Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 250
- Security measures 231
- Computer networks 192
- Penetration testing (Computer security) 109
- Hackers 82
- Engineering & Applied Sciences 72
- Computer crimes 48
- Computer Science 44
- Hacking 43
- Internet 37
- Data protection 35
- Operating systems (Computers) 30
- Electrical & Computer Engineering 29
- Examinations 29
- Certification 27
- Prevention 27
- Kali Linux 26
- Telecommunications 26
- Computer hackers 24
- Electronic data processing personnel 24
- Computers 22
- Development 22
- Application software 20
- Information technology 19
- Management 19
- Linux 18
- Access control 17
- Web sites 17
- Computer software 16
- Microsoft Windows (Computer file) 15
-
61Publicado 2014“…Defend against today's most devious attacks Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit , Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. …”
Libro electrónico -
62Publicado 2019Materias: “…Hackers…”
Libro electrónico -
63Publicado 2020“…Tribe of hackers…”
Libro electrónico -
64por Coleman, Gabriella“…Here is the ultimate book on the worldwide movement of hackers, pranksters, and activists that operates under the non-name Anonymous, by the writer the Huffington Post says "knows all of [Anonymous's] deepest, darkest secrets."…”
Publicado 2017
Grabación no musical -
65Publicado 2023“…Hacker culture can be esoteric, but this entertaining reference is here to help. …”
Libro electrónico -
66Publicado 2024Materias:Libro electrónico
-
67
-
68Publicado 2019Materias: “…hacker…”
Libro electrónico -
69
-
70por Gutiérrez Salazar, PabloTabla de Contenidos: “…EL LIBRO BLANCO DEL HACKER (2A. ED.) -- PÁGINA LEGAL -- ÍNDICE -- INTRODUCCIÓN -- ¿PARA QUIÉN ES ESTE LIBRO? …”
Publicado 2019
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
71Publicado 2021“…Simulate real-world attacks using tactics, techniques, and procedures that adversaries use during cloud breachesKey Features:Understand the different Azure attack techniques and methodologies used by hackersFind out how you can ensure end-to-end cybersecurity in the Azure ecosystemDiscover various tools and techniques to perform successful penetration tests on your Azure infrastructureBook Description:Security professionals working with Azure will be able to put their knowledge to work with this practical guide to penetration testing. …”
Libro electrónico -
72Publicado 2017Libro electrónico
-
73
-
74por Himanen, Pekka
Publicado 2001Biblioteca Pública Episcopal del Seminario de Barcelona (Otras Fuentes: Biblioteca Universitat Ramon Llull)Libro -
75
-
76Publicado 2018Tabla de Contenidos: “…The hacker generation -- Hacker leadership -- The agile organization -- The hack and the gift -- Making space for innovation -- Happy hacker teams -- Hacking whole systems…”
Libro electrónico -
77
-
78Publicado 2024“…Whether you're a developer, security professional, or ethical hacker, this book will ensure that your APIs are secure and your organization's data is protected. …”
Libro electrónico -
79
-
80