Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 249
- Security measures 231
- Computer networks 192
- Penetration testing (Computer security) 109
- Hackers 82
- Engineering & Applied Sciences 72
- Computer crimes 47
- Computer Science 44
- Hacking 43
- Internet 37
- Data protection 35
- Operating systems (Computers) 30
- Electrical & Computer Engineering 29
- Examinations 29
- Certification 27
- Prevention 27
- Kali Linux 26
- Telecommunications 26
- Electronic data processing personnel 24
- Computer hackers 23
- Computers 22
- Development 22
- Application software 20
- Wittgenstein, Ludwig 20
- Historia 19
- Information technology 19
- Management 19
- Linux 18
- Access control 17
- Web sites 17
-
961Publicado 2019“…Make your Spring app 100% Safe with Spring Security About This Video Use Spring Security to secure your Spring service Understand OAuth2 flow and integration with the Spring application Make your app secure by preventing CORS and CSRF attacks In Detail Securing your application from hackers is the most high-pressure concerns for developers. …”
-
962Publicado 2016“…An ideal introduction and a quick reference to PCI DSS version 3.2 All businesses that accept payment cards are prey for hackers and criminal gangs trying to steal financial information and commit identity fraud. …”
Libro electrónico -
963Publicado 2015“…Top WordPress expert John LeMasney walks you through setting up your WordPress development environment, including a complete LAMP stack (Linux, Apache, MySQL, PHP); working with WordPress databases and configuration files; safeguarding WordPress from hackers and spammers; controlling the WordPress engine through functions, hooks, classes, and methods; defining the structure, appearance, and behavior of new themes; using plugins to add powerful new functionality without changing the WordPress engine; and finding the resources and mastering the terminology you need to become an advanced WordPress developer. …”
-
964por Barnett, Ryan C.“…As companies have improved perimeter security, hackers have increasingly focused on attacking Apache Web servers and Web applications. …”
Publicado 2005
Libro electrónico -
965Publicado 2018“…Discover the most common web vulnerabilities and prevent them from becoming a threat to your site's security Key Features Familiarize yourself with the most common web vulnerabilities Conduct a preliminary assessment of attack surfaces and run exploits in your lab Explore new tools in the Kali Linux ecosystem for web penetration testing Book Description Web applications are a huge point of attack for malicious hackers and a critical area for security professionals and penetration testers to lock down and secure. …”
Libro electrónico -
966Publicado 2005“…Understand the total cost of ownership and return on investment for network security solutions Understand what motivates hackers and how to classify threats Learn how to recognize common vulnerabilities and common types of attacks Examine modern day security systems, devices, and mitigation techniques Integrate policies and personnel with security equipment to effectively lessen security risks Analyze the greater implications of security breaches facing corporations and executives today Understand the governance aspects of network security to help implement a climate of change throughout your organization Learn how to qualify your organization’s aversion to risk Quantify the hard costs of attacks versus the cost of security technology investment to determine ROI Learn the essential elements of security policy development and how to continually assess security needs and vulnerabilities The Business Case for Network Security: Advocacy, Governance, and ROI addresses the needs of networking professionals and business executives who seek to assess their organization’s risks and objectively quantify both costs and cost savings related to network security technology investments. …”
Libro electrónico -
967Publicado 2004“…With the release of Windows XP Service Pack 2 (SP2), Microsoft latest and most reliable corporate desktop operating system now provides better protection against viruses, worms, and malicious hackers. SP2 includes Windows Firewall, Pop-up Blocker for Internet Explorer, and the new Windows Security Center. …”
Libro electrónico -
968Publicado 2009“…The authors survey the techniques hackers might use to try to breach your network, such as IPv6 network reconnaissance, address spoofing, traffic interception, denial of service, and tunnel injection. …”
Libro electrónico -
969Publicado 2019“…Explore the latest ethical hacking tools and techniques in Kali Linux 2019 to perform penetration testing from scratch Key Features Get up and running with Kali Linux 2019.2 Gain comprehensive insights into security concepts such as social engineering, wireless network exploitation, and web application attacks Learn to use Linux commands in the way ethical hackers do to gain control of your environment Book Description The current rise in hacking and security breaches makes it more important than ever to effectively pentest your environment, ensuring endpoint protection. …”
Libro electrónico -
970Publicado 2019“…Secret military buildups. Hackers and viruses. Weapons deployed in space. China and Russia (and Iran and North Korea) spark news stories here by carrying out bold acts of aggression and violating international laws and norms. …”
Libro -
971Publicado 2016“…Explore Garmin’s ability to collect data from users and return timely results to them Start developing for Connect IQ by using templates for four kinds of apps Work with example projects in Connect IQ, including ways to read data from an ANT+ sensor Get developer resources for building wearable apps that do more with less Brian Jepson is an O'Reilly editor, hacker, and co-organizer of Providence Geeks and the Rhode Island Mini Maker Faire. …”
Libro electrónico -
972Publicado 2021“…Peter Deutsch: Author of Ghostscript, implementer of Smalltalk-80 at Xerox PARC and Lisp 1.5 on PDP-1 Brendan Eich: Inventor of JavaScript, CTO of the Mozilla Corporation Brad Fitzpatrick: Writer of LiveJournal, OpenID, memcached, and Perlbal Dan Ingalls: Smalltalk implementor and designer Simon Peyton Jones: Coinventor of Haskell and lead designer of Glasgow Haskell Compiler Donald Knuth: Author of The Art of Computer Programming and creator of TeX Peter Norvig: Director of Research at Google and author of the standard text on AI Guy Steele: Coinventor of Scheme and part of the Common Lisp Gang of Five, currently working on Fortress Ken Thompson: Inventor of UNIX Jamie Zawinski: Author of XEmacs and early Netscape/Mozilla hacker…”
Grabación no musical -
973Publicado 2011“…TAB, an imprint of McGraw-Hill Professional, is a leading publisher of DIY technology books for makers, hackers, and electronics hobbyists…”
Libro electrónico -
974por Seibel, Peter“…Peter Deutsch: Author of Ghostscript, implementer of Smalltalk-80 at Xerox PARC and Lisp 1.5 on PDP-1 Brendan Eich: Inventor of JavaScript, CTO of the Mozilla Corporation Brad Fitzpatrick: Writer of LiveJournal, OpenID, memcached, and Perlbal Dan Ingalls: Smalltalk implementor and designer Simon Peyton Jones: Coinventor of Haskell and lead designer of Glasgow Haskell Compiler Donald Knuth: Author of The Art of Computer Programming and creator of TeX Peter Norvig: Director of Research at Google and author of the standard text on AI Guy Steele: Coinventor of Scheme and part of the Common Lisp Gang of Five, currently working on Fortress Ken Thompson: Inventor of UNIX Jamie Zawinski: Author of XEmacs and early Netscape/Mozilla hacker…”
Publicado 2009
Libro electrónico -
975Publicado 2016“…He holds the LPIC-1, Linux+, SUSE CLA Linux Administrator, Network+, A+, Security+, Solaris Administrator, and Certified Ethical Hacker certifications…”
-
976Publicado 2022“…Secure programming techniques are used throughout the book to demonstrate the proper way to defend against hackers. You will learn how to plan and create MySQL/MariaDB databases and access them using PHP. …”
Libro electrónico -
977Publicado 2019“…"The first part of the 21st century will likely go down in history as the era when ethical hackers opened governments. The line of transparency is moving by force. …”
Libro electrónico -
978Publicado 2024“…What you will learn Understand Kerberoasting and its tools Crack complex passwords using Hashcat Explore John the Ripper's functionalities Utilize Unity Ads for game monetization Create leaderboards and social elements Develop proficiency in Unity C# scripting Who this book is for This course is ideal for cybersecurity enthusiasts, IT professionals, and ethical hackers. Basic knowledge of Kali Linux and password security principles is recommended. …”
Libro electrónico -
979Publicado 2017“…In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. …”
Libro electrónico -
980por Rawsthorn, Alice“…From the macabre symbol with which eighteenth-century pirates terrorized their victims into surrender, to one woman’s quest for the best prosthetic legs, to the evolution of the World Cup soccer ball, Hello World describes how warlords, scientists, farmers, hackers, activists, and professional designers have used the complex, often elusive process of design to different ends throughout history. …”
Publicado 2014
Libro