Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 249
- Security measures 231
- Computer networks 192
- Penetration testing (Computer security) 109
- Hackers 82
- Engineering & Applied Sciences 72
- Computer crimes 47
- Computer Science 44
- Hacking 43
- Internet 37
- Data protection 35
- Operating systems (Computers) 30
- Electrical & Computer Engineering 29
- Examinations 29
- Certification 27
- Prevention 27
- Kali Linux 26
- Telecommunications 26
- Electronic data processing personnel 24
- Computer hackers 23
- Computers 22
- Development 22
- Application software 20
- Wittgenstein, Ludwig 20
- Historia 19
- Information technology 19
- Management 19
- Linux 18
- Access control 17
- Web sites 17
-
981Publicado 2016“…A practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world About This Book Learn to design and implement cyber security strategies for your organization Learn to protect cyber-physical systems and utilize forensic data analysis to beat vulnerabilities in your IoT ecosystem Learn best practices to secure your data from device to the cloud Gain insight into privacy-enhancing techniques and technologies Who This Book Is For This book targets IT Security Professionals and Security Engineers (including pentesters, security architects and ethical hackers) who would like to ensure security of their organization's data when connected through the IoT. …”
Libro electrónico -
982Publicado 2015“…An ideal introduction and a quick reference to PCI DSS version 3.1 All businesses that accept payment cards are prey for hackers and criminal gangs trying to steal financial information and commit identity fraud. …”
Libro electrónico -
983Publicado 2019“…This outstanding group provided the conference attendees (thousands of software developers, programmers, architects, engineers, CxOs, hackers, geeks, and analysts) with the opportunity to explore the latest open source tools and technologies; get expert in-depth training in crucial languages, frameworks, and best practices; and gain exposure to the open source stack in all its possible configurations. …”
-
984“…You will discover techniques, methods, and tools that are equally used by hackers and penetration testers to gather intelligence about a specific target online. …”
Libro electrónico -
985por Ledeneva, Alena“…Bruce Schneier, author of A Hacker's Mind 'Alena Ledeneva's latest database of rule bending is a goldmine for documentary makers and storytellers. …”
Publicado 2024
Libro electrónico -
986por Strickland, James R. author“…Junk Box Arduino is the ultimate have-fun-while-challenging-your-skills guide for Arduino hackers who’ve gone beyond the basic tutorials and are ready for adventures in electronics. …”
Publicado 2016
Libro electrónico -
987Publicado 2016“…Learn the art of building a low-cost, portable hacking arsenal using Raspberry Pi 3 and Kali Linux 2 About This Book Quickly turn your Raspberry Pi 3 into a low-cost hacking tool using Kali Linux 2 Protect your confidential data by deftly preventing various network security attacks Use Raspberry Pi 3 as honeypots to warn you that hackers are on your wire Who This Book Is For If you are a computer enthusiast who wants to learn advanced hacking techniques using the Raspberry Pi 3 as your pentesting toolbox, then this book is for you. …”
Libro electrónico -
988Publicado 2016“…Learn how to · Identify and prioritize potential threats to your network · Use basic networking knowledge to improve security · Get inside the minds of hackers, so you can deter their attacks · Implement a proven layered approach to network security · Resist modern social engineering attacks · Defend against today’s most common Denial of Service (DoS) attacks · Halt viruses, spyware, worms, Trojans, and other malware · Prevent problems arising from malfeasance or ignorance · Choose the best encryption methods for your organization · Compare security technologies, including the latest security appliances · Implement security policies that will work in your environment · Scan your network for vulnerabilities · Evaluate potential security consultants · Master basic computer forensics and know what to do if you’re attacked · Learn how cyberterrorism and information warfare are evolving…”
Libro electrónico -
989Publicado 2018“…Use an open source firewall and features such as failover, load balancer, OpenVPN, IPSec, and Squid to protect your network Key Features Explore pfSense, a trusted open source network security solution Configure pfSense as a firewall and create and manage firewall rules Test pfSense for failover and load balancing across multiple WAN connections Book Description While connected to the internet, you're a potential target for an array of cyber threats, such as hackers, keyloggers, and Trojans that attack through unpatched security holes. …”
Libro electrónico -
990Publicado 2016“…Assuring Security by Penetration Testing is a fully focused, structured book providing guidance on developing practical penetration testing skills by demonstrating cutting-edge hacker tools and techniques with a coherent, step-by-step approach. …”
Libro electrónico -
991por Parker, Carey. author“…This book is not about protecting yourself from a targeted attack by the NSA; it's about armoring yourself against common hackers and mass surveillance. There are dozens of no-brainer things we all should be doing to protect our computers and safeguard our data—just like wearing a seat belt, installing smoke alarms, and putting on sunscreen. …”
Publicado 2018
Libro electrónico -
992por Carthern, Chris. author, Wilson, William. author, Rivera, Noel. author, Bedwell, Richard. author“…This book differentiates itself from other Cisco books on the market by approaching network security from a hacker’s perspective. Not only does it provide network security recommendations but it teaches you how to use black-hat tools such as oclHashcat, Loki, Burp Suite, Scapy, Metasploit, and Kali to actually test the security concepts learned. …”
Publicado 2015
Libro electrónico -
993Publicado 2015“…In addition to all the content you’ve come to expect from prior editions, this newly revised edition includes all-new coverage of topics such as: • How smartphones and tablet PCs put the power of a desktop computer in your hands–literally • How computing technology is linking our homes, work place, entertainment, and daily communications • How advances such as Facebook, Twitter, Google, eBay, and smartphones are expanding our universe of friends, knowledge, and opportunity • How increased miniaturization leads to new products, such as smartphone, smartwatches, and Google Glass • How computing technology takes advantages of quantum physics and innovations no one even imagined a few years ago For two decades, How Computers Work has helped newbies understand new technology, while hackers and IT pros have treasured it for the depth of knowledge it contains. …”
Libro electrónico -
994Publicado 2003“…Our new Hacks books are written in the spirit of the true hackers -- the people who drive innovation…”
Libro electrónico -
995Publicado 2020“…Wale Soyinka is a father, system administrator, a DevOps/SecOps aficionado, an open source evangelist, a hacker, and a well-respected world-renowned chef (in his mind). …”
Libro electrónico -
996Publicado 2004“…No matter which Windows server you use--NT, IIS, 2000, or 2003--this book will put the knowledge and expertise of veteran system administrators and hackers to work for you. Windows Server Hacks will make your life easier while expanding your understanding of the capabilities of Windows Server…”
Libro electrónico -
997Publicado 2011“…TAB, an imprint of McGraw-Hill Professional, is a leading publisher of DIY technology books for makers, hackers, and electronics hobbyists…”
Libro electrónico -
998Publicado 2020“…What you will learn Focus on how to defend against SQL injection attacks Understand web application security Get up and running with a variety of SQL injection concepts Become well-versed with different SQL injection scenarios Discover SQL injection manual attack techniques Delve into SQL injection automated techniques Who this book is for This book is ideal for penetration testers, ethical hackers, or anyone who wants to learn about SQL injection and the various attack and defense strategies against this web security vulnerability. …”
Libro electrónico -
999Publicado 2018“…IT pentester, Security consultants, and ethical hackers will also find this course useful. Prior knowledge of penetration testing would be beneficial. …”
Libro electrónico -
1000por Haber, Morey J. author“…When unmanaged, these privileged credentials pose a significant threat from external hackers and insider threats. We are experiencing an expanding universe of privileged accounts almost everywhere. …”
Publicado 2020
Libro electrónico