Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 249
- Security measures 231
- Computer networks 192
- Penetration testing (Computer security) 109
- Hackers 82
- Engineering & Applied Sciences 72
- Computer crimes 47
- Computer Science 44
- Hacking 43
- Internet 37
- Data protection 35
- Operating systems (Computers) 30
- Electrical & Computer Engineering 29
- Examinations 29
- Certification 27
- Prevention 27
- Kali Linux 26
- Telecommunications 26
- Electronic data processing personnel 24
- Computer hackers 23
- Computers 22
- Development 22
- Application software 20
- Wittgenstein, Ludwig 20
- Historia 19
- Information technology 19
- Management 19
- Linux 18
- Access control 17
- Web sites 17
-
781Publicado 2022“…He is listed among the top hackers at HackerOne. Dawid Czagan has found security vulnerabilities in Google, Yahoo, Mozilla, Microsoft, Twitter, and other companies. …”
Video -
782Publicado 2019“…Protect yourself from hackers and cyber attacks. Master penetration testing + build security and coding tools with Python. …”
-
783Publicado 2020Tabla de Contenidos: “…Intro -- The Art of Network Penetration Testing -- Copyright -- contents -- front matter -- preface -- acknowledgments -- about this book -- Who should read this book -- How this book is organized: A roadmap -- About the code -- liveBook discussion forum -- about the author -- about the cover illustration -- 1 Network penetration testing -- 1.1 Corporate data breaches -- 1.2 How hackers break in -- 1.2.1 The defender role -- 1.2.2 The attacker role -- 1.3 Adversarial attack simulation: Penetration testing -- 1.3.1 Typical INPT workflow -- 1.4 When a penetration test is least effective -- 1.4.1 Low-hanging fruit -- 1.4.2 When does a company really need a penetration test? …”
Libro electrónico -
784Publicado 2022“…"Argues that hacking provides a privileged vantage point for probing the logic of informational capitalism since hackers are at the forefront of structural transformations of late modernity"-- Provided by publisher…”
Libro electrónico -
785Publicado 2021“…The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to use it to their advantage. …”
Libro electrónico -
786por Henry, Kevin M.“…This book is a preparation guide for the CPTE examination, yet is also a general reference for experienced penetration testers, ethical hackers, auditors, security personnel and anyone else involved in the security of an organization's computer systems…”
Publicado 2012
Libro electrónico -
787Publicado 2004“…"Examines where security holes come from, how to discover them, how hackers exploit them and take control of systems on a daily basis, and most importantly, how to close these security holes so they never occur again."…”
Libro electrónico -
788por Thomas, Thomas M.“…But first, you need to make sense of this complex world of hackers, viruses, and the tools to combat them. No security experience needed! …”
Publicado 2004
Libro electrónico -
789Publicado 2023“…Once you've understood hacker goals and detection techniques, you'll learn about the ramifications of deep fakes, followed by mitigation strategies. …”
Grabación no musical -
790Publicado 2018“…Learn how to hack systems like black hat hackers and secure them like security experts Key Features Understand how computer systems work and their vulnerabilities Exploit weaknesses and hack into machines to test their security Learn how to secure systems from hackers Book Description This book starts with the basics of ethical hacking, how to practice hacking safely and legally, and how to install and interact with Kali Linux and the Linux terminal. …”
Libro electrónico -
791Publicado 2022“…You can put the kibosh on these hackers and their dirty deeds by hardening the walls that protect your data"…”
Libro electrónico -
792Publicado 2018“…By the end of the course you'll have mastered Ethical Hacking and will be able to easily pass the examination to be a Certified Ethical Hacker…”
-
793Publicado 2011“…Security Smarts for the Self-Guided IT Professional “Get to know the hackers—or plan on getting hacked. Sullivan and Liu have created a savvy, essentials-based approach to web app security packed with immediately applicable tools for any information security practitioner sharpening his or her tools or just starting out.” …”
Libro electrónico -
794Publicado 2003“…Maximum Security, Fourth Edition provides updated, comprehensive, platform-by-platform coverage of security issues, and includes clear, to the point descriptions of the most common techniques hackers use to penetrate systems. This book provides information for security administrators and others interested in computer and network security and provides them with techniques to take steps to protect their systems…”
Libro electrónico -
795Publicado 2018“…This is another free course provided by Hackers Academy…”
-
796“…Privileged Attack Vectors details the risks associated with poor privilege management, the techniques that hackers and insiders leverage, and the defensive measures that organizations must adopt to protect against a breach, protect against lateral movement, and improve the ability to detect hacker activity or insider threats in order to mitigate the impact. …”
Libro electrónico -
797Publicado 2010“…Sub-orbital rocketry! Renegade NASA hackers! Bouncing signals off the moon! Of course, as usual, we've got a full payload of other cool DIY projects to keep you busy while your computer joins in the search for signs of extraterrestrial intelligence…”
Libro electrónico -
798Publicado 2018“…Secure any Linux server from hackers and protect it against hacking. The practical Linux Administration security guide. …”
-
799Publicado 2012“…By the time you have completed this video tutorial for White Hat Hacking and Penetration testing, you will have a deeper understanding of the areas you may be potentially be vulnerable to attack in, as well as the methods that hackers use to exploit your systems, allowing you to better understand how to secure your hardware and data from unethical hackers…”
-
800por Klevinsky, T. J.“…Through penetration testing, I.T. and security professionals can take action to prevent true "black hat" hackers from compromising systems and exploiting proprietary information. …”
Publicado 2002
Libro electrónico