Mostrando 821 - 840 Resultados de 1,059 Para Buscar '"hacker"', tiempo de consulta: 0.07s Limitar resultados
  1. 821
    Publicado 2008
    “…This is no small task considering the market saturation of Windows Server and the rate at which it is attacked by malicious hackers. According to IDC, Windows Server runs 38% of a…”
    Libro electrónico
  2. 822
    por Howard, Michael, 1965-
    Publicado 2004
    “…Keep black-hat hackers at bay with the tips and techniques in this entertaining, eye-opening book! …”
    Libro electrónico
  3. 823
    por Heiderich, Mario
    Publicado 2011
    “…Obfuscation of code has allowed hackers to take one attack and create hundreds-if not millions-of variants that can evade your security measures. …”
    Libro electrónico
  4. 824
    por Zdziarski, Jonathan A.
    Publicado 2013
    “…This guide illustrates several types of iOS attacks, as well as the tools and techniques that hackers use. You'll learn best practices to help protect your applications, and discover how important it is to understand and strategize like y…”
    Libro electrónico
  5. 825
    por Dang, Bruce
    Publicado 2014
    “…Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. …”
    Libro electrónico
  6. 826
    por Peikari, Cyrus
    Publicado 2003
    “…The book includes detailed, hands-on information that is currently unavailable in any printed text -- information that has been gleaned from the authors' work with real wireless hackers ("war drivers"), wireless security developers, and leading security experts…”
    Libro electrónico
  7. 827
    por Brenton, Chris
    Publicado 2003
    “…Expertise is what makes hackers effective. It's what will make you effective, too, as you fight to keep them at bay. …”
    Libro electrónico
  8. 828
    por Pogue, Chris
    Publicado 2008
    “…This book addresses topics in the area of forensic analysis of systems running on variants of the UNIX operating system, which is the choice of hackers for their attack platforms. According to a 2007 IDC report, UNIX servers account for the second-largest segment of spending (behind Windows) in the worldwide server market with 4.2 billion in 2Q07, representing 31.7% of corporate server spending. …”
    Libro electrónico
  9. 829
    Publicado 2013
    “…With the invention of the unique credit-card sized single-board computer, the Raspberry Pi, comes a new wave of hardware geeks, hackers, and hobbyists who are excited about the possibilities of the Raspberry Pi, and this is the perfect guide to get you started in this exhilarating new arena. …”
    Libro electrónico
  10. 830
    Publicado 2015
    “…MY VIEW OF THE SECURITY WORLDView of the IT Security WorldBrief History of Web SecurityBrief History of Chinese HackersDevelopment Process of Hacking TechniquesRise of Web SecurityBlack Hat, White HatBack to Nature: The Essence of Secret SecuritySuperstition: There Is No Silver BulletSecurity Is an Ongoing ProcessSecurity ElementsHow to Implement Safety AssessmentAsset ClassificationThreat AnalysisRisk AnalysisDesign of Security ProgramsArt of War of White HatPrinciples of Secure by DefaultBlacklist, WhitelistPrinciple of Least PrivilegePrinciple of Defense in DepthPrinciples of Data and Code…”
    Libro electrónico
  11. 831
    por Hyde, Randall
    Publicado 2010
    “…Widely respected by hackers of all kinds, The Art of Assembly Language teaches programmers how to understand assembly language and how to use it to write powerful, efficient code. …”
    Libro electrónico
  12. 832
    por Chandra, Praphul
    Publicado 2005
    “…As a result, truly ""bulletproof"" wireless security is now more than a desirable feature--instead, it's a necessity to protect essential personal and business data from hackers and eavesdroppers.In this handy reference, Praphul Chandra gives you the conceptual and practical tools every RF, wireless, and network engineer needs for high-security wireless ap…”
    Libro electrónico
  13. 833
    Publicado 2025
    “…With large print and clear figures, you'll learn essential tasks like emailing, browsing the internet, creating and viewing digital photos, and staying safe from hackers and viruses. In no time you'll be shopping online and video calling family from across the country…”
    Libro electrónico
  14. 834
    Publicado 2015
    “… Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company's secrets. …”
    Libro electrónico
  15. 835
    Publicado 2010
    “…This easy-to-follow tutorial is ideal for designers, artists, hackers, makers, and anyone interested in creating sensor-based systems. …”
    Video
  16. 836
    Publicado 2021
    “…From Stephen Levy-the author who made "hackers" a household word-comes this account of a revolution that is already affecting every citizen in the twenty-first century. …”
    Grabación no musical
  17. 837
    Publicado 2022
    “…Keep yourself and your company out of the news by protecting your Linux systems from hackers, crackers, and attackers! This course will not only teach you the security concepts and guidelines that will keep your Linux servers safe, it will walk you through hardening measures step-by-step. …”
    Video
  18. 838
    Publicado 2022
    “…Welcome to Audio Learning from Assemble You. Hackers conduct cyber attacks to steal information, sabotage one or more systems, or bring down a working network. …”
    Grabación no musical
  19. 839
    Publicado 2020
    “…Vivirás una historia excitante llena de hackers, especulación y movimientos políticos disruptores. …”
    Libro
  20. 840
    Publicado 2024
    “…In the third edition of this book, cyber intelligence expert Jeffrey Caruso explores the latest developments in cyber espionage and warfare, including the growing role of civilian hackers, the use of social media for nefarious purposes, and the targeting of nonmilitary infrastructure. …”
    Libro electrónico