get companies and individuals' private information. …”
    Libro electrónico
  18. 778
    por Wheat, Dale
    Publicado 2011
    “…Arduino Internals also suggests alternative programming environments, since many Arduino hackers have a background language other than C or Java. …”
    Libro electrónico
  19. 779
    Publicado 2023
    “…By the end of the course, you will be able to defeat hackers and malware and also ensure your privacy online. …”
    Video
  20. 780
    Publicado 2017
    “…Get your slice of Raspberry Pi With the invention of the unique credit card-sized single-board computer comes a new wave of hardware geeks, hackers, and hobbyists who are excited about the possibilities with the Raspberry Pi—and this is the perfect guide to get you started. …”
    Libro electrónico