Mostrando 781 - 800 Resultados de 1,058 Para Buscar '"hacker"', tiempo de consulta: 0.07s Limitar resultados
  1. 781
    Publicado 2022
    “…He is listed among the top hackers at HackerOne. Dawid Czagan has found security vulnerabilities in Google, Yahoo, Mozilla, Microsoft, Twitter, and other companies. …”
    Video
  2. 782
    Publicado 2019
    “…Protect yourself from hackers and cyber attacks. Master penetration testing + build security and coding tools with Python. …”
    Video
  3. 783
    Publicado 2020
    Tabla de Contenidos: “…Intro -- The Art of Network Penetration Testing -- Copyright -- contents -- front matter -- preface -- acknowledgments -- about this book -- Who should read this book -- How this book is organized: A roadmap -- About the code -- liveBook discussion forum -- about the author -- about the cover illustration -- 1 Network penetration testing -- 1.1 Corporate data breaches -- 1.2 How hackers break in -- 1.2.1 The defender role -- 1.2.2 The attacker role -- 1.3 Adversarial attack simulation: Penetration testing -- 1.3.1 Typical INPT workflow -- 1.4 When a penetration test is least effective -- 1.4.1 Low-hanging fruit -- 1.4.2 When does a company really need a penetration test? …”
    Libro electrónico
  4. 784
    Publicado 2022
    “…"Argues that hacking provides a privileged vantage point for probing the logic of informational capitalism since hackers are at the forefront of structural transformations of late modernity"-- Provided by publisher…”
    Libro electrónico
  5. 785
    Publicado 2021
    “…The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to use it to their advantage. …”
    Libro electrónico
  6. 786
    por Henry, Kevin M.
    Publicado 2012
    “…This book is a preparation guide for the CPTE examination, yet is also a general reference for experienced penetration testers, ethical hackers, auditors, security personnel and anyone else involved in the security of an organization's computer systems…”
    Libro electrónico
  7. 787
    Publicado 2004
    “…"Examines where security holes come from, how to discover them, how hackers exploit them and take control of systems on a daily basis, and most importantly, how to close these security holes so they never occur again."…”
    Libro electrónico
  8. 788
    por Thomas, Thomas M.
    Publicado 2004
    “…But first, you need to make sense of this complex world of hackers, viruses, and the tools to combat them. No security experience needed! …”
    Libro electrónico
  9. 789
    Publicado 2023
    “…Once you've understood hacker goals and detection techniques, you'll learn about the ramifications of deep fakes, followed by mitigation strategies. …”
    Grabación no musical
  10. 790
    Publicado 2018
    “…Learn how to hack systems like black hat hackers and secure them like security experts Key Features Understand how computer systems work and their vulnerabilities Exploit weaknesses and hack into machines to test their security Learn how to secure systems from hackers Book Description This book starts with the basics of ethical hacking, how to practice hacking safely and legally, and how to install and interact with Kali Linux and the Linux terminal. …”
    Libro electrónico
  11. 791
    Publicado 2022
    “…You can put the kibosh on these hackers and their dirty deeds by hardening the walls that protect your data"…”
    Libro electrónico
  12. 792
    Publicado 2018
    “…By the end of the course you'll have mastered Ethical Hacking and will be able to easily pass the examination to be a Certified Ethical Hacker…”
    Video
  13. 793
    Publicado 2011
    “…Security Smarts for the Self-Guided IT Professional “Get to know the hackers—or plan on getting hacked. Sullivan and Liu have created a savvy, essentials-based approach to web app security packed with immediately applicable tools for any information security practitioner sharpening his or her tools or just starting out.” …”
    Libro electrónico
  14. 794
    Publicado 2003
    “…Maximum Security, Fourth Edition provides updated, comprehensive, platform-by-platform coverage of security issues, and includes clear, to the point descriptions of the most common techniques hackers use to penetrate systems. This book provides information for security administrators and others interested in computer and network security and provides them with techniques to take steps to protect their systems…”
    Libro electrónico
  15. 795
    Publicado 2018
    “…This is another free course provided by Hackers Academy…”
    Video
  16. 796
    “…Privileged Attack Vectors details the risks associated with poor privilege management, the techniques that hackers and insiders leverage, and the defensive measures that organizations must adopt to protect against a breach, protect against lateral movement, and improve the ability to detect hacker activity or insider threats in order to mitigate the impact. …”
    Libro electrónico
  17. 797
    Publicado 2010
    “…Sub-orbital rocketry! Renegade NASA hackers! Bouncing signals off the moon! Of course, as usual, we've got a full payload of other cool DIY projects to keep you busy while your computer joins in the search for signs of extraterrestrial intelligence…”
    Libro electrónico
  18. 798
    Publicado 2018
    “…Secure any Linux server from hackers and protect it against hacking. The practical Linux Administration security guide. …”
    Video
  19. 799
    Publicado 2012
    “…By the time you have completed this video tutorial for White Hat Hacking and Penetration testing, you will have a deeper understanding of the areas you may be potentially be vulnerable to attack in, as well as the methods that hackers use to exploit your systems, allowing you to better understand how to secure your hardware and data from unethical hackers…”
    Video
  20. 800
    por Klevinsky, T. J.
    Publicado 2002
    “…Through penetration testing, I.T. and security professionals can take action to prevent true "black hat" hackers from compromising systems and exploiting proprietary information. …”
    Libro electrónico