Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 249
- Security measures 231
- Computer networks 192
- Penetration testing (Computer security) 109
- Hackers 82
- Engineering & Applied Sciences 72
- Computer crimes 47
- Computer Science 44
- Hacking 43
- Internet 37
- Data protection 35
- Operating systems (Computers) 30
- Electrical & Computer Engineering 29
- Examinations 29
- Certification 27
- Prevention 27
- Kali Linux 26
- Telecommunications 26
- Electronic data processing personnel 24
- Computer hackers 23
- Computers 22
- Development 22
- Application software 20
- Wittgenstein, Ludwig 20
- Historia 19
- Information technology 19
- Management 19
- Linux 18
- Access control 17
- Web sites 17
-
821Publicado 2008“…This is no small task considering the market saturation of Windows Server and the rate at which it is attacked by malicious hackers. According to IDC, Windows Server runs 38% of a…”
Libro electrónico -
822por Howard, Michael, 1965-“…Keep black-hat hackers at bay with the tips and techniques in this entertaining, eye-opening book! …”
Publicado 2004
Libro electrónico -
823por Heiderich, Mario“…Obfuscation of code has allowed hackers to take one attack and create hundreds-if not millions-of variants that can evade your security measures. …”
Publicado 2011
Libro electrónico -
824por Zdziarski, Jonathan A.“…This guide illustrates several types of iOS attacks, as well as the tools and techniques that hackers use. You'll learn best practices to help protect your applications, and discover how important it is to understand and strategize like y…”
Publicado 2013
Libro electrónico -
825por Dang, Bruce“…Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. …”
Publicado 2014
Libro electrónico -
826por Peikari, Cyrus“…The book includes detailed, hands-on information that is currently unavailable in any printed text -- information that has been gleaned from the authors' work with real wireless hackers ("war drivers"), wireless security developers, and leading security experts…”
Publicado 2003
Libro electrónico -
827por Brenton, Chris“…Expertise is what makes hackers effective. It's what will make you effective, too, as you fight to keep them at bay. …”
Publicado 2003
Libro electrónico -
828por Pogue, Chris“…This book addresses topics in the area of forensic analysis of systems running on variants of the UNIX operating system, which is the choice of hackers for their attack platforms. According to a 2007 IDC report, UNIX servers account for the second-largest segment of spending (behind Windows) in the worldwide server market with 4.2 billion in 2Q07, representing 31.7% of corporate server spending. …”
Publicado 2008
Libro electrónico -
829Publicado 2013“…With the invention of the unique credit-card sized single-board computer, the Raspberry Pi, comes a new wave of hardware geeks, hackers, and hobbyists who are excited about the possibilities of the Raspberry Pi, and this is the perfect guide to get you started in this exhilarating new arena. …”
Libro electrónico -
830Publicado 2015“…MY VIEW OF THE SECURITY WORLDView of the IT Security WorldBrief History of Web SecurityBrief History of Chinese HackersDevelopment Process of Hacking TechniquesRise of Web SecurityBlack Hat, White HatBack to Nature: The Essence of Secret SecuritySuperstition: There Is No Silver BulletSecurity Is an Ongoing ProcessSecurity ElementsHow to Implement Safety AssessmentAsset ClassificationThreat AnalysisRisk AnalysisDesign of Security ProgramsArt of War of White HatPrinciples of Secure by DefaultBlacklist, WhitelistPrinciple of Least PrivilegePrinciple of Defense in DepthPrinciples of Data and Code…”
Libro electrónico -
831por Hyde, Randall“…Widely respected by hackers of all kinds, The Art of Assembly Language teaches programmers how to understand assembly language and how to use it to write powerful, efficient code. …”
Publicado 2010
Libro electrónico -
832por Chandra, Praphul“…As a result, truly ""bulletproof"" wireless security is now more than a desirable feature--instead, it's a necessity to protect essential personal and business data from hackers and eavesdroppers.In this handy reference, Praphul Chandra gives you the conceptual and practical tools every RF, wireless, and network engineer needs for high-security wireless ap…”
Publicado 2005
Libro electrónico -
833Publicado 2025“…With large print and clear figures, you'll learn essential tasks like emailing, browsing the internet, creating and viewing digital photos, and staying safe from hackers and viruses. In no time you'll be shopping online and video calling family from across the country…”
Libro electrónico -
834Publicado 2015“… Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company's secrets. …”
Libro electrónico -
835Publicado 2010“…This easy-to-follow tutorial is ideal for designers, artists, hackers, makers, and anyone interested in creating sensor-based systems. …”
-
836Publicado 2021“…From Stephen Levy-the author who made "hackers" a household word-comes this account of a revolution that is already affecting every citizen in the twenty-first century. …”
Grabación no musical -
837Publicado 2022“…Keep yourself and your company out of the news by protecting your Linux systems from hackers, crackers, and attackers! This course will not only teach you the security concepts and guidelines that will keep your Linux servers safe, it will walk you through hardening measures step-by-step. …”
Video -
838Publicado 2022“…Welcome to Audio Learning from Assemble You. Hackers conduct cyber attacks to steal information, sabotage one or more systems, or bring down a working network. …”
Grabación no musical -
839Publicado 2020“…Vivirás una historia excitante llena de hackers, especulación y movimientos políticos disruptores. …”
Libro -
840Publicado 2024“…In the third edition of this book, cyber intelligence expert Jeffrey Caruso explores the latest developments in cyber espionage and warfare, including the growing role of civilian hackers, the use of social media for nefarious purposes, and the targeting of nonmilitary infrastructure. …”
Libro electrónico