Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 249
- Security measures 231
- Computer networks 192
- Penetration testing (Computer security) 109
- Hackers 82
- Engineering & Applied Sciences 72
- Computer crimes 47
- Computer Science 44
- Hacking 43
- Internet 38
- Data protection 35
- Operating systems (Computers) 30
- Electrical & Computer Engineering 29
- Examinations 29
- Certification 27
- Prevention 27
- Kali Linux 26
- Telecommunications 26
- Electronic data processing personnel 24
- Computer hackers 23
- Computers 22
- Development 22
- Application software 20
- Wittgenstein, Ludwig 20
- Historia 19
- Information technology 19
- Management 19
- Linux 18
- Access control 17
- Web sites 17
-
821Publicado 2022“…It starts on the dark side, exploring case studies of cross-site scripting, SQL injection, and other weapons used by hackers. As you go, you’ll learn how to implement countermeasures, activate browser security features, minimize attack damage, and securely store application secrets. …”
Vídeo online -
822por PELTIER, THOMAS R.“…The instant access that hackers have to the latest tools and techniques demands that companies become more aggressive in defending the security of their networks. …”
Publicado 2017
Libro electrónico -
823Publicado 2015“…In many cases, the first stage of any security assessment-that is, reconnaissance-is not given enough attention by security professionals, hackers, and penetration testers. Often, the information openly present is as critical as the confidential data. …”
Libro electrónico -
824por Cache, Johnny“…"Filled with tactical security information, Hacking Exposed Wireless, Second Edition sheds light on how hackers zero in on susceptible networks and peripherals, gain access, and execute debilitating attacks. …”
Publicado 2010
Libro electrónico -
825Publicado 2022“…Remote working has given hackers plenty of opportunities as more confidential information is shared over the internet than ever before. …”
Libro electrónico -
826Publicado 2007“…A cross site scripting attack is a very specific type of attack on a web application. It is used by hackers to mimic real sites and fool people into providing personal data.Cross Site Scripting Attacks starts by defining the terms and laying out the ground work. …”
Libro electrónico -
827por Harrington, Jan L.“…It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay.You get all the hands-on technical advice you need to succeed, but also higher-level administrative guidance for developing an effective security policy. …”
Publicado 2005
Libro electrónico -
828Publicado 2007“…* Ninety percent of the world's PCs run Windows, making Vista a prime target for malicious hackers * Helps readers get the most out of new Vista security features by detailing the vulnerabilities that have already been found in Vista and explains how to combat potential problems * Identifies possible threats brought on by the millions of lines of brand-new code in the operating system and risky new features, including IPv6 and peer-to-peer support * Covers the Windows Security Center, rights management, BitLocker, Web security, and much more…”
Libro electrónico -
829Publicado 2008“…This is no small task considering the market saturation of Windows Server and the rate at which it is attacked by malicious hackers. According to IDC, Windows Server runs 38% of a…”
Libro electrónico -
830por Howard, Michael, 1965-“…Keep black-hat hackers at bay with the tips and techniques in this entertaining, eye-opening book! …”
Publicado 2004
Libro electrónico -
831por Heiderich, Mario“…Obfuscation of code has allowed hackers to take one attack and create hundreds-if not millions-of variants that can evade your security measures. …”
Publicado 2011
Libro electrónico -
832por Zdziarski, Jonathan A.“…This guide illustrates several types of iOS attacks, as well as the tools and techniques that hackers use. You'll learn best practices to help protect your applications, and discover how important it is to understand and strategize like y…”
Publicado 2013
Libro electrónico -
833por Dang, Bruce“…Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. …”
Publicado 2014
Libro electrónico -
834por Peikari, Cyrus“…The book includes detailed, hands-on information that is currently unavailable in any printed text -- information that has been gleaned from the authors' work with real wireless hackers ("war drivers"), wireless security developers, and leading security experts…”
Publicado 2003
Libro electrónico -
835por Brenton, Chris“…Expertise is what makes hackers effective. It's what will make you effective, too, as you fight to keep them at bay. …”
Publicado 2003
Libro electrónico -
836por Pogue, Chris“…This book addresses topics in the area of forensic analysis of systems running on variants of the UNIX operating system, which is the choice of hackers for their attack platforms. According to a 2007 IDC report, UNIX servers account for the second-largest segment of spending (behind Windows) in the worldwide server market with 4.2 billion in 2Q07, representing 31.7% of corporate server spending. …”
Publicado 2008
Libro electrónico -
837Publicado 2013“…With the invention of the unique credit-card sized single-board computer, the Raspberry Pi, comes a new wave of hardware geeks, hackers, and hobbyists who are excited about the possibilities of the Raspberry Pi, and this is the perfect guide to get you started in this exhilarating new arena. …”
Libro electrónico -
838Publicado 2015“…MY VIEW OF THE SECURITY WORLDView of the IT Security WorldBrief History of Web SecurityBrief History of Chinese HackersDevelopment Process of Hacking TechniquesRise of Web SecurityBlack Hat, White HatBack to Nature: The Essence of Secret SecuritySuperstition: There Is No Silver BulletSecurity Is an Ongoing ProcessSecurity ElementsHow to Implement Safety AssessmentAsset ClassificationThreat AnalysisRisk AnalysisDesign of Security ProgramsArt of War of White HatPrinciples of Secure by DefaultBlacklist, WhitelistPrinciple of Least PrivilegePrinciple of Defense in DepthPrinciples of Data and Code…”
Libro electrónico -
839por Hyde, Randall“…Widely respected by hackers of all kinds, The Art of Assembly Language teaches programmers how to understand assembly language and how to use it to write powerful, efficient code. …”
Publicado 2010
Libro electrónico -
840por Chandra, Praphul“…As a result, truly ""bulletproof"" wireless security is now more than a desirable feature--instead, it's a necessity to protect essential personal and business data from hackers and eavesdroppers.In this handy reference, Praphul Chandra gives you the conceptual and practical tools every RF, wireless, and network engineer needs for high-security wireless ap…”
Publicado 2005
Libro electrónico