Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 250
- Security measures 231
- Computer networks 192
- Penetration testing (Computer security) 109
- Hackers 82
- Engineering & Applied Sciences 72
- Computer crimes 48
- Computer Science 44
- Hacking 43
- Internet 37
- Data protection 35
- Operating systems (Computers) 30
- Electrical & Computer Engineering 29
- Examinations 29
- Certification 27
- Prevention 27
- Kali Linux 26
- Telecommunications 26
- Computer hackers 24
- Electronic data processing personnel 24
- Computers 22
- Development 22
- Application software 20
- Information technology 19
- Management 19
- Linux 18
- Access control 17
- Web sites 17
- Computer software 16
- Microsoft Windows (Computer file) 15
-
881Publicado 2020“…Wale Soyinka is a father, system administrator, a DevOps/SecOps aficionado, an open source evangelist, a hacker, and a well-respected world-renowned chef (in his mind). …”
Libro electrónico -
882Publicado 2004“…No matter which Windows server you use--NT, IIS, 2000, or 2003--this book will put the knowledge and expertise of veteran system administrators and hackers to work for you. Windows Server Hacks will make your life easier while expanding your understanding of the capabilities of Windows Server…”
Libro electrónico -
883Publicado 2011“…TAB, an imprint of McGraw-Hill Professional, is a leading publisher of DIY technology books for makers, hackers, and electronics hobbyists…”
Libro electrónico -
884Publicado 2020“…What you will learn Focus on how to defend against SQL injection attacks Understand web application security Get up and running with a variety of SQL injection concepts Become well-versed with different SQL injection scenarios Discover SQL injection manual attack techniques Delve into SQL injection automated techniques Who this book is for This book is ideal for penetration testers, ethical hackers, or anyone who wants to learn about SQL injection and the various attack and defense strategies against this web security vulnerability. …”
Libro electrónico -
885Publicado 2018“…IT pentester, Security consultants, and ethical hackers will also find this course useful. Prior knowledge of penetration testing would be beneficial. …”
Libro electrónico -
886por Haber, Morey J. author“…When unmanaged, these privileged credentials pose a significant threat from external hackers and insider threats. We are experiencing an expanding universe of privileged accounts almost everywhere. …”
Publicado 2020
Libro electrónico -
887Publicado 2015“…Omar holds the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH) certifications, among others. Omar is the author of numerous books, video courses, white papers, and articles, and has delivered technical presentations at many conferences. …”
-
888Publicado 2018“…What you will learn Conduct the initial stages of a penetration test and understand its scope Perform reconnaissance and enumeration of target networks Obtain and crack passwords Use Kali Linux NetHunter to conduct wireless penetration testing Create proper penetration testing reports Understand the PCI-DSS framework and tools used to carry out segmentation scans and penetration testing Carry out wireless auditing assessments and penetration testing Understand how a social engineering attack such as phishing works Who this book is for This fourth edition of Kali Linux 2018: Assuring Security by Penetration Testing is for pentesters, ethical hackers, and IT security professionals with basic knowledge of Unix/Linu..…”
Libro electrónico -
889Publicado 2018“…What you will learn Get started with red team engagements using lesser-known methods Explore intermediate and advanced levels of post-exploitation techniques Get acquainted with all the tools and frameworks included in the Metasploit framework Discover the art of getting stealthy access to systems via Red Teaming Understand the concept of redirectors to add further anonymity to your C2 Get to grips with different uncommon techniques for data exfiltration Who this book is for Hands-On Red Team Tactics is for you if you are an IT professional, pentester, security consultant, or ethical hacker interested in the IT security domain and wants to go beyond Penetration Testing. …”
Libro electrónico -
890por Knittel, Brian“…• Take a quick guided tour of everything that’s new in Windows 8 • Survive without the Start menu • Navigate the new Windows 8 interface (and customize it to make yourself more comfortable) • Learn hidden shortcuts you’d never find on your own • Quickly locate and use files, media, apps, websites, and management tools • Set up your Web connection, and discover Internet Explorer 10’s latest improvements • Get comfortable with Windows 8’s built-in apps, from Calendar and Finance to Weather and Windows Store • Save time by monitoring Facebook, Twitter, and LinkedIn through one unified app • Make the most of Windows 8’s supercharged media and imaging tools • Profit from Windows 8’s built-in support for business presentations • Maximize the performance and efficiency of hardware, storage, and software • Protect yourself from viruses, spyware, data theft, fraud, spam, hackers, and snoops • Use SkyDrive to access your data from anywhere—and use Remote Desktop to access your computer, too • Get even more power with Windows 8’s command-line interface • Use Hyper-V to run other operating systems alongside Windows 8 • Troubleshoot the most common Windows 8 problems—and the toughest ones In Depth offers: • Comprehensive coverage, with detailed solutions • Breakthrough techniques and shortcuts that are unavailable elsewhere • Practical, real-world examples with nothing glossed over or left out • Troubleshooting help for tough problems you can’t fix on your own • Outstanding authors recognized worldwide for their expertise and teaching style • Quick information via sidebars, tips, reminders, notes, and warnings In Depth is the only tool you need to get more done in less time! …”
Publicado 2013
Libro electrónico -
891Publicado 2015“…The book describes the methods used by criminal hackers to attack organizations via their web applications and provides a detailed explanation of how you can combat such attacks by employing the guidance and controls set out in ISO 27001. …”
Libro electrónico -
892Publicado 2023“…Security engineers, including pentesters, security architects, and ethical hackers, who want to ensure the security of their organization's data when connected with the IoT will find this book useful…”
Libro electrónico -
893por Hoglund, Greg“…At the apex the malicious hacker toolset--which includes decompilers, disassemblers, fault-injection engines, kernel debuggers, payload collections, coverage tools, and flow analysis tools--is the rootkit. …”
Publicado 2005
Libro electrónico -
894Publicado 2019“…What you will learn Detect email threats such as spamming and phishing using AI Categorize APT, zero-days, and polymorphic malware samples Overcome antivirus limits in threat detection Predict network intrusions and detect anomalies with machine learning Verify the strength of biometric authentication procedures with deep learning Evaluate cybersecurity strategies and learn how you can improve them Who this book is for If you're a cybersecurity professional or ethical hacker who wants to build intelligent systems using the power of machine learning and AI, you'll find this book useful. …”
Libro electrónico -
895Publicado 2012“…Baichtal has written dozens of articles, including pieces for AKE , the D&D publication Kobold Quarterly , and 2600: The Hacker Quarterly . He has contributed to Wired.com’s GeekDad blog for four years and blogged at Make: Online for two, publishing more than 1,500 posts during that time. …”
Libro electrónico -
896Publicado 2013“…He holds 28 industry certifications, including CISSP, ISSAP, Certified Ethical Hacker, Certified Hacking Forensics Investigator, EC Council Certified Security Administrator, and EC Council Certified Instructor. …”
Libro electrónico -
897por Knittel, Brian“…• Take a quick guided tour of everything that’s new in Windows 8.1 • Survive without the Start menu • Navigate the Windows 8.1 interface (and customize it to make yourself more comfortable) • Learn hidden shortcuts you’d never find on your own • Quickly locate and use files, media, apps, websites and management tools • Set up your Web connection, and discover Internet Explorer 11’s latest improvements • Get comfortable with Windows 8.1’s built-in apps, from Calendar and Finance to Weather and Windows Store • Save time by monitoring Facebook, Twitter, and LinkedIn through one unified app • Make the most of Windows’ supercharged media and imaging tools • Profit from Windows’ built-in support for business presentations • Maximize the performance and efficiency of hardware, storage, and software • Protect yourself from viruses, spyware, data theft, fraud, spam, hackers, and snoops • Use SkyDrive to access your data from anywhere—and use Remote Desktop to access your computer, too • Get even more power with Windows 8.1’s command-line interface • Use Hyper-V to run other operating systems alongside Windows • Troubleshoot the most common Windows 8.1’s problems—and the toughest ones In Depth offers: • Comprehensive coverage, with detailed solutions • Breakthrough techniques and shortcuts that are unavailable elsewhere • Practical, real-world examples with nothing glossed over or left out • Troubleshooting help for tough problems you can’t fix on your own • Outstanding authors recognized worldwide for their expertise and teaching styles • Quick information via sidebars, tips, reminders, notes, and warnings In Depth is the only tool you need to get more done in less time! …”
Publicado 2014
Libro electrónico -
898Publicado 2023“…What you will learn Grasp the psychological concepts and principles used in social engineering attacks Distinguish the different types of social engineering attacks Examine the impact of social engineering on social networks Find out how attackers leverage OSINT tools to perform more successful attacks Walk through the social engineering lifecycle Get a glimpse of the capabilities of Social Engineering Toolkit (SET) Who this book is for This book is for cybersecurity enthusiasts, ethical hackers, penetration testers, IT administrators, cybersecurity analysts, or anyone concerned with cybersecurity, privacy, and risk management. …”
Libro electrónico -
899Publicado 2024“…What you will learn Conduct vulnerability scans with Nikto and Burp Suite Execute directory fuzzing with Feroxbuster Detect and exploit SQL injections using SQL Map Uncover and mitigate XSS vulnerabilities Safeguard against CSRF and SSRF threats Implement JWT attack strategies for security Audience This course is ideal for cybersecurity enthusiasts, IT professionals, and aspiring ethical hackers seeking to deepen their understanding of web app vulnerabilities. …”
Video -
900Publicado 2024“…What you will learn Understand the concept of password cracking Discover how OSINT potentially identifies passwords from breaches Address how to crack common hash types effectively Identify, extract, and crack Windows and macOS password hashes Get up to speed with WPA/WPA2 architecture Explore popular password managers such as KeePass, LastPass, and 1Password Format hashes for Bitcoin, Litecoin, and Ethereum wallets, and crack them Who this book is for This book is for cybersecurity professionals, penetration testers, and ethical hackers looking to deepen their understanding of password security and enhance their capabilities in password cracking. …”
Libro electrónico