Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 250
- Security measures 231
- Computer networks 192
- Penetration testing (Computer security) 109
- Hackers 82
- Engineering & Applied Sciences 72
- Computer crimes 48
- Computer Science 44
- Hacking 43
- Internet 37
- Data protection 35
- Operating systems (Computers) 30
- Electrical & Computer Engineering 29
- Examinations 29
- Certification 27
- Prevention 27
- Kali Linux 26
- Telecommunications 26
- Computer hackers 24
- Electronic data processing personnel 24
- Computers 22
- Development 22
- Application software 20
- Information technology 19
- Management 19
- Linux 18
- Access control 17
- Web sites 17
- Computer software 16
- Microsoft Windows (Computer file) 15
-
761Publicado 2019“…Written for security engineers, hackers, and those with a basic working knowledge of C/C++ and x86-64, Practical Binary Analysis will teach you in-depth how binary programs work and help you acquire the tools and techniques needed to gain more control and insight into binary programs. …”
Libro electrónico -
762Publicado 2003“…Our new Hacks books are written in the spirit of the true hackers -- the people who drive innovation…”
Libro electrónico -
763Publicado 2008“…. • In 2004, known software weaknesses let a hacker invade T-Mobile, capturing everything from passwords to Paris Hilton’s photos... • In 2005, 23,900 Toyota Priuses were recalled for software errors that could cause the cars to shut down at highway speeds... • In 2006 dubbed “The Year of Cybercrime,” 7,000 software vulnerabilities were discovered that hackers could use to access private information... • In 2007, operatives in two nations brazenly exploited software vulnerabilities to cripple the infrastructure and steal trade secrets from other sovereign nations... …”
Libro electrónico -
764por McClure, Stuart“…--Lance Spitzner, Founder, The Honeynet Project Whether it's petty defacing or full-scale cyber robbery, hackers are moving to the Web along with everyone else. …”
Publicado 2002
Libro electrónico -
765Publicado 2023“…Whether you are concerned about protecting your mobile devices against malware and hackers or looking to build a foundation in cybersecurity, this course is designed to provide you with the knowledge and skills you need. …”
Video -
766Publicado 2024“…In a time when the average cyberattack costs a company $9.48 million, organizations are desperate for qualified database administrators and software professionals. Hackers are more innovative than ever before. Increased cybercrime means front-end applications and back-end databases must be finetuned for a strong security posture. …”
Libro electrónico -
767Publicado 2022“…What strategies are enabling technology leaders to thrive in this fast-changing landscape and stay calm in the midst of a world filled with ransomware, online deception, and nation-state hackers? The Day After Mayday is a business book, a communication toolkit offering stories, strategies, tactics, and outlook with key extracts and lessons learned from top C-executive leaders around the world. …”
Libro electrónico -
768Publicado 2018“…What You Will Learn Work with virtual machines and Kali Linux Carry out penetration testing of your operating systems Bypass Windows Defender and other antivirus software Use key website and network attacks Who This Video Is For Network security experts, web security specialists, application security experts, penetration testers, and ethical hackers…”
-
769Publicado 2017“…Many organizations operate mission critical systems with the help of open source libraries, unaware that some of these libraries include vulnerabilities that hackers can easily exploit. This type of vulnerability led to the 2017 Equifax breach. …”
Libro electrónico -
770Publicado 2022“…This book uses a hand-on approach to teach you how to write secure web applications and will highlight how hackers attack applications along with a broad arsenal of defenses. …”
Libro electrónico -
771Publicado 2020“…The International Journal of Proof-of-Concept or Get The Fuck Out is a celebrated collection of short essays on computer security, reverse engineering and retrocomputing topics by many of the world's most famous hackers. The journal covers topics like reverse engineering, retro-computing, and systems internals. …”
Libro electrónico -
772Publicado 2019“…The combatants are citizens, activists, politicians, pundits, coders, conspiracists, trolls, agitators, hackers, and journalists. At stake are the nation's bedrock principles: equal rights, fair elections, freedom of speech, racial justice, and the rule of law. …”
Grabación no musical -
773Publicado 2024“…This book gives clear instructions for deploying a great defense-in-depth strategy to defeat hackers and malware. Written by the lead data-driven defense evangelist at the world's number one anti-phishing company, KnowBe4, Inc., this guide shows you how to create an enduring, integrated cybersecurity culture. - Learn what social engineering and phishing are, why they are so dangerous to your cybersecurity, and how to defend against them - Educate yourself and other users on how to identify and avoid phishing scams, to stop attacks before they begin - Discover the latest tools and strategies for locking down data when phishing has taken place, and stop breaches from spreading - Develop technology and security policies that protect your organization against the most common types of social engineering and phishing…”
Grabación no musical -
774Publicado 2018“…The first stop for your security needs when using Go, covering host, network, and cloud security for ethical hackers and defense against intrusion About This Book First introduction to Security with Golang Adopting a Blue Team/Red Team approach Take advantage of speed and inherent safety of Golang Works as an introduction to security for Golang developers Works as a guide to Golang security packages for recent Golang beginners Who This Book Is For Security with Go is aimed at developers with basics in Go to the level that they can write their own scripts and small programs without difficulty. …”
Libro electrónico -
775Publicado 2020“…But in today's increasingly complex business environment, serving on a board also means working to address detailed issues such as increasing diversity on the board itself and in the organization, ensuring a risk-mitigation plan that prepares the organization for everything from hackers to sexual predators, and navigating big-picture challenges such as the unprecedented pace of change and disruption-all while managing financials and shareholder expectations.We've combed through hundreds of articles in the Harvard Business Review archive and selected the ten most important ones to help you address classic challenges such as increasing diversity, ensuring a culture that reflects company values, and providing strategic oversight while also addressing emerging issues such as shareholder activism, cybersecurity, and ever-shifting regulations…”
Grabación musical -
776por Ellis, Sean“…It seems hard to believe today, but there was a time when Air Bnb was the best-kept secret known of travel hackers and couch surfers, Pintrest was a niche web site frequented only by bakers and crafters, LinkedIn was an exclusive network for C-suite executives and top-level recruiters, Facebook was My Space's sorry step-brother, and Uber was a scrappy upstart that didn't stand a chance against the Goliath that was New York City Yellow Cabs. …”
Publicado 2017
Libro electrónico -
777Publicado 2008“…The trade secrets of hackers he shares with us are mind boggling! You won’t let your guard down after learning what Jim has actually done to get companies and individuals' private information. …”
Libro electrónico -
778por Wheat, Dale“…Arduino Internals also suggests alternative programming environments, since many Arduino hackers have a background language other than C or Java. …”
Publicado 2011
Libro electrónico -
779Publicado 2023“…By the end of the course, you will be able to defeat hackers and malware and also ensure your privacy online. …”
Video -
780Publicado 2017“…Get your slice of Raspberry Pi With the invention of the unique credit card-sized single-board computer comes a new wave of hardware geeks, hackers, and hobbyists who are excited about the possibilities with the Raspberry Pi—and this is the perfect guide to get you started. …”
Libro electrónico