Mostrando 821 - 840 Resultados de 942 Para Buscar '"hacker"', tiempo de consulta: 0.07s Limitar resultados
  1. 821
    Publicado 2016
    “…Noted author Johnny Long, founder of Hackers for Charity, gives you all the tools you need to conduct the ultimate open source reconnaissance and penetration testing. …”
    Libro electrónico
  2. 822
    Publicado 2004
    “…From there, Modding Mac OS X shows you how to: Find hidden features in your favorite applications Dive inside application bundles to find hidden resources Change application and system-wide keyboard shortcuts Work with the Property List Editor to read and edit property list files Wrap your head around the defaults command to tweak an application's settings Hack on NIB files to change an application's interface Control an application with AppleScript, even if it isn't scriptable Each Modding example includes detailed step-by-step instructions that even a novice Mac user can follow, while also providing the necessary detail to satisfy the experienced hacker. The knowledge you gain from tweaking one application can be easily applied to the next. …”
    Libro electrónico
  3. 823
    Publicado 2018
    “…Includes coverage of the latest changes to C# Shows you exactly what the language can (and can't) do Presents familiar tasks that you can accomplish with C# Provides insight into developing applications that provide protection against hackers If you have a basic understanding of coding and need to learn C#—or need a reference on the language in order to launch or further your career—look no further…”
    Libro electrónico
  4. 824
    por Nielson, Seth James
    Publicado 2023
    “…What You Will Learn Authentication technologies, including secure password storage and how hackers “crack” password lists Access control technology, such as BLP, BIBA, and more recent models such as RBAC and ABAC Core cryptography technology, including AES encryption and public key signatures Classical host security technologies that protect against malware (viruses, trojans, ransomware) Classical network security technologies, such as border security (gateways, firewalls, proxies), network IDS and IPS, and modern deception systems Web security technologies, including cookies, state, and session defenses, and threats that try to subvert them Email and social media security threats such as spam, phishing, social media, and other email threats…”
    Libro electrónico
  5. 825
    Publicado 1997
    “…You will emerge from this book a better hacker, and a proud master of Perl…”
    Libro electrónico
  6. 826
    por Andrews, Mike
    Publicado 2006
    “…It’s as certain as death and taxes: hackers will mercilessly attack your Web sites, applications, and services. …”
    Libro electrónico
  7. 827
    Publicado 2011
    “…TAB, an imprint of McGraw-Hill Professional, is a leading publisher of DIY technology books for makers, hackers, and electronics hobbyists…”
    Libro electrónico
  8. 828
    Publicado 2020
    “…The first part of the course will explain how an intrusion detection system is used to stop cybersecurity threats such as hackers from infiltrating your network. Next, it will explain why traditional intrusion detection systems are not able to keep up with the rapid evolution of black hat adversaries, and how machine learning offers a self-learning solution that is able to keep up with, and even outsmart them. …”
    Video
  9. 829
    Publicado 2017
    “…But now that malicious hackers have discovered new and better ways to affect both aspects of a website, you need solutions that can plug security holes while enhancing frontend performance. …”
    Libro electrónico
  10. 830
    Publicado 2018
    “…It’s not just that we need to find space for our increasingly large collections of photos, videos, music, and apps—we want it to be available whenever we need it, and be sure that it’s safe from hackers and thieves. Every Mac includes internal storage in the form of a hard drive, SSD, or Fusion drive. …”
    Libro electrónico
  11. 831
    Publicado 2007
    “…To “fuzz,” you attach a program’s inputs to a source of random data, and then systematically identify the failures that arise. Hackers have relied on fuzzing for years: Now, it’s your turn. …”
    Libro electrónico
  12. 832
    Publicado 2019
    “…The real-world guide to defeating hackers and keeping your business secure Many books discuss the technical underpinnings and complex configurations necessary for cybersecurity—but they fail to address the everyday steps that boards, managers, and employees can take to prevent attacks. …”
    Libro electrónico
  13. 833
    Publicado 2019
    “…Penetration testing is the attempt to professionally break in to an organisation's systems by exploiting any vulnerabilities, with the goal of determining whether an organisation's IT systems and resources are secure. As hackers and would-be cyber attackers become increasingly more brazen, penetration testing has become an essential practice. …”
    Libro electrónico
  14. 834
    Publicado 2024
    “…Then, it moves on to social engineering, showing you how hackers trick people into giving away their information. …”
    Video
  15. 835
    por Timmis, Harold
    Publicado 2011
    “…Arduino boards have impressed both hackers and professional engineers. Whether you're a hobbyist or a professional, it isn't just a breadboard and a hazy idea that keeps you going. …”
    Libro electrónico
  16. 836
    por Okereafor, Kenneth
    Publicado 2021
    “…Despite their effectiveness for remote work and online interactions, cyberspace alternatives ignited several Cybersecurity challenges. Malicious hackers capitalized on global anxiety and launched cyberattacks against unsuspecting victims. …”
    Libro electrónico
  17. 837
    Publicado 2016
    “…Thanks to this book, every Raspberry Pi owner can understand how the computer works and how to access all of its hardware and software capabilities. Now, students, hackers, and casual users alike can discover how computers work with Learning Computer Architecture with the Raspberry Pi . …”
    Libro electrónico
  18. 838
    Publicado 2020
    “…The first section will take you through the free version of Elementor and teach you how to build an entire one-page website for a fictional company that we will call the White Hat Hackers. You will learn about various building techniques such as working with widgets, building an image carousel, adding a Google map to your web page, creating and inserting a contact form, and working with page templates. …”
    Video
  19. 839
    Publicado 2013
    “…Find out how to install the operating system and connect to other devices Install, use and remove software like a pro Learn basic Linux systems administration Program with Scratch, Python and Minecraft on your Raspberry Pi The Raspberry Pi has awakened a whole new generation of hardware geeks, hackers and hobbyists, and now it's your turn to join their ranks. …”
    Libro electrónico
  20. 840
    Publicado 2024
    “…Drawing on in-depth interviews with designers, developers, activists, and users, along with twenty years of mailing lists, design documents, reporting, and legal papers, Collier traces Tor's evolution from those early days to its current operation on the frontlines of global digital power -- including the strange collaboration between US military scientists and a group of freewheeling hackers called the Cypherpunks. As Collier charts the rise and fall of three different cultures in Tor's diverse community -- the engineers, the maintainers, and the activists, each with a distinct understanding of and vision for Tor -- he reckons with Tor's complicated, changing relationship with contemporary US empire. …”
    Libro electrónico