Mostrando 841 - 860 Resultados de 942 Para Buscar '"hacker"', tiempo de consulta: 0.08s Limitar resultados
  1. 841
    Publicado 1997
    “…Attacks on government Web sites, break-ins at Internet service providers, electronic credit card fraud, invasion of personal privacy by merchants as well as hackers--is this what the World Wide Web is really all about? …”
    Libro electrónico
  2. 842
    Publicado 2005
    “…And, of course, this greatly expanded second edition also includes all the need-to-know details about the security technologies featured in SP 2, so you can better defend yourself against viruses, worms, and hackers. Readers even receive guidelines and instructions for installing SP2 on their PC, or across a network of computers. …”
    Libro electrónico
  3. 843
    Publicado 2022
    “…In a ransomware attack, hackers use malware to encrypt network files, locking users out of the system until a ransom is paid to a cybercriminal. …”
    Video
  4. 844
    Publicado 2019
    “…Make your Spring app 100% Safe with Spring Security About This Video Use Spring Security to secure your Spring service Understand OAuth2 flow and integration with the Spring application Make your app secure by preventing CORS and CSRF attacks In Detail Securing your application from hackers is the most high-pressure concerns for developers. …”
    Video
  5. 845
    Publicado 2016
    “…An ideal introduction and a quick reference to PCI DSS version 3.2 All businesses that accept payment cards are prey for hackers and criminal gangs trying to steal financial information and commit identity fraud. …”
    Libro electrónico
  6. 846
    Publicado 2015
    “…Top WordPress expert John LeMasney walks you through setting up your WordPress development environment, including a complete LAMP stack (Linux, Apache, MySQL, PHP); working with WordPress databases and configuration files; safeguarding WordPress from hackers and spammers; controlling the WordPress engine through functions, hooks, classes, and methods; defining the structure, appearance, and behavior of new themes; using plugins to add powerful new functionality without changing the WordPress engine; and finding the resources and mastering the terminology you need to become an advanced WordPress developer. …”
    Video
  7. 847
    por Barnett, Ryan C.
    Publicado 2005
    “…As companies have improved perimeter security, hackers have increasingly focused on attacking Apache Web servers and Web applications. …”
    Libro electrónico
  8. 848
    Publicado 2018
    “…Discover the most common web vulnerabilities and prevent them from becoming a threat to your site's security Key Features Familiarize yourself with the most common web vulnerabilities Conduct a preliminary assessment of attack surfaces and run exploits in your lab Explore new tools in the Kali Linux ecosystem for web penetration testing Book Description Web applications are a huge point of attack for malicious hackers and a critical area for security professionals and penetration testers to lock down and secure. …”
    Libro electrónico
  9. 849
    Publicado 2005
    “…Understand the total cost of ownership and return on investment for network security solutions Understand what motivates hackers and how to classify threats Learn how to recognize common vulnerabilities and common types of attacks Examine modern day security systems, devices, and mitigation techniques Integrate policies and personnel with security equipment to effectively lessen security risks Analyze the greater implications of security breaches facing corporations and executives today Understand the governance aspects of network security to help implement a climate of change throughout your organization Learn how to qualify your organization’s aversion to risk Quantify the hard costs of attacks versus the cost of security technology investment to determine ROI Learn the essential elements of security policy development and how to continually assess security needs and vulnerabilities The Business Case for Network Security: Advocacy, Governance, and ROI addresses the needs of networking professionals and business executives who seek to assess their organization’s risks and objectively quantify both costs and cost savings related to network security technology investments. …”
    Libro electrónico
  10. 850
    Publicado 2004
    “…With the release of Windows XP Service Pack 2 (SP2), Microsoft latest and most reliable corporate desktop operating system now provides better protection against viruses, worms, and malicious hackers. SP2 includes Windows Firewall, Pop-up Blocker for Internet Explorer, and the new Windows Security Center. …”
    Libro electrónico
  11. 851
    Publicado 2009
    “…The authors survey the techniques hackers might use to try to breach your network, such as IPv6 network reconnaissance, address spoofing, traffic interception, denial of service, and tunnel injection. …”
    Libro electrónico
  12. 852
    Publicado 2019
    “…Explore the latest ethical hacking tools and techniques in Kali Linux 2019 to perform penetration testing from scratch Key Features Get up and running with Kali Linux 2019.2 Gain comprehensive insights into security concepts such as social engineering, wireless network exploitation, and web application attacks Learn to use Linux commands in the way ethical hackers do to gain control of your environment Book Description The current rise in hacking and security breaches makes it more important than ever to effectively pentest your environment, ensuring endpoint protection. …”
    Libro electrónico
  13. 853
    Publicado 2014
    “…Install software, configure, and connect your Raspberry Pi to other devices Master basic Linux System Admin to better understand nomenclature and conventions Write basic productivity and multimedia programs in Scratch and Python Extend capabilities with add-ons like Gertboard, Arduino, and more The Raspberry Pi has become a full-fledged phenomenon, popular with tinkerers, hackers, experimenters, and inventors. If you want to get started but aren't sure where to begin, Raspberry Pi User Guide, 3rd Edition contains everything you need…”
    Libro electrónico
  14. 854
    por Grossman, Wendy, author
    Publicado 2019
    “…Among the issues covered are net scams, class divisions on the net, privacy issues, the Communications Decency Act, women online, pornography, hackers and the computer underground, net criminals and sociopaths, and more.Full text online version at www.nyupress.org/netwars…”
    Libro electrónico
  15. 855
    Publicado 2018
    “…Use técnicas de sandboxing, técnicas de testes internos e de terceiros e aprenda a pensar como um hacker. Implemente um ciclo de manutenção determinando quando e como atualizar o software de sua aplicação. …”
    Libro electrónico
  16. 856
    Publicado 2018
    “…By the time you finish, you will be able to launch attacks and test the security of websites and web applications in exactly the same way that black hat hackers would do, fix these vulnerabilities, and secure websites from them. …”
    Video
  17. 857
    por Johnson, Deborah G., 1945-
    Publicado 1996
    “…El resto de la obra está dedicado a temas tan fundamentales en el uso cotidiano de la informática como: derechos de propiedad en el software; los ordenadores y la intimidad; abuso y delito del hacker; responsabilidad legal y responsabilidad moral; implicaciones sociales de la informática. …”
    Libro
  18. 858
    Publicado 2016
    “…A practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world About This Book Learn to design and implement cyber security strategies for your organization Learn to protect cyber-physical systems and utilize forensic data analysis to beat vulnerabilities in your IoT ecosystem Learn best practices to secure your data from device to the cloud Gain insight into privacy-enhancing techniques and technologies Who This Book Is For This book targets IT Security Professionals and Security Engineers (including pentesters, security architects and ethical hackers) who would like to ensure security of their organization's data when connected through the IoT. …”
    Libro electrónico
  19. 859
    Publicado 2015
    “…An ideal introduction and a quick reference to PCI DSS version 3.1 All businesses that accept payment cards are prey for hackers and criminal gangs trying to steal financial information and commit identity fraud. …”
    Libro electrónico
  20. 860
    Publicado 2019
    “…This outstanding group provided the conference attendees (thousands of software developers, programmers, architects, engineers, CxOs, hackers, geeks, and analysts) with the opportunity to explore the latest open source tools and technologies; get expert in-depth training in crucial languages, frameworks, and best practices; and gain exposure to the open source stack in all its possible configurations. …”
    Video