Mostrando 941 - 960 Resultados de 1,058 Para Buscar '"hacker"', tiempo de consulta: 0.07s Limitar resultados
  1. 941
    Publicado 2018
    “…It’s not just that we need to find space for our increasingly large collections of photos, videos, music, and apps—we want it to be available whenever we need it, and be sure that it’s safe from hackers and thieves. Every Mac includes internal storage in the form of a hard drive, SSD, or Fusion drive. …”
    Libro electrónico
  2. 942
    Publicado 2007
    “…To “fuzz,” you attach a program’s inputs to a source of random data, and then systematically identify the failures that arise. Hackers have relied on fuzzing for years: Now, it’s your turn. …”
    Libro electrónico
  3. 943
    Publicado 2019
    “…The real-world guide to defeating hackers and keeping your business secure Many books discuss the technical underpinnings and complex configurations necessary for cybersecurity—but they fail to address the everyday steps that boards, managers, and employees can take to prevent attacks. …”
    Libro electrónico
  4. 944
    Publicado 2019
    “…Penetration testing is the attempt to professionally break in to an organisation's systems by exploiting any vulnerabilities, with the goal of determining whether an organisation's IT systems and resources are secure. As hackers and would-be cyber attackers become increasingly more brazen, penetration testing has become an essential practice. …”
    Libro electrónico
  5. 945
    Publicado 2024
    “…Then, it moves on to social engineering, showing you how hackers trick people into giving away their information. …”
    Video
  6. 946
    por Timmis, Harold
    Publicado 2011
    “…Arduino boards have impressed both hackers and professional engineers. Whether you're a hobbyist or a professional, it isn't just a breadboard and a hazy idea that keeps you going. …”
    Libro electrónico
  7. 947
    por Okereafor, Kenneth
    Publicado 2021
    “…Despite their effectiveness for remote work and online interactions, cyberspace alternatives ignited several Cybersecurity challenges. Malicious hackers capitalized on global anxiety and launched cyberattacks against unsuspecting victims. …”
    Libro electrónico
  8. 948
    Publicado 2016
    “…Thanks to this book, every Raspberry Pi owner can understand how the computer works and how to access all of its hardware and software capabilities. Now, students, hackers, and casual users alike can discover how computers work with Learning Computer Architecture with the Raspberry Pi . …”
    Libro electrónico
  9. 949
    Publicado 2020
    “…The first section will take you through the free version of Elementor and teach you how to build an entire one-page website for a fictional company that we will call the White Hat Hackers. You will learn about various building techniques such as working with widgets, building an image carousel, adding a Google map to your web page, creating and inserting a contact form, and working with page templates. …”
    Video
  10. 950
    Publicado 2013
    “…Find out how to install the operating system and connect to other devices Install, use and remove software like a pro Learn basic Linux systems administration Program with Scratch, Python and Minecraft on your Raspberry Pi The Raspberry Pi has awakened a whole new generation of hardware geeks, hackers and hobbyists, and now it's your turn to join their ranks. …”
    Libro electrónico
  11. 951
    Publicado 2024
    “…Drawing on in-depth interviews with designers, developers, activists, and users, along with twenty years of mailing lists, design documents, reporting, and legal papers, Collier traces Tor's evolution from those early days to its current operation on the frontlines of global digital power -- including the strange collaboration between US military scientists and a group of freewheeling hackers called the Cypherpunks. As Collier charts the rise and fall of three different cultures in Tor's diverse community -- the engineers, the maintainers, and the activists, each with a distinct understanding of and vision for Tor -- he reckons with Tor's complicated, changing relationship with contemporary US empire. …”
    Libro electrónico
  12. 952
    Publicado 1997
    “…Attacks on government Web sites, break-ins at Internet service providers, electronic credit card fraud, invasion of personal privacy by merchants as well as hackers--is this what the World Wide Web is really all about? …”
    Libro electrónico
  13. 953
    Publicado 2005
    “…And, of course, this greatly expanded second edition also includes all the need-to-know details about the security technologies featured in SP 2, so you can better defend yourself against viruses, worms, and hackers. Readers even receive guidelines and instructions for installing SP2 on their PC, or across a network of computers. …”
    Libro electrónico
  14. 954
    Publicado 2022
    “…In a ransomware attack, hackers use malware to encrypt network files, locking users out of the system until a ransom is paid to a cybercriminal. …”
    Video
  15. 955
    por Tascón, Mario, 1962-
    Publicado 2011
    “…Trucos de experto, explicación de las principales abreviaturas y parte de los códigos ocultos que utilizan los hackers y los más jóvenes completan una obra perfecta para quien sienta curiosidad por cómo está cambiando la comunicación y sirva de guía a quienes quieran participar en este nuevo mundo de forma activa…”
    Libro
  16. 956
    por Johnson, Deborah G., 1945-
    Publicado 1996
    “…El resto de la obra está dedicado a temas tan fundamentales en el uso cotidiano de la informática como: derechos de propiedad en el software; los ordenadores y la intimidad; abuso y delito del hacker; responsabilidad legal y responsabilidad moral; implicaciones sociales de la informática. …”
    Libro
  17. 957
    Publicado 2014
    “…Install software, configure, and connect your Raspberry Pi to other devices Master basic Linux System Admin to better understand nomenclature and conventions Write basic productivity and multimedia programs in Scratch and Python Extend capabilities with add-ons like Gertboard, Arduino, and more The Raspberry Pi has become a full-fledged phenomenon, popular with tinkerers, hackers, experimenters, and inventors. If you want to get started but aren't sure where to begin, Raspberry Pi User Guide, 3rd Edition contains everything you need…”
    Libro electrónico
  18. 958
    por Grossman, Wendy, author
    Publicado 2019
    “…Among the issues covered are net scams, class divisions on the net, privacy issues, the Communications Decency Act, women online, pornography, hackers and the computer underground, net criminals and sociopaths, and more.Full text online version at www.nyupress.org/netwars…”
    Libro electrónico
  19. 959
    Publicado 2018
    “…Use técnicas de sandboxing, técnicas de testes internos e de terceiros e aprenda a pensar como um hacker. Implemente um ciclo de manutenção determinando quando e como atualizar o software de sua aplicação. …”
    Libro electrónico
  20. 960
    Publicado 2018
    “…By the time you finish, you will be able to launch attacks and test the security of websites and web applications in exactly the same way that black hat hackers would do, fix these vulnerabilities, and secure websites from them. …”
    Video