Mostrando 981 - 1,000 Resultados de 1,058 Para Buscar '"hacker"', tiempo de consulta: 0.07s Limitar resultados
  1. 981
    Publicado 2016
    “…A practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world About This Book Learn to design and implement cyber security strategies for your organization Learn to protect cyber-physical systems and utilize forensic data analysis to beat vulnerabilities in your IoT ecosystem Learn best practices to secure your data from device to the cloud Gain insight into privacy-enhancing techniques and technologies Who This Book Is For This book targets IT Security Professionals and Security Engineers (including pentesters, security architects and ethical hackers) who would like to ensure security of their organization's data when connected through the IoT. …”
    Libro electrónico
  2. 982
    Publicado 2015
    “…An ideal introduction and a quick reference to PCI DSS version 3.1 All businesses that accept payment cards are prey for hackers and criminal gangs trying to steal financial information and commit identity fraud. …”
    Libro electrónico
  3. 983
    Publicado 2019
    “…This outstanding group provided the conference attendees (thousands of software developers, programmers, architects, engineers, CxOs, hackers, geeks, and analysts) with the opportunity to explore the latest open source tools and technologies; get expert in-depth training in crucial languages, frameworks, and best practices; and gain exposure to the open source stack in all its possible configurations. …”
    Video
  4. 984
    “…You will discover techniques, methods, and tools that are equally used by hackers and penetration testers to gather intelligence about a specific target online. …”
    Libro electrónico
  5. 985
    por Ledeneva, Alena
    Publicado 2024
    “…Bruce Schneier, author of A Hacker's Mind 'Alena Ledeneva's latest database of rule bending is a goldmine for documentary makers and storytellers. …”
    Libro electrónico
  6. 986
    por Strickland, James R. author
    Publicado 2016
    “…Junk Box Arduino is the ultimate have-fun-while-challenging-your-skills guide for Arduino hackers who’ve gone beyond the basic tutorials and are ready for adventures in electronics. …”
    Libro electrónico
  7. 987
    Publicado 2016
    “…Learn the art of building a low-cost, portable hacking arsenal using Raspberry Pi 3 and Kali Linux 2 About This Book Quickly turn your Raspberry Pi 3 into a low-cost hacking tool using Kali Linux 2 Protect your confidential data by deftly preventing various network security attacks Use Raspberry Pi 3 as honeypots to warn you that hackers are on your wire Who This Book Is For If you are a computer enthusiast who wants to learn advanced hacking techniques using the Raspberry Pi 3 as your pentesting toolbox, then this book is for you. …”
    Libro electrónico
  8. 988
    Publicado 2016
    “…Learn how to · Identify and prioritize potential threats to your network · Use basic networking knowledge to improve security · Get inside the minds of hackers, so you can deter their attacks · Implement a proven layered approach to network security · Resist modern social engineering attacks · Defend against today’s most common Denial of Service (DoS) attacks · Halt viruses, spyware, worms, Trojans, and other malware · Prevent problems arising from malfeasance or ignorance · Choose the best encryption methods for your organization · Compare security technologies, including the latest security appliances · Implement security policies that will work in your environment · Scan your network for vulnerabilities · Evaluate potential security consultants · Master basic computer forensics and know what to do if you’re attacked · Learn how cyberterrorism and information warfare are evolving…”
    Libro electrónico
  9. 989
    Publicado 2018
    “…Use an open source firewall and features such as failover, load balancer, OpenVPN, IPSec, and Squid to protect your network Key Features Explore pfSense, a trusted open source network security solution Configure pfSense as a firewall and create and manage firewall rules Test pfSense for failover and load balancing across multiple WAN connections Book Description While connected to the internet, you're a potential target for an array of cyber threats, such as hackers, keyloggers, and Trojans that attack through unpatched security holes. …”
    Libro electrónico
  10. 990
    Publicado 2016
    “…Assuring Security by Penetration Testing is a fully focused, structured book providing guidance on developing practical penetration testing skills by demonstrating cutting-edge hacker tools and techniques with a coherent, step-by-step approach. …”
    Libro electrónico
  11. 991
    por Parker, Carey. author
    Publicado 2018
    “…This book is not about protecting yourself from a targeted attack by the NSA; it's about armoring yourself against common hackers and mass surveillance. There are dozens of no-brainer things we all should be doing to protect our computers and safeguard our data—just like wearing a seat belt, installing smoke alarms, and putting on sunscreen. …”
    Libro electrónico
  12. 992
    “…This book differentiates itself from other Cisco books on the market by approaching network security from a hacker’s perspective. Not only does it provide network security recommendations but it teaches you how to use black-hat tools such as oclHashcat, Loki, Burp Suite, Scapy, Metasploit, and Kali to actually test the security concepts learned. …”
    Libro electrónico
  13. 993
    Publicado 2015
    “…In addition to all the content you’ve come to expect from prior editions, this newly revised edition includes all-new coverage of topics such as: • How smartphones and tablet PCs put the power of a desktop computer in your hands–literally • How computing technology is linking our homes, work place, entertainment, and daily communications • How advances such as Facebook, Twitter, Google, eBay, and smartphones are expanding our universe of friends, knowledge, and opportunity • How increased miniaturization leads to new products, such as smartphone, smartwatches, and Google Glass • How computing technology takes advantages of quantum physics and innovations no one even imagined a few years ago For two decades, How Computers Work has helped newbies understand new technology, while hackers and IT pros have treasured it for the depth of knowledge it contains. …”
    Libro electrónico
  14. 994
    Publicado 2003
    “…Our new Hacks books are written in the spirit of the true hackers -- the people who drive innovation…”
    Libro electrónico
  15. 995
    Publicado 2020
    “…Wale Soyinka is a father, system administrator, a DevOps/SecOps aficionado, an open source evangelist, a hacker, and a well-respected world-renowned chef (in his mind). …”
    Libro electrónico
  16. 996
    Publicado 2004
    “…No matter which Windows server you use--NT, IIS, 2000, or 2003--this book will put the knowledge and expertise of veteran system administrators and hackers to work for you. Windows Server Hacks will make your life easier while expanding your understanding of the capabilities of Windows Server…”
    Libro electrónico
  17. 997
    Publicado 2011
    “…TAB, an imprint of McGraw-Hill Professional, is a leading publisher of DIY technology books for makers, hackers, and electronics hobbyists…”
    Libro electrónico
  18. 998
    Publicado 2020
    “…What you will learn Focus on how to defend against SQL injection attacks Understand web application security Get up and running with a variety of SQL injection concepts Become well-versed with different SQL injection scenarios Discover SQL injection manual attack techniques Delve into SQL injection automated techniques Who this book is for This book is ideal for penetration testers, ethical hackers, or anyone who wants to learn about SQL injection and the various attack and defense strategies against this web security vulnerability. …”
    Libro electrónico
  19. 999
    Publicado 2018
    “…IT pentester, Security consultants, and ethical hackers will also find this course useful. Prior knowledge of penetration testing would be beneficial. …”
    Libro electrónico
  20. 1000
    por Haber, Morey J. author
    Publicado 2020
    “…When unmanaged, these privileged credentials pose a significant threat from external hackers and insider threats. We are experiencing an expanding universe of privileged accounts almost everywhere. …”
    Libro electrónico