Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 250
- Security measures 231
- Computer networks 192
- Penetration testing (Computer security) 109
- Hackers 82
- Engineering & Applied Sciences 72
- Computer crimes 48
- Computer Science 44
- Hacking 43
- Internet 37
- Data protection 35
- Operating systems (Computers) 30
- Electrical & Computer Engineering 29
- Examinations 29
- Certification 27
- Prevention 27
- Kali Linux 26
- Telecommunications 26
- Computer hackers 24
- Electronic data processing personnel 24
- Computers 22
- Development 22
- Application software 20
- Information technology 19
- Management 19
- Linux 18
- Access control 17
- Web sites 17
- Computer software 16
- Microsoft Windows (Computer file) 15
-
921Publicado 2024“…You'll learn how to choose the right hackathon platforms, structure, and communication strategy, and manage hackers, mentors, jury groups, and partnerships to serve your hackathon purpose and achieve impactful results. …”
Libro electrónico -
922por Boyraz, Guven“…What you will learn Gain insight into current cybersecurity threats targeting endpoints Understand why antivirus solutions are no longer sufficient for robust security Explore popular EDR/XDR tools and their implementation Master the integration of EDR tools into your security operations Uncover evasion techniques employed by hackers in the EDR/XDR context Get hands-on experience utilizing DNS logs for endpoint defense Apply effective endpoint hardening techniques within your organization Who this book is for If you're an IT professional seeking to safeguard yourself and your company's digital assets, this book is for you. …”
Publicado 2024
Libro electrónico -
923Publicado 2024“…Get up to speed with API security using this comprehensive guide full of best practices for building safer and secure APIs Key Features Develop a profound understanding of the inner workings of APIs with a sharp focus on security Learn the tools and techniques employed by API security testers and hackers, establishing your own hacking laboratory Master the art of building robust APIs with shift-left and shield-right approaches, spanning the API lifecycle Purchase of the print or Kindle book includes a free PDF eBook Book Description Along with the exponential growth of API adoption comes a rise in security concerns about their implementation and inherent vulnerabilities. …”
Libro electrónico -
924Publicado 2024“…Whether you're an experienced Python developer looking to enhance offensive security skills, an ethical hacker, a penetration tester eager to learn advanced Python techniques, or a cybersecurity enthusiast exploring Python's potential in vulnerability analysis, you'll find valuable insights. …”
Libro electrónico -
925Publicado 2023“…In a nutshell, he is a serial entrepreneur, techie, life hacker, expert PM, and MBA (x2), but at heart, he is also an educator. …”
Video -
926Publicado 2023“…Mike's certifications include GIAC Security Essentials; Azure Fundamentals; Microsoft 365 Fundamentals; Cybersec First Responder; CompTIA ITF+, A+, Network+, Security+, Project+; MCP; MCT; MCDST; MCITP; MCTS; MCSA; MCSE; MCDBA; Certified Ethical Hacker; Certified Wireless Administrator; Certified Internet Web Professional."…”
Video -
927Publicado 2023“…This comprehensive book explores the latest challenges in web application security, providing you with an in-depth understanding of hackers' methods and the practical knowledge and skills needed to effectively understand web attacks. …”
Libro electrónico -
928Publicado 2007“…In addition to all the content you’ve come to expect from prior editions, this newly revised edition includes all-new coverage of topics such as: • How tablet PCs put the power of a PC quite literally in your hands • How Windows Vista makes your Windows desktop translucent and makes your PC more secure • How advances in optical disc technology such as dual-layer DVD, HD-DVD, and Blu-Ray discs continue to push the envelope • How Apple’s new iPhone is revolutionizing what cell phones can do • How BitTorrent technology enables anyone to share information with everyone For a decade, How Computers Work has helped newbies understand new technology, while at the same time hackers and IT pros have treasured it for the depth of knowledge it contains. …”
Libro electrónico -
929por Gagné, Marcel“…—Jenn Vesperman, Linuxchix.org “Gagné’s Moving to Linux is a straightforward exposition of just how a non-hacker PC user can get rid of ‘The Blue Screen of Death’. …”
Publicado 2006
Libro electrónico -
930por Mutton, Paul“…IRC Hacks is a collection of tips and tools that cover just about everything needed to become a true IRC master, featuring contributions from some of the most renowned IRC hackers, many of whom collaborated on IRC, grouping together to form the channel #irchacks on the freenode IRC network (irc.freenode.net).Like all of our Hacks books, there are many different ways to use IRC Hacks . …”
Publicado 2004
Libro electrónico -
931Publicado 2009“…• Did you know that hackers are snooping around your IP address right now, while you read this? …”
Libro electrónico -
932Publicado 2024“…In a nutshell, he is a serial entrepreneur, techie, life hacker, expert PM, and MBA (x2), but at heart, he is also an educator. …”
Video -
933Publicado 2024“…AI builders (developers and engineers) will learn how to create secure systems, while cybersecurity professionals, such as security architects, analysts, engineers, ethical hackers, penetration testers, and incident responders will discover methods to combat threats and mitigate risks posed by attackers. …”
Libro electrónico -
934por Waschke, Marvin. author“…What You'll Learn Discover how computer security works and what it can protect us from See how a typical hacker attack works Evaluate computer security threats to the individual user and corporate systems Identify the critical vulnerabilities of a computer connected to the Internet Manage your computer to reduce vulnerabilities to yourself and your employer Discover how the adoption of newer forms of biometric authentication affects you Stop your router and other online devices from being co-opted into disruptive denial of service attacks Who This Book Is For Proficient and technically knowledgeable computer users who are anxious about cybercrime and want to understand the technology behind both attack and defense but do not want to go so far as to become security experts. …”
Publicado 2017
Libro electrónico -
935Publicado 2024“…Certifications: GIAC Security Essentials; Azure Fundamentals; Microsoft 365 Fundamentals; Cybersec First Responder; CompTIA ITF+, A+, Network+, Security+, Project+; MCP; MCT; MCDST; MCITP; MCTS; MCSA; MCSE; MCDBA; Certified Ethical Hacker; Certified Wireless Administrator; Certified Internet Web Professional…”
Video -
936Publicado 2014“…Skill Level All Levels What You Will Learn A solid understanding of 3D printing How to create and manipulate 3D computer graphics models using free open source software and how to prepare a computer model for printing How to set up, configure, and operate a consumer-grade desktop 3D printer Who Should Take This Course Those with a general interest in 3D printing Industrial designers, sculptors, and anyone studying in arts/design/industrial innovation areas DIYers, members of hacker spaces and maker spaces, artists, engineers, and manufacturers Course Requirements Beginner level—general interest Table of Contents Introduction Lesson 1: Introduction to 3D Printing Learning objectives 1.1 Understand 3D printing 1.2 Understand plastic extrusion 1.3 Understand digital light processing DLP resin 1.4 Understand direct laser metal sintering Lesson 2: 3D Modeling with Blender Learning objectives 2.1 Install Blender 2.2 Understand Blender basics 2.3 Understand basic modeling with Blender Lesson 3: Intermediate Modeling with Blender Learning objectives 3.1 Understand more advanced Blender techniques—Part I 3.2 Understand more advanced Blender techniques—Part II Lesson 4: Slicing and Dicing Learning objectives 4.1 Understand slicing and different slicing applications 4.2 Understand Gcode 4.3 Understand slic3r parameters 4.4 Understand Solar1 Slicer and Skeinforge 4.5 Troubleshoot when things go wrong Lesson 5: Printing Learning objectives 5.1 Unders..…”
-
937
-
938Publicado 2023“…Jason Haddix is the CISO and ""Hacker in Charge"" at BuddoBot, a world-class adversary emulation consultancy. …”
Video -
939Publicado 2024“…Certifications: GIAC Security Essentials; Azure Fundamentals; Microsoft 365 Fundamentals; Cybersec First Responder; CompTIA ITF+, A+, Network+, Security+, Project+; MCP; MCT; MCDST; MCITP; MCTS; MCSA; MCSE; MCDBA; Certified Ethical Hacker; Certified Wireless Administrator; Certified Internet Web Professional Cherokee Boose: Cherokee Boose started as a computer technician and moved to a network administrator role. …”
Video -
940Publicado 2020“…What You Will Learn Discern which attacks are easy to prevent, and which are more challenging, in the framework Dig into ASP.NET Core 3.1 source code to understand how the security services work Establish a baseline for understanding how to design more secure software Properly apply cryptography in software development Take a deep dive into web security concepts Validate input in a way that allows legitimate traffic but blocks malicious traffic Understand parameterized queries and why they are so important to ASP.NET Core Fix issues in a well-implemented solution Know how the new logging system in ASP.NET Core falls short of security needs Incorporate security into your software development process This book is for software developers who have experience creating websites in ASP.NET and want to know how to make their websites secure from hackers and security professionals who work with a development team that uses ASP.NET Core. …”
Libro electrónico