Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 249
- Security measures 231
- Computer networks 192
- Penetration testing (Computer security) 109
- Hackers 82
- Engineering & Applied Sciences 72
- Computer crimes 47
- Computer Science 44
- Hacking 43
- Internet 37
- Data protection 35
- Operating systems (Computers) 30
- Electrical & Computer Engineering 29
- Examinations 29
- Certification 27
- Prevention 27
- Kali Linux 26
- Telecommunications 26
- Electronic data processing personnel 24
- Computer hackers 23
- Computers 22
- Development 22
- Application software 20
- Wittgenstein, Ludwig 20
- Historia 19
- Information technology 19
- Management 19
- Linux 18
- Access control 17
- Web sites 17
-
901Publicado 2005“…Explore the sleazy spammer business practices, the surprising new partnership between spammers and computer hackers, and the rise of a new breed of computer viruses designed to turn the PCs of innocent bystanders into secret spam factories…”
Libro electrónico -
902Publicado 2020“…Despite its reputation as a language only of spies and hackers, cryptography plays a critical role in our everyday lives. …”
Libro electrónico -
903Publicado 2022“…Inan age of viruses and hackers, electronic eavesdropping, and electronic fraudon a global scale, security is paramount. …”
Libro electrónico -
904Publicado 2018“…Your one-stop guide to using Python, creating your own hacking tools, and making the most out of resources available for this programming language About This Book Comprehensive information on building a web application penetration testing framework using Python Master web application penetration testing using the multi-paradigm programming language Python Detect vulnerabilities in a system or application by writing your own Python scripts Who This Book Is For This book is for ethical hackers; penetration testers; students preparing for OSCP, OSCE, GPEN, GXPN, and CEH; information security professionals; cybersecurity consultants; system and network security administrators; and programmers who are keen on learning all about penetration testing. …”
Libro electrónico -
905Publicado 2017“…About This Book Discover techniques to integrate Metasploit with the industry's leading tools Carry out penetration testing in highly-secured environments with Metasploit and acquire skills to build your defense against organized and complex attacks Using the Metasploit framework, develop exploits and generate modules for a variety of real-world scenarios Who This Book Is For This course is for penetration testers, ethical hackers, and security professionals who'd like to master the Metasploit framework and explore approaches to carrying out advanced penetration testing to build highly secure networks. …”
Libro electrónico -
906Publicado 2018“…One area that shows great potential in the battle against hackers and their exploits is machine learning. Unleashing the increasing power and finesse of these systems toward defeating intrusions and data theft is no longer a theoretical pursuit. …”
Video -
907Publicado 2018“…One area that shows great potential in the battle against hackers and their exploits is machine learning. Unleashing the increasing power and finesse of these systems toward defeating intrusions and data theft is no longer a theoretical pursuit. …”
Video -
908Publicado 2018“…One area that shows great potential in the battle against hackers and their exploits is machine learning. Unleashing the increasing power and finesse of these systems toward defeating intrusions and data theft is no longer a theoretical pursuit. …”
Video -
909Publicado 2007“…Protection from Viruses 15. Protection from Hackers 16. Productivity 17. Intelligent Monitor Management 18. …”
Libro electrónico -
910Publicado 2016“…Você precisará iniciar como um cientista de dados com habilidades de hackers. Atualmente, a grande massa de dados contém respostas para perguntas que ninguém nunca pensou em perguntar. …”
Libro electrónico -
911Publicado 2018“…What You Will Learn Exploit your network and perform penetration tests Footprint and scan networks and websites for vulnerabilities Be aware of key vulnerabilities to watch out for within your network and website Who This Video Is For Network security experts, web security specialists, application security experts, penetration testers, and ethical hackers…”
-
912por Ollam, Deviant“…This material is all new and focuses on locks currently in use as well as ones that have recently emerged on the market. Hackers and pen testers or persons tasked with defending their infrastructure and property from invasion will find these techniques uniquely valuable. …”
Publicado 2012
Libro electrónico -
913Publicado 2018“…Adversaries and hackers have gained significant and distinct advantages in cyber warfare today. …”
Libro electrónico -
914por Bakir, Ahmed. author“…You'll also review new API's like Face ID and new design considerations, and look more closely at SSL and how to make IoT connected apps more resistant to hackers. The coverage of Apple Watch has been expanded as well. …”
Publicado 2018
Libro electrónico -
915Publicado 2015“…Join the Raspberry revolution with these fun and easy Pi projects The Raspberry Pi has opened up a whole new world of innovation for everyone from hardware hackers and programmers to students, hobbyists, engineers, and beyond. …”
Libro electrónico -
916Publicado 2004“…Newspaper headlines are routinely peppered with incidents of hackers thwarting the security put forth by the government and the private sector. …”
Libro electrónico -
917por Craft, Brock“…Discover all the amazing things you can do with ArduinoArduino is a programmable circuit board that is being used by everyone from scientists, programmers, and hardware hackers to artists, designers, hobbyists, and engineers in order to add interactivity to objects and projects and experiment with programming and electronics. …”
Publicado 2013
Libro electrónico -
918Publicado 2013“…Discover why ID theft is more dangerous than ever, and discover today's most dangerous new threats -- including attacks targeting medical records, personal finance and online banking sites, the elderly, and military service members. Meet the hackers and organized crime groups who want to steal your identity and money -- and learn how to protect your data and your life! …”
Libro electrónico -
919por Schneier, Bruce, 1963-“…-PC Magazine ". . .the bible of code hackers." -The Millennium Whole Earth Catalog This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. …”
Publicado 1996
Libro electrónico -
920Publicado 2019“…The rise of new technologies in our lives, which has taken us from powerful mobile phones to fitness trackers and smart appliances in under a decade, has also raised the need for everyone who uses these to protect themselves from cyber scams and hackers. Every new device and online service you use that improves your life also opens new doors for attackers looking to discover your passwords, banking accounts, personal photos, and anything else you want to keep secret.In Cyber Smart, author Bart McDonough uses his extensive cybersecurity experience speaking at conferences for the FBI, major financial institutions, and other clients to answer the most common question he hears: "How can I protect myself at home, on a personal level, away from the office?" …”
Grabación musical