Mostrando 821 - 840 Resultados de 1,068 Para Buscar '"hacker"', tiempo de consulta: 0.08s Limitar resultados
  1. 821
    Publicado 2022
    “…It starts on the dark side, exploring case studies of cross-site scripting, SQL injection, and other weapons used by hackers. As you go, you’ll learn how to implement countermeasures, activate browser security features, minimize attack damage, and securely store application secrets. …”
    Vídeo online
  2. 822
    por PELTIER, THOMAS R.
    Publicado 2017
    “…The instant access that hackers have to the latest tools and techniques demands that companies become more aggressive in defending the security of their networks. …”
    Libro electrónico
  3. 823
    Publicado 2015
    “…In many cases, the first stage of any security assessment-that is, reconnaissance-is not given enough attention by security professionals, hackers, and penetration testers. Often, the information openly present is as critical as the confidential data. …”
    Libro electrónico
  4. 824
    por Cache, Johnny
    Publicado 2010
    “…"Filled with tactical security information, Hacking Exposed Wireless, Second Edition sheds light on how hackers zero in on susceptible networks and peripherals, gain access, and execute debilitating attacks. …”
    Libro electrónico
  5. 825
    Publicado 2022
    “…Remote working has given hackers plenty of opportunities as more confidential information is shared over the internet than ever before. …”
    Libro electrónico
  6. 826
    Publicado 2007
    “…A cross site scripting attack is a very specific type of attack on a web application. It is used by hackers to mimic real sites and fool people into providing personal data.Cross Site Scripting Attacks starts by defining the terms and laying out the ground work. …”
    Libro electrónico
  7. 827
    por Harrington, Jan L.
    Publicado 2005
    “…It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay.You get all the hands-on technical advice you need to succeed, but also higher-level administrative guidance for developing an effective security policy. …”
    Libro electrónico
  8. 828
    Publicado 2007
    “…* Ninety percent of the world's PCs run Windows, making Vista a prime target for malicious hackers * Helps readers get the most out of new Vista security features by detailing the vulnerabilities that have already been found in Vista and explains how to combat potential problems * Identifies possible threats brought on by the millions of lines of brand-new code in the operating system and risky new features, including IPv6 and peer-to-peer support * Covers the Windows Security Center, rights management, BitLocker, Web security, and much more…”
    Libro electrónico
  9. 829
    Publicado 2008
    “…This is no small task considering the market saturation of Windows Server and the rate at which it is attacked by malicious hackers. According to IDC, Windows Server runs 38% of a…”
    Libro electrónico
  10. 830
    por Howard, Michael, 1965-
    Publicado 2004
    “…Keep black-hat hackers at bay with the tips and techniques in this entertaining, eye-opening book! …”
    Libro electrónico
  11. 831
    por Heiderich, Mario
    Publicado 2011
    “…Obfuscation of code has allowed hackers to take one attack and create hundreds-if not millions-of variants that can evade your security measures. …”
    Libro electrónico
  12. 832
    por Zdziarski, Jonathan A.
    Publicado 2013
    “…This guide illustrates several types of iOS attacks, as well as the tools and techniques that hackers use. You'll learn best practices to help protect your applications, and discover how important it is to understand and strategize like y…”
    Libro electrónico
  13. 833
    por Dang, Bruce
    Publicado 2014
    “…Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. …”
    Libro electrónico
  14. 834
    por Peikari, Cyrus
    Publicado 2003
    “…The book includes detailed, hands-on information that is currently unavailable in any printed text -- information that has been gleaned from the authors' work with real wireless hackers ("war drivers"), wireless security developers, and leading security experts…”
    Libro electrónico
  15. 835
    por Brenton, Chris
    Publicado 2003
    “…Expertise is what makes hackers effective. It's what will make you effective, too, as you fight to keep them at bay. …”
    Libro electrónico
  16. 836
    por Pogue, Chris
    Publicado 2008
    “…This book addresses topics in the area of forensic analysis of systems running on variants of the UNIX operating system, which is the choice of hackers for their attack platforms. According to a 2007 IDC report, UNIX servers account for the second-largest segment of spending (behind Windows) in the worldwide server market with 4.2 billion in 2Q07, representing 31.7% of corporate server spending. …”
    Libro electrónico
  17. 837
    Publicado 2013
    “…With the invention of the unique credit-card sized single-board computer, the Raspberry Pi, comes a new wave of hardware geeks, hackers, and hobbyists who are excited about the possibilities of the Raspberry Pi, and this is the perfect guide to get you started in this exhilarating new arena. …”
    Libro electrónico
  18. 838
    Publicado 2015
    “…MY VIEW OF THE SECURITY WORLDView of the IT Security WorldBrief History of Web SecurityBrief History of Chinese HackersDevelopment Process of Hacking TechniquesRise of Web SecurityBlack Hat, White HatBack to Nature: The Essence of Secret SecuritySuperstition: There Is No Silver BulletSecurity Is an Ongoing ProcessSecurity ElementsHow to Implement Safety AssessmentAsset ClassificationThreat AnalysisRisk AnalysisDesign of Security ProgramsArt of War of White HatPrinciples of Secure by DefaultBlacklist, WhitelistPrinciple of Least PrivilegePrinciple of Defense in DepthPrinciples of Data and Code…”
    Libro electrónico
  19. 839
    por Hyde, Randall
    Publicado 2010
    “…Widely respected by hackers of all kinds, The Art of Assembly Language teaches programmers how to understand assembly language and how to use it to write powerful, efficient code. …”
    Libro electrónico
  20. 840
    por Chandra, Praphul
    Publicado 2005
    “…As a result, truly ""bulletproof"" wireless security is now more than a desirable feature--instead, it's a necessity to protect essential personal and business data from hackers and eavesdroppers.In this handy reference, Praphul Chandra gives you the conceptual and practical tools every RF, wireless, and network engineer needs for high-security wireless ap…”
    Libro electrónico