Mostrando 861 - 880 Resultados de 942 Para Buscar '"hacker"', tiempo de consulta: 0.07s Limitar resultados
  1. 861
    Publicado 2016
    “…Explore Garmin’s ability to collect data from users and return timely results to them Start developing for Connect IQ by using templates for four kinds of apps Work with example projects in Connect IQ, including ways to read data from an ANT+ sensor Get developer resources for building wearable apps that do more with less Brian Jepson is an O'Reilly editor, hacker, and co-organizer of Providence Geeks and the Rhode Island Mini Maker Faire. …”
    Libro electrónico
  2. 862
    Publicado 2021
    “…Peter Deutsch: Author of Ghostscript, implementer of Smalltalk-80 at Xerox PARC and Lisp 1.5 on PDP-1 Brendan Eich: Inventor of JavaScript, CTO of the Mozilla Corporation Brad Fitzpatrick: Writer of LiveJournal, OpenID, memcached, and Perlbal Dan Ingalls: Smalltalk implementor and designer Simon Peyton Jones: Coinventor of Haskell and lead designer of Glasgow Haskell Compiler Donald Knuth: Author of The Art of Computer Programming and creator of TeX Peter Norvig: Director of Research at Google and author of the standard text on AI Guy Steele: Coinventor of Scheme and part of the Common Lisp Gang of Five, currently working on Fortress Ken Thompson: Inventor of UNIX Jamie Zawinski: Author of XEmacs and early Netscape/Mozilla hacker…”
    Grabación no musical
  3. 863
    Publicado 2011
    “…TAB, an imprint of McGraw-Hill Professional, is a leading publisher of DIY technology books for makers, hackers, and electronics hobbyists…”
    Libro electrónico
  4. 864
    por Seibel, Peter
    Publicado 2009
    “…Peter Deutsch: Author of Ghostscript, implementer of Smalltalk-80 at Xerox PARC and Lisp 1.5 on PDP-1 Brendan Eich: Inventor of JavaScript, CTO of the Mozilla Corporation Brad Fitzpatrick: Writer of LiveJournal, OpenID, memcached, and Perlbal Dan Ingalls: Smalltalk implementor and designer Simon Peyton Jones: Coinventor of Haskell and lead designer of Glasgow Haskell Compiler Donald Knuth: Author of The Art of Computer Programming and creator of TeX Peter Norvig: Director of Research at Google and author of the standard text on AI Guy Steele: Coinventor of Scheme and part of the Common Lisp Gang of Five, currently working on Fortress Ken Thompson: Inventor of UNIX Jamie Zawinski: Author of XEmacs and early Netscape/Mozilla hacker…”
    Libro electrónico
  5. 865
    Publicado 2016
    “…He holds the LPIC-1, Linux+, SUSE CLA Linux Administrator, Network+, A+, Security+, Solaris Administrator, and Certified Ethical Hacker certifications…”
    Video
  6. 866
    Publicado 2022
    “…Secure programming techniques are used throughout the book to demonstrate the proper way to defend against hackers. You will learn how to plan and create MySQL/MariaDB databases and access them using PHP. …”
    Libro electrónico
  7. 867
    Publicado 2019
    “…"The first part of the 21st century will likely go down in history as the era when ethical hackers opened governments. The line of transparency is moving by force. …”
    Libro electrónico
  8. 868
    Publicado 2024
    “…What you will learn Understand Kerberoasting and its tools Crack complex passwords using Hashcat Explore John the Ripper's functionalities Utilize Unity Ads for game monetization Create leaderboards and social elements Develop proficiency in Unity C# scripting Who this book is for This course is ideal for cybersecurity enthusiasts, IT professionals, and ethical hackers. Basic knowledge of Kali Linux and password security principles is recommended. …”
    Libro electrónico
  9. 869
    Publicado 2017
    “…In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. …”
    Libro electrónico
  10. 870
    “…You will discover techniques, methods, and tools that are equally used by hackers and penetration testers to gather intelligence about a specific target online. …”
    Libro electrónico
  11. 871
    por Ledeneva, Alena
    Publicado 2024
    “…Bruce Schneier, author of A Hacker's Mind 'Alena Ledeneva's latest database of rule bending is a goldmine for documentary makers and storytellers. …”
    Libro electrónico
  12. 872
    por Strickland, James R. author
    Publicado 2016
    “…Junk Box Arduino is the ultimate have-fun-while-challenging-your-skills guide for Arduino hackers who’ve gone beyond the basic tutorials and are ready for adventures in electronics. …”
    Libro electrónico
  13. 873
    Publicado 2016
    “…Learn the art of building a low-cost, portable hacking arsenal using Raspberry Pi 3 and Kali Linux 2 About This Book Quickly turn your Raspberry Pi 3 into a low-cost hacking tool using Kali Linux 2 Protect your confidential data by deftly preventing various network security attacks Use Raspberry Pi 3 as honeypots to warn you that hackers are on your wire Who This Book Is For If you are a computer enthusiast who wants to learn advanced hacking techniques using the Raspberry Pi 3 as your pentesting toolbox, then this book is for you. …”
    Libro electrónico
  14. 874
    Publicado 2016
    “…Learn how to · Identify and prioritize potential threats to your network · Use basic networking knowledge to improve security · Get inside the minds of hackers, so you can deter their attacks · Implement a proven layered approach to network security · Resist modern social engineering attacks · Defend against today’s most common Denial of Service (DoS) attacks · Halt viruses, spyware, worms, Trojans, and other malware · Prevent problems arising from malfeasance or ignorance · Choose the best encryption methods for your organization · Compare security technologies, including the latest security appliances · Implement security policies that will work in your environment · Scan your network for vulnerabilities · Evaluate potential security consultants · Master basic computer forensics and know what to do if you’re attacked · Learn how cyberterrorism and information warfare are evolving…”
    Libro electrónico
  15. 875
    Publicado 2018
    “…Use an open source firewall and features such as failover, load balancer, OpenVPN, IPSec, and Squid to protect your network Key Features Explore pfSense, a trusted open source network security solution Configure pfSense as a firewall and create and manage firewall rules Test pfSense for failover and load balancing across multiple WAN connections Book Description While connected to the internet, you're a potential target for an array of cyber threats, such as hackers, keyloggers, and Trojans that attack through unpatched security holes. …”
    Libro electrónico
  16. 876
    Publicado 2016
    “…Assuring Security by Penetration Testing is a fully focused, structured book providing guidance on developing practical penetration testing skills by demonstrating cutting-edge hacker tools and techniques with a coherent, step-by-step approach. …”
    Libro electrónico
  17. 877
    por Parker, Carey. author
    Publicado 2018
    “…This book is not about protecting yourself from a targeted attack by the NSA; it's about armoring yourself against common hackers and mass surveillance. There are dozens of no-brainer things we all should be doing to protect our computers and safeguard our data—just like wearing a seat belt, installing smoke alarms, and putting on sunscreen. …”
    Libro electrónico
  18. 878
    “…This book differentiates itself from other Cisco books on the market by approaching network security from a hacker’s perspective. Not only does it provide network security recommendations but it teaches you how to use black-hat tools such as oclHashcat, Loki, Burp Suite, Scapy, Metasploit, and Kali to actually test the security concepts learned. …”
    Libro electrónico
  19. 879
    Publicado 2015
    “…In addition to all the content you’ve come to expect from prior editions, this newly revised edition includes all-new coverage of topics such as: • How smartphones and tablet PCs put the power of a desktop computer in your hands–literally • How computing technology is linking our homes, work place, entertainment, and daily communications • How advances such as Facebook, Twitter, Google, eBay, and smartphones are expanding our universe of friends, knowledge, and opportunity • How increased miniaturization leads to new products, such as smartphone, smartwatches, and Google Glass • How computing technology takes advantages of quantum physics and innovations no one even imagined a few years ago For two decades, How Computers Work has helped newbies understand new technology, while hackers and IT pros have treasured it for the depth of knowledge it contains. …”
    Libro electrónico
  20. 880
    Publicado 2003
    “…Our new Hacks books are written in the spirit of the true hackers -- the people who drive innovation…”
    Libro electrónico