Mostrando 901 - 920 Resultados de 1,058 Para Buscar '"hacker"', tiempo de consulta: 0.07s Limitar resultados
  1. 901
    Publicado 2005
    “…Explore the sleazy spammer business practices, the surprising new partnership between spammers and computer hackers, and the rise of a new breed of computer viruses designed to turn the PCs of innocent bystanders into secret spam factories…”
    Libro electrónico
  2. 902
    Publicado 2020
    “…Despite its reputation as a language only of spies and hackers, cryptography plays a critical role in our everyday lives. …”
    Libro electrónico
  3. 903
    Publicado 2022
    “…Inan age of viruses and hackers, electronic eavesdropping, and electronic fraudon a global scale, security is paramount. …”
    Libro electrónico
  4. 904
    Publicado 2018
    “…Your one-stop guide to using Python, creating your own hacking tools, and making the most out of resources available for this programming language About This Book Comprehensive information on building a web application penetration testing framework using Python Master web application penetration testing using the multi-paradigm programming language Python Detect vulnerabilities in a system or application by writing your own Python scripts Who This Book Is For This book is for ethical hackers; penetration testers; students preparing for OSCP, OSCE, GPEN, GXPN, and CEH; information security professionals; cybersecurity consultants; system and network security administrators; and programmers who are keen on learning all about penetration testing. …”
    Libro electrónico
  5. 905
    Publicado 2017
    “…About This Book Discover techniques to integrate Metasploit with the industry's leading tools Carry out penetration testing in highly-secured environments with Metasploit and acquire skills to build your defense against organized and complex attacks Using the Metasploit framework, develop exploits and generate modules for a variety of real-world scenarios Who This Book Is For This course is for penetration testers, ethical hackers, and security professionals who'd like to master the Metasploit framework and explore approaches to carrying out advanced penetration testing to build highly secure networks. …”
    Libro electrónico
  6. 906
    Publicado 2018
    “…One area that shows great potential in the battle against hackers and their exploits is machine learning. Unleashing the increasing power and finesse of these systems toward defeating intrusions and data theft is no longer a theoretical pursuit. …”
    Video
  7. 907
    Publicado 2018
    “…One area that shows great potential in the battle against hackers and their exploits is machine learning. Unleashing the increasing power and finesse of these systems toward defeating intrusions and data theft is no longer a theoretical pursuit. …”
    Video
  8. 908
    Publicado 2018
    “…One area that shows great potential in the battle against hackers and their exploits is machine learning. Unleashing the increasing power and finesse of these systems toward defeating intrusions and data theft is no longer a theoretical pursuit. …”
    Video
  9. 909
    Publicado 2007
    “…Protection from Viruses 15. Protection from Hackers 16. Productivity 17. Intelligent Monitor Management 18. …”
    Libro electrónico
  10. 910
    Publicado 2016
    “…Você precisará iniciar como um cientista de dados com habilidades de hackers. Atualmente, a grande massa de dados contém respostas para perguntas que ninguém nunca pensou em perguntar. …”
    Libro electrónico
  11. 911
    Publicado 2018
    “…What You Will Learn Exploit your network and perform penetration tests Footprint and scan networks and websites for vulnerabilities Be aware of key vulnerabilities to watch out for within your network and website Who This Video Is For Network security experts, web security specialists, application security experts, penetration testers, and ethical hackers…”
    Video
  12. 912
    por Ollam, Deviant
    Publicado 2012
    “…This material is all new and focuses on locks currently in use as well as ones that have recently emerged on the market. Hackers and pen testers or persons tasked with defending their infrastructure and property from invasion will find these techniques uniquely valuable. …”
    Libro electrónico
  13. 913
    Publicado 2018
    “…Adversaries and hackers have gained significant and distinct advantages in cyber warfare today. …”
    Libro electrónico
  14. 914
    por Bakir, Ahmed. author
    Publicado 2018
    “…You'll also review new API's like Face ID and new design considerations, and look more closely at SSL and how to make IoT connected apps more resistant to hackers. The coverage of Apple Watch has been expanded as well. …”
    Libro electrónico
  15. 915
    Publicado 2015
    “…Join the Raspberry revolution with these fun and easy Pi projects The Raspberry Pi has opened up a whole new world of innovation for everyone from hardware hackers and programmers to students, hobbyists, engineers, and beyond. …”
    Libro electrónico
  16. 916
    Publicado 2004
    “…Newspaper headlines are routinely peppered with incidents of hackers thwarting the security put forth by the government and the private sector. …”
    Libro electrónico
  17. 917
    por Craft, Brock
    Publicado 2013
    “…Discover all the amazing things you can do with ArduinoArduino is a programmable circuit board that is being used by everyone from scientists, programmers, and hardware hackers to artists, designers, hobbyists, and engineers in order to add interactivity to objects and projects and experiment with programming and electronics. …”
    Libro electrónico
  18. 918
    Publicado 2013
    “…Discover why ID theft is more dangerous than ever, and discover today's most dangerous new threats -- including attacks targeting medical records, personal finance and online banking sites, the elderly, and military service members. Meet the hackers and organized crime groups who want to steal your identity and money -- and learn how to protect your data and your life! …”
    Libro electrónico
  19. 919
    por Schneier, Bruce, 1963-
    Publicado 1996
    “…-PC Magazine ". . .the bible of code hackers." -The Millennium Whole Earth Catalog This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. …”
    Libro electrónico
  20. 920
    Publicado 2019
    “…The rise of new technologies in our lives, which has taken us from powerful mobile phones to fitness trackers and smart appliances in under a decade, has also raised the need for everyone who uses these to protect themselves from cyber scams and hackers. Every new device and online service you use that improves your life also opens new doors for attackers looking to discover your passwords, banking accounts, personal photos, and anything else you want to keep secret.In Cyber Smart, author Bart McDonough uses his extensive cybersecurity experience speaking at conferences for the FBI, major financial institutions, and other clients to answer the most common question he hears: "How can I protect myself at home, on a personal level, away from the office?" …”
    Grabación musical