Mostrando 801 - 820 Resultados de 1,058 Para Buscar '"hacker"', tiempo de consulta: 0.08s Limitar resultados
  1. 801
    Publicado 2018
    “…Hackers reinvent themselves using new technology features as a tool to expose companies and individuals. …”
    Libro electrónico
  2. 802
    por Carrott, James H.
    Publicado 2013
    “…In this book, futurist Brian David Johnson and cultural historian James Carrott explore steampunk, a cultural movement that’s captivated thousands of artists, designers, makers, hackers, and writers throughout the world…”
    Libro electrónico
  3. 803
    Publicado 2023
    “…Emerging generative AI technologies such as ChatGPT are putting new tools in the hands of hackers. Companies will need to shift from traditional defensive tools and rule-based strategies to respond to next-level AI-generated threats in real time. …”
    Libro electrónico
  4. 804
    por Carr, Jeffrey
    Publicado 2012
    “…You'll discover how sophisticated hackers working on behalf of states or organized crime patiently play a high-stakes game that could target anyone, regardless of affiliation or nationality. …”
    Libro electrónico
  5. 805
    Publicado 2020
    “…Finally, you’ll learn how to develop mitigations for use in your own web applications to protect against hackers. Explore common vulnerabilities plaguing today's web applications Learn essential hacking techniques attackers use to exploit applications Map and document web applications for which you don’t have direct access Develop and deploy customized exploits that can bypass common defenses Develop and deploy mitigations to protect your applications against hackers Integrate secure coding best practices into your development lifecycle Get practical tips to help you improve the overall security of your web applications…”
    Libro electrónico
  6. 806
    Cloud security for dummies
    Cloud Security For Dummies
    Publicado 2022
    “…Embrace the cloud and kick hackers to the curb with this accessible guide on cloud security Cloud technology has changed the way we approach technology. …”
    Libro electrónico
  7. 807
    por Akin, Thomas
    Publicado 2002
    “…The rational is simple: If the router protecting a network is exposed to hackers, then so is the network behind it. Hardening Cisco Routers is a reference for protecting the protectors. …”
    Libro electrónico
  8. 808
    Publicado 2006
    “…Next, the book uncovers spyware's intricate economy and network of malicious hackers and criminals. Forensic investigations presented i…”
    Libro electrónico
  9. 809
    por Liu, Dale
    Publicado 2009
    “…This widespread distribution, as well as its architectural deficiencies, makes it a valuable target for hackers looking to attack a corporate or private network infrastructure. …”
    Libro electrónico
  10. 810
    por Shimonski, Robert
    Publicado 2013
    “… The Wireshark Field Guide provides hackers, pen testers, and network administrators with practical guidance on capturing and interactively browsing computer network traffic. …”
    Libro electrónico
  11. 811
    Publicado 2022
    “…It starts on the dark side, exploring case studies of cross-site scripting, SQL injection, and other weapons used by hackers. As you go, you’ll learn how to implement countermeasures, activate browser security features, minimize attack damage, and securely store application secrets. …”
    Grabación no musical
  12. 812
    Publicado 2022
    “…It starts on the dark side, exploring case studies of cross-site scripting, SQL injection, and other weapons used by hackers. As you go, you’ll learn how to implement countermeasures, activate browser security features, minimize attack damage, and securely store application secrets. …”
    Vídeo online
  13. 813
    por PELTIER, THOMAS R.
    Publicado 2017
    “…The instant access that hackers have to the latest tools and techniques demands that companies become more aggressive in defending the security of their networks. …”
    Libro electrónico
  14. 814
    Publicado 2015
    “…In many cases, the first stage of any security assessment-that is, reconnaissance-is not given enough attention by security professionals, hackers, and penetration testers. Often, the information openly present is as critical as the confidential data. …”
    Libro electrónico
  15. 815
    por Cache, Johnny
    Publicado 2010
    “…"Filled with tactical security information, Hacking Exposed Wireless, Second Edition sheds light on how hackers zero in on susceptible networks and peripherals, gain access, and execute debilitating attacks. …”
    Libro electrónico
  16. 816
    Publicado 2022
    “…Remote working has given hackers plenty of opportunities as more confidential information is shared over the internet than ever before. …”
    Libro electrónico
  17. 817
    Publicado 2007
    “…A cross site scripting attack is a very specific type of attack on a web application. It is used by hackers to mimic real sites and fool people into providing personal data.Cross Site Scripting Attacks starts by defining the terms and laying out the ground work. …”
    Libro electrónico
  18. 818
    por Harrington, Jan L.
    Publicado 2005
    “…It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay.You get all the hands-on technical advice you need to succeed, but also higher-level administrative guidance for developing an effective security policy. …”
    Libro electrónico
  19. 819
    Publicado 2007
    “…* Ninety percent of the world's PCs run Windows, making Vista a prime target for malicious hackers * Helps readers get the most out of new Vista security features by detailing the vulnerabilities that have already been found in Vista and explains how to combat potential problems * Identifies possible threats brought on by the millions of lines of brand-new code in the operating system and risky new features, including IPv6 and peer-to-peer support * Covers the Windows Security Center, rights management, BitLocker, Web security, and much more…”
    Libro electrónico
  20. 820
    Publicado 2008
    “…This is no small task considering the market saturation of Windows Server and the rate at which it is attacked by malicious hackers. According to IDC, Windows Server runs 38% of a…”
    Libro electrónico