Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 250
- Security measures 231
- Computer networks 192
- Penetration testing (Computer security) 109
- Hackers 82
- Engineering & Applied Sciences 72
- Computer crimes 48
- Computer Science 44
- Hacking 43
- Internet 37
- Data protection 35
- Operating systems (Computers) 30
- Electrical & Computer Engineering 29
- Examinations 29
- Certification 27
- Prevention 27
- Kali Linux 26
- Telecommunications 26
- Computer hackers 24
- Electronic data processing personnel 24
- Computers 22
- Development 22
- Application software 20
- Information technology 19
- Management 19
- Linux 18
- Access control 17
- Web sites 17
- Computer software 16
- Microsoft Windows (Computer file) 15
-
841Publicado 1997“…Attacks on government Web sites, break-ins at Internet service providers, electronic credit card fraud, invasion of personal privacy by merchants as well as hackers--is this what the World Wide Web is really all about? …”
Libro electrónico -
842Publicado 2005“…And, of course, this greatly expanded second edition also includes all the need-to-know details about the security technologies featured in SP 2, so you can better defend yourself against viruses, worms, and hackers. Readers even receive guidelines and instructions for installing SP2 on their PC, or across a network of computers. …”
Libro electrónico -
843Publicado 2022“…In a ransomware attack, hackers use malware to encrypt network files, locking users out of the system until a ransom is paid to a cybercriminal. …”
Video -
844Publicado 2019“…Make your Spring app 100% Safe with Spring Security About This Video Use Spring Security to secure your Spring service Understand OAuth2 flow and integration with the Spring application Make your app secure by preventing CORS and CSRF attacks In Detail Securing your application from hackers is the most high-pressure concerns for developers. …”
-
845Publicado 2016“…An ideal introduction and a quick reference to PCI DSS version 3.2 All businesses that accept payment cards are prey for hackers and criminal gangs trying to steal financial information and commit identity fraud. …”
Libro electrónico -
846Publicado 2015“…Top WordPress expert John LeMasney walks you through setting up your WordPress development environment, including a complete LAMP stack (Linux, Apache, MySQL, PHP); working with WordPress databases and configuration files; safeguarding WordPress from hackers and spammers; controlling the WordPress engine through functions, hooks, classes, and methods; defining the structure, appearance, and behavior of new themes; using plugins to add powerful new functionality without changing the WordPress engine; and finding the resources and mastering the terminology you need to become an advanced WordPress developer. …”
-
847por Barnett, Ryan C.“…As companies have improved perimeter security, hackers have increasingly focused on attacking Apache Web servers and Web applications. …”
Publicado 2005
Libro electrónico -
848Publicado 2018“…Discover the most common web vulnerabilities and prevent them from becoming a threat to your site's security Key Features Familiarize yourself with the most common web vulnerabilities Conduct a preliminary assessment of attack surfaces and run exploits in your lab Explore new tools in the Kali Linux ecosystem for web penetration testing Book Description Web applications are a huge point of attack for malicious hackers and a critical area for security professionals and penetration testers to lock down and secure. …”
Libro electrónico -
849Publicado 2005“…Understand the total cost of ownership and return on investment for network security solutions Understand what motivates hackers and how to classify threats Learn how to recognize common vulnerabilities and common types of attacks Examine modern day security systems, devices, and mitigation techniques Integrate policies and personnel with security equipment to effectively lessen security risks Analyze the greater implications of security breaches facing corporations and executives today Understand the governance aspects of network security to help implement a climate of change throughout your organization Learn how to qualify your organization’s aversion to risk Quantify the hard costs of attacks versus the cost of security technology investment to determine ROI Learn the essential elements of security policy development and how to continually assess security needs and vulnerabilities The Business Case for Network Security: Advocacy, Governance, and ROI addresses the needs of networking professionals and business executives who seek to assess their organization’s risks and objectively quantify both costs and cost savings related to network security technology investments. …”
Libro electrónico -
850Publicado 2004“…With the release of Windows XP Service Pack 2 (SP2), Microsoft latest and most reliable corporate desktop operating system now provides better protection against viruses, worms, and malicious hackers. SP2 includes Windows Firewall, Pop-up Blocker for Internet Explorer, and the new Windows Security Center. …”
Libro electrónico -
851Publicado 2009“…The authors survey the techniques hackers might use to try to breach your network, such as IPv6 network reconnaissance, address spoofing, traffic interception, denial of service, and tunnel injection. …”
Libro electrónico -
852Publicado 2019“…Explore the latest ethical hacking tools and techniques in Kali Linux 2019 to perform penetration testing from scratch Key Features Get up and running with Kali Linux 2019.2 Gain comprehensive insights into security concepts such as social engineering, wireless network exploitation, and web application attacks Learn to use Linux commands in the way ethical hackers do to gain control of your environment Book Description The current rise in hacking and security breaches makes it more important than ever to effectively pentest your environment, ensuring endpoint protection. …”
Libro electrónico -
853Publicado 2014“…Install software, configure, and connect your Raspberry Pi to other devices Master basic Linux System Admin to better understand nomenclature and conventions Write basic productivity and multimedia programs in Scratch and Python Extend capabilities with add-ons like Gertboard, Arduino, and more The Raspberry Pi has become a full-fledged phenomenon, popular with tinkerers, hackers, experimenters, and inventors. If you want to get started but aren't sure where to begin, Raspberry Pi User Guide, 3rd Edition contains everything you need…”
Libro electrónico -
854por Grossman, Wendy, author“…Among the issues covered are net scams, class divisions on the net, privacy issues, the Communications Decency Act, women online, pornography, hackers and the computer underground, net criminals and sociopaths, and more.Full text online version at www.nyupress.org/netwars…”
Publicado 2019
Libro electrónico -
855Publicado 2018“…Use técnicas de sandboxing, técnicas de testes internos e de terceiros e aprenda a pensar como um hacker. Implemente um ciclo de manutenção determinando quando e como atualizar o software de sua aplicação. …”
Libro electrónico -
856Publicado 2018“…By the time you finish, you will be able to launch attacks and test the security of websites and web applications in exactly the same way that black hat hackers would do, fix these vulnerabilities, and secure websites from them. …”
-
857por Johnson, Deborah G., 1945-“…El resto de la obra está dedicado a temas tan fundamentales en el uso cotidiano de la informática como: derechos de propiedad en el software; los ordenadores y la intimidad; abuso y delito del hacker; responsabilidad legal y responsabilidad moral; implicaciones sociales de la informática. …”
Publicado 1996
Biblioteca Universidad de Deusto (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca de Pastoral Madrid, Biblioteca Universitat Ramon Llull)Libro -
858Publicado 2016“…A practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world About This Book Learn to design and implement cyber security strategies for your organization Learn to protect cyber-physical systems and utilize forensic data analysis to beat vulnerabilities in your IoT ecosystem Learn best practices to secure your data from device to the cloud Gain insight into privacy-enhancing techniques and technologies Who This Book Is For This book targets IT Security Professionals and Security Engineers (including pentesters, security architects and ethical hackers) who would like to ensure security of their organization's data when connected through the IoT. …”
Libro electrónico -
859Publicado 2015“…An ideal introduction and a quick reference to PCI DSS version 3.1 All businesses that accept payment cards are prey for hackers and criminal gangs trying to steal financial information and commit identity fraud. …”
Libro electrónico -
860Publicado 2019“…This outstanding group provided the conference attendees (thousands of software developers, programmers, architects, engineers, CxOs, hackers, geeks, and analysts) with the opportunity to explore the latest open source tools and technologies; get expert in-depth training in crucial languages, frameworks, and best practices; and gain exposure to the open source stack in all its possible configurations. …”