Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 249
- Security measures 231
- Computer networks 192
- Penetration testing (Computer security) 109
- Hackers 82
- Engineering & Applied Sciences 72
- Computer crimes 47
- Computer Science 44
- Hacking 43
- Internet 37
- Data protection 35
- Operating systems (Computers) 30
- Electrical & Computer Engineering 29
- Examinations 29
- Certification 27
- Prevention 27
- Kali Linux 26
- Telecommunications 26
- Electronic data processing personnel 24
- Computer hackers 23
- Computers 22
- Development 22
- Application software 20
- Wittgenstein, Ludwig 20
- Historia 19
- Information technology 19
- Management 19
- Linux 18
- Access control 17
- Web sites 17
-
801Publicado 2018“…Hackers reinvent themselves using new technology features as a tool to expose companies and individuals. …”
Libro electrónico -
802por Carrott, James H.“…In this book, futurist Brian David Johnson and cultural historian James Carrott explore steampunk, a cultural movement that’s captivated thousands of artists, designers, makers, hackers, and writers throughout the world…”
Publicado 2013
Libro electrónico -
803Publicado 2023“…Emerging generative AI technologies such as ChatGPT are putting new tools in the hands of hackers. Companies will need to shift from traditional defensive tools and rule-based strategies to respond to next-level AI-generated threats in real time. …”
Libro electrónico -
804por Carr, Jeffrey“…You'll discover how sophisticated hackers working on behalf of states or organized crime patiently play a high-stakes game that could target anyone, regardless of affiliation or nationality. …”
Publicado 2012
Libro electrónico -
805Publicado 2020“…Finally, you’ll learn how to develop mitigations for use in your own web applications to protect against hackers. Explore common vulnerabilities plaguing today's web applications Learn essential hacking techniques attackers use to exploit applications Map and document web applications for which you don’t have direct access Develop and deploy customized exploits that can bypass common defenses Develop and deploy mitigations to protect your applications against hackers Integrate secure coding best practices into your development lifecycle Get practical tips to help you improve the overall security of your web applications…”
Libro electrónico -
806Cloud security for dummiesCloud Security For DummiesPublicado 2022“…Embrace the cloud and kick hackers to the curb with this accessible guide on cloud security Cloud technology has changed the way we approach technology. …”
Libro electrónico -
807por Akin, Thomas“…The rational is simple: If the router protecting a network is exposed to hackers, then so is the network behind it. Hardening Cisco Routers is a reference for protecting the protectors. …”
Publicado 2002
Libro electrónico -
808Publicado 2006“…Next, the book uncovers spyware's intricate economy and network of malicious hackers and criminals. Forensic investigations presented i…”
Libro electrónico -
809por Liu, Dale“…This widespread distribution, as well as its architectural deficiencies, makes it a valuable target for hackers looking to attack a corporate or private network infrastructure. …”
Publicado 2009
Libro electrónico -
810por Shimonski, Robert“… The Wireshark Field Guide provides hackers, pen testers, and network administrators with practical guidance on capturing and interactively browsing computer network traffic. …”
Publicado 2013
Libro electrónico -
811Publicado 2022“…It starts on the dark side, exploring case studies of cross-site scripting, SQL injection, and other weapons used by hackers. As you go, you’ll learn how to implement countermeasures, activate browser security features, minimize attack damage, and securely store application secrets. …”
Grabación no musical -
812Publicado 2022“…It starts on the dark side, exploring case studies of cross-site scripting, SQL injection, and other weapons used by hackers. As you go, you’ll learn how to implement countermeasures, activate browser security features, minimize attack damage, and securely store application secrets. …”
Vídeo online -
813por PELTIER, THOMAS R.“…The instant access that hackers have to the latest tools and techniques demands that companies become more aggressive in defending the security of their networks. …”
Publicado 2017
Libro electrónico -
814Publicado 2015“…In many cases, the first stage of any security assessment-that is, reconnaissance-is not given enough attention by security professionals, hackers, and penetration testers. Often, the information openly present is as critical as the confidential data. …”
Libro electrónico -
815por Cache, Johnny“…"Filled with tactical security information, Hacking Exposed Wireless, Second Edition sheds light on how hackers zero in on susceptible networks and peripherals, gain access, and execute debilitating attacks. …”
Publicado 2010
Libro electrónico -
816Publicado 2022“…Remote working has given hackers plenty of opportunities as more confidential information is shared over the internet than ever before. …”
Libro electrónico -
817Publicado 2007“…A cross site scripting attack is a very specific type of attack on a web application. It is used by hackers to mimic real sites and fool people into providing personal data.Cross Site Scripting Attacks starts by defining the terms and laying out the ground work. …”
Libro electrónico -
818por Harrington, Jan L.“…It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay.You get all the hands-on technical advice you need to succeed, but also higher-level administrative guidance for developing an effective security policy. …”
Publicado 2005
Libro electrónico -
819Publicado 2007“…* Ninety percent of the world's PCs run Windows, making Vista a prime target for malicious hackers * Helps readers get the most out of new Vista security features by detailing the vulnerabilities that have already been found in Vista and explains how to combat potential problems * Identifies possible threats brought on by the millions of lines of brand-new code in the operating system and risky new features, including IPv6 and peer-to-peer support * Covers the Windows Security Center, rights management, BitLocker, Web security, and much more…”
Libro electrónico -
820Publicado 2008“…This is no small task considering the market saturation of Windows Server and the rate at which it is attacked by malicious hackers. According to IDC, Windows Server runs 38% of a…”
Libro electrónico