Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 250
- Security measures 231
- Computer networks 192
- Penetration testing (Computer security) 109
- Hackers 82
- Engineering & Applied Sciences 72
- Computer crimes 48
- Computer Science 44
- Hacking 43
- Internet 37
- Data protection 35
- Operating systems (Computers) 30
- Electrical & Computer Engineering 29
- Examinations 29
- Certification 27
- Prevention 27
- Kali Linux 26
- Telecommunications 26
- Computer hackers 24
- Electronic data processing personnel 24
- Computers 22
- Development 22
- Application software 20
- Information technology 19
- Management 19
- Linux 18
- Access control 17
- Web sites 17
- Computer software 16
- Microsoft Windows (Computer file) 15
-
821Publicado 2016“…Noted author Johnny Long, founder of Hackers for Charity, gives you all the tools you need to conduct the ultimate open source reconnaissance and penetration testing. …”
Libro electrónico -
822Publicado 2004“…From there, Modding Mac OS X shows you how to: Find hidden features in your favorite applications Dive inside application bundles to find hidden resources Change application and system-wide keyboard shortcuts Work with the Property List Editor to read and edit property list files Wrap your head around the defaults command to tweak an application's settings Hack on NIB files to change an application's interface Control an application with AppleScript, even if it isn't scriptable Each Modding example includes detailed step-by-step instructions that even a novice Mac user can follow, while also providing the necessary detail to satisfy the experienced hacker. The knowledge you gain from tweaking one application can be easily applied to the next. …”
Libro electrónico -
823Publicado 2018“…Includes coverage of the latest changes to C# Shows you exactly what the language can (and can't) do Presents familiar tasks that you can accomplish with C# Provides insight into developing applications that provide protection against hackers If you have a basic understanding of coding and need to learn C#—or need a reference on the language in order to launch or further your career—look no further…”
Libro electrónico -
824por Nielson, Seth James“…What You Will Learn Authentication technologies, including secure password storage and how hackers “crack” password lists Access control technology, such as BLP, BIBA, and more recent models such as RBAC and ABAC Core cryptography technology, including AES encryption and public key signatures Classical host security technologies that protect against malware (viruses, trojans, ransomware) Classical network security technologies, such as border security (gateways, firewalls, proxies), network IDS and IPS, and modern deception systems Web security technologies, including cookies, state, and session defenses, and threats that try to subvert them Email and social media security threats such as spam, phishing, social media, and other email threats…”
Publicado 2023
Libro electrónico -
825Publicado 1997“…You will emerge from this book a better hacker, and a proud master of Perl…”
Libro electrónico -
826por Andrews, Mike“…It’s as certain as death and taxes: hackers will mercilessly attack your Web sites, applications, and services. …”
Publicado 2006
Libro electrónico -
827Publicado 2011“…TAB, an imprint of McGraw-Hill Professional, is a leading publisher of DIY technology books for makers, hackers, and electronics hobbyists…”
Libro electrónico -
828Publicado 2020“…The first part of the course will explain how an intrusion detection system is used to stop cybersecurity threats such as hackers from infiltrating your network. Next, it will explain why traditional intrusion detection systems are not able to keep up with the rapid evolution of black hat adversaries, and how machine learning offers a self-learning solution that is able to keep up with, and even outsmart them. …”
-
829Publicado 2017“…But now that malicious hackers have discovered new and better ways to affect both aspects of a website, you need solutions that can plug security holes while enhancing frontend performance. …”
Libro electrónico -
830Publicado 2018“…It’s not just that we need to find space for our increasingly large collections of photos, videos, music, and apps—we want it to be available whenever we need it, and be sure that it’s safe from hackers and thieves. Every Mac includes internal storage in the form of a hard drive, SSD, or Fusion drive. …”
Libro electrónico -
831Publicado 2007“…To “fuzz,” you attach a program’s inputs to a source of random data, and then systematically identify the failures that arise. Hackers have relied on fuzzing for years: Now, it’s your turn. …”
Libro electrónico -
832Publicado 2019“…The real-world guide to defeating hackers and keeping your business secure Many books discuss the technical underpinnings and complex configurations necessary for cybersecurity—but they fail to address the everyday steps that boards, managers, and employees can take to prevent attacks. …”
Libro electrónico -
833Publicado 2019“…Penetration testing is the attempt to professionally break in to an organisation's systems by exploiting any vulnerabilities, with the goal of determining whether an organisation's IT systems and resources are secure. As hackers and would-be cyber attackers become increasingly more brazen, penetration testing has become an essential practice. …”
Libro electrónico -
834Publicado 2024“…Then, it moves on to social engineering, showing you how hackers trick people into giving away their information. …”
Video -
835por Timmis, Harold“…Arduino boards have impressed both hackers and professional engineers. Whether you're a hobbyist or a professional, it isn't just a breadboard and a hazy idea that keeps you going. …”
Publicado 2011
Libro electrónico -
836por Okereafor, Kenneth“…Despite their effectiveness for remote work and online interactions, cyberspace alternatives ignited several Cybersecurity challenges. Malicious hackers capitalized on global anxiety and launched cyberattacks against unsuspecting victims. …”
Publicado 2021
Libro electrónico -
837Publicado 2016“…Thanks to this book, every Raspberry Pi owner can understand how the computer works and how to access all of its hardware and software capabilities. Now, students, hackers, and casual users alike can discover how computers work with Learning Computer Architecture with the Raspberry Pi . …”
Libro electrónico -
838Publicado 2020“…The first section will take you through the free version of Elementor and teach you how to build an entire one-page website for a fictional company that we will call the White Hat Hackers. You will learn about various building techniques such as working with widgets, building an image carousel, adding a Google map to your web page, creating and inserting a contact form, and working with page templates. …”
-
839Publicado 2013“…Find out how to install the operating system and connect to other devices Install, use and remove software like a pro Learn basic Linux systems administration Program with Scratch, Python and Minecraft on your Raspberry Pi The Raspberry Pi has awakened a whole new generation of hardware geeks, hackers and hobbyists, and now it's your turn to join their ranks. …”
Libro electrónico -
840Publicado 2024“…Drawing on in-depth interviews with designers, developers, activists, and users, along with twenty years of mailing lists, design documents, reporting, and legal papers, Collier traces Tor's evolution from those early days to its current operation on the frontlines of global digital power -- including the strange collaboration between US military scientists and a group of freewheeling hackers called the Cypherpunks. As Collier charts the rise and fall of three different cultures in Tor's diverse community -- the engineers, the maintainers, and the activists, each with a distinct understanding of and vision for Tor -- he reckons with Tor's complicated, changing relationship with contemporary US empire. …”
Libro electrónico