Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 249
- Security measures 231
- Computer networks 192
- Penetration testing (Computer security) 109
- Hackers 82
- Engineering & Applied Sciences 72
- Computer crimes 47
- Computer Science 44
- Hacking 43
- Internet 37
- Data protection 35
- Operating systems (Computers) 30
- Electrical & Computer Engineering 29
- Examinations 29
- Certification 27
- Prevention 27
- Kali Linux 26
- Telecommunications 26
- Electronic data processing personnel 24
- Computer hackers 23
- Computers 22
- Development 22
- Application software 20
- Wittgenstein, Ludwig 20
- Historia 19
- Information technology 19
- Management 19
- Linux 18
- Access control 17
- Web sites 17
-
941Publicado 2018“…It’s not just that we need to find space for our increasingly large collections of photos, videos, music, and apps—we want it to be available whenever we need it, and be sure that it’s safe from hackers and thieves. Every Mac includes internal storage in the form of a hard drive, SSD, or Fusion drive. …”
Libro electrónico -
942Publicado 2007“…To “fuzz,” you attach a program’s inputs to a source of random data, and then systematically identify the failures that arise. Hackers have relied on fuzzing for years: Now, it’s your turn. …”
Libro electrónico -
943Publicado 2019“…The real-world guide to defeating hackers and keeping your business secure Many books discuss the technical underpinnings and complex configurations necessary for cybersecurity—but they fail to address the everyday steps that boards, managers, and employees can take to prevent attacks. …”
Libro electrónico -
944Publicado 2019“…Penetration testing is the attempt to professionally break in to an organisation's systems by exploiting any vulnerabilities, with the goal of determining whether an organisation's IT systems and resources are secure. As hackers and would-be cyber attackers become increasingly more brazen, penetration testing has become an essential practice. …”
Libro electrónico -
945Publicado 2024“…Then, it moves on to social engineering, showing you how hackers trick people into giving away their information. …”
Video -
946por Timmis, Harold“…Arduino boards have impressed both hackers and professional engineers. Whether you're a hobbyist or a professional, it isn't just a breadboard and a hazy idea that keeps you going. …”
Publicado 2011
Libro electrónico -
947por Okereafor, Kenneth“…Despite their effectiveness for remote work and online interactions, cyberspace alternatives ignited several Cybersecurity challenges. Malicious hackers capitalized on global anxiety and launched cyberattacks against unsuspecting victims. …”
Publicado 2021
Libro electrónico -
948Publicado 2016“…Thanks to this book, every Raspberry Pi owner can understand how the computer works and how to access all of its hardware and software capabilities. Now, students, hackers, and casual users alike can discover how computers work with Learning Computer Architecture with the Raspberry Pi . …”
Libro electrónico -
949Publicado 2020“…The first section will take you through the free version of Elementor and teach you how to build an entire one-page website for a fictional company that we will call the White Hat Hackers. You will learn about various building techniques such as working with widgets, building an image carousel, adding a Google map to your web page, creating and inserting a contact form, and working with page templates. …”
-
950Publicado 2013“…Find out how to install the operating system and connect to other devices Install, use and remove software like a pro Learn basic Linux systems administration Program with Scratch, Python and Minecraft on your Raspberry Pi The Raspberry Pi has awakened a whole new generation of hardware geeks, hackers and hobbyists, and now it's your turn to join their ranks. …”
Libro electrónico -
951Publicado 2024“…Drawing on in-depth interviews with designers, developers, activists, and users, along with twenty years of mailing lists, design documents, reporting, and legal papers, Collier traces Tor's evolution from those early days to its current operation on the frontlines of global digital power -- including the strange collaboration between US military scientists and a group of freewheeling hackers called the Cypherpunks. As Collier charts the rise and fall of three different cultures in Tor's diverse community -- the engineers, the maintainers, and the activists, each with a distinct understanding of and vision for Tor -- he reckons with Tor's complicated, changing relationship with contemporary US empire. …”
Libro electrónico -
952Publicado 1997“…Attacks on government Web sites, break-ins at Internet service providers, electronic credit card fraud, invasion of personal privacy by merchants as well as hackers--is this what the World Wide Web is really all about? …”
Libro electrónico -
953Publicado 2005“…And, of course, this greatly expanded second edition also includes all the need-to-know details about the security technologies featured in SP 2, so you can better defend yourself against viruses, worms, and hackers. Readers even receive guidelines and instructions for installing SP2 on their PC, or across a network of computers. …”
Libro electrónico -
954Publicado 2022“…In a ransomware attack, hackers use malware to encrypt network files, locking users out of the system until a ransom is paid to a cybercriminal. …”
Video -
955por Tascón, Mario, 1962-“…Trucos de experto, explicación de las principales abreviaturas y parte de los códigos ocultos que utilizan los hackers y los más jóvenes completan una obra perfecta para quien sienta curiosidad por cómo está cambiando la comunicación y sirva de guía a quienes quieran participar en este nuevo mundo de forma activa…”
Publicado 2011
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad de Navarra, Biblioteca Universidad de Deusto)Libro -
956por Johnson, Deborah G., 1945-“…El resto de la obra está dedicado a temas tan fundamentales en el uso cotidiano de la informática como: derechos de propiedad en el software; los ordenadores y la intimidad; abuso y delito del hacker; responsabilidad legal y responsabilidad moral; implicaciones sociales de la informática. …”
Publicado 1996
Biblioteca Universidad de Deusto (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca de Pastoral Madrid, Biblioteca Universitat Ramon Llull)Libro -
957Publicado 2014“…Install software, configure, and connect your Raspberry Pi to other devices Master basic Linux System Admin to better understand nomenclature and conventions Write basic productivity and multimedia programs in Scratch and Python Extend capabilities with add-ons like Gertboard, Arduino, and more The Raspberry Pi has become a full-fledged phenomenon, popular with tinkerers, hackers, experimenters, and inventors. If you want to get started but aren't sure where to begin, Raspberry Pi User Guide, 3rd Edition contains everything you need…”
Libro electrónico -
958por Grossman, Wendy, author“…Among the issues covered are net scams, class divisions on the net, privacy issues, the Communications Decency Act, women online, pornography, hackers and the computer underground, net criminals and sociopaths, and more.Full text online version at www.nyupress.org/netwars…”
Publicado 2019
Libro electrónico -
959Publicado 2018“…Use técnicas de sandboxing, técnicas de testes internos e de terceiros e aprenda a pensar como um hacker. Implemente um ciclo de manutenção determinando quando e como atualizar o software de sua aplicação. …”
Libro electrónico -
960Publicado 2018“…By the time you finish, you will be able to launch attacks and test the security of websites and web applications in exactly the same way that black hat hackers would do, fix these vulnerabilities, and secure websites from them. …”