Mostrando 1,041 - 1,058 Resultados de 1,058 Para Buscar '"hacker"', tiempo de consulta: 0.08s Limitar resultados
  1. 1041
    Publicado 2023
    “…Mike's certifications include GIAC Security Essentials; Azure Fundamentals; Microsoft 365 Fundamentals; Cybersec First Responder; CompTIA ITF+, A+, Network+, Security+, Project+; MCP; MCT; MCDST; MCITP; MCTS; MCSA; MCSE; MCDBA; Certified Ethical Hacker; Certified Wireless Administrator; Certified Internet Web Professional."…”
    Video
  2. 1042
    Publicado 2023
    “…This comprehensive book explores the latest challenges in web application security, providing you with an in-depth understanding of hackers' methods and the practical knowledge and skills needed to effectively understand web attacks. …”
    Libro electrónico
  3. 1043
    Publicado 2007
    “…In addition to all the content you’ve come to expect from prior editions, this newly revised edition includes all-new coverage of topics such as: • How tablet PCs put the power of a PC quite literally in your hands • How Windows Vista makes your Windows desktop translucent and makes your PC more secure • How advances in optical disc technology such as dual-layer DVD, HD-DVD, and Blu-Ray discs continue to push the envelope • How Apple’s new iPhone is revolutionizing what cell phones can do • How BitTorrent technology enables anyone to share information with everyone For a decade, How Computers Work has helped newbies understand new technology, while at the same time hackers and IT pros have treasured it for the depth of knowledge it contains. …”
    Libro electrónico
  4. 1044
    por Gagné, Marcel
    Publicado 2006
    “…—Jenn Vesperman, Linuxchix.org “Gagné’s Moving to Linux is a straightforward exposition of just how a non-hacker PC user can get rid of ‘The Blue Screen of Death’. …”
    Libro electrónico
  5. 1045
    por Mutton, Paul
    Publicado 2004
    “…IRC Hacks is a collection of tips and tools that cover just about everything needed to become a true IRC master, featuring contributions from some of the most renowned IRC hackers, many of whom collaborated on IRC, grouping together to form the channel #irchacks on the freenode IRC network (irc.freenode.net).Like all of our Hacks books, there are many different ways to use IRC Hacks . …”
    Libro electrónico
  6. 1046
    Publicado 2009
    “…• Did you know that hackers are snooping around your IP address right now, while you read this? …”
    Libro electrónico
  7. 1047
    Publicado 2024
    “…In a nutshell, he is a serial entrepreneur, techie, life hacker, expert PM, and MBA (x2), but at heart, he is also an educator. …”
    Video
  8. 1048
    Publicado 2024
    “…AI builders (developers and engineers) will learn how to create secure systems, while cybersecurity professionals, such as security architects, analysts, engineers, ethical hackers, penetration testers, and incident responders will discover methods to combat threats and mitigate risks posed by attackers. …”
    Libro electrónico
  9. 1049
    Publicado 2022
    “…A través de esta monografía intentamos dar respuesta a fenómenos como la ciberdelincuencia, entender la sociedad virtual y la categorización de personas como migrantes digitales y nativos digitales, así como el nacimiento de categorías de delincuentes considerados como hackers y crackers. Para la investigación de una delincuencia que aprovecha las TIC se necesitan diligencias armadas tecnológicamente que cuenten con una base legal que justifique su uso, así como con personal preparado que pueda emplear con habilidad herramientas para llevar a cabo la investigación y el posterior enjuiciamiento de este tipo de delitos. …”
    Libro
  10. 1050
    por Waschke, Marvin. author
    Publicado 2017
    “…What You'll Learn Discover how computer security works and what it can protect us from See how a typical hacker attack works Evaluate computer security threats to the individual user and corporate systems Identify the critical vulnerabilities of a computer connected to the Internet Manage your computer to reduce vulnerabilities to yourself and your employer Discover how the adoption of newer forms of biometric authentication affects you Stop your router and other online devices from being co-opted into disruptive denial of service attacks Who This Book Is For Proficient and technically knowledgeable computer users who are anxious about cybercrime and want to understand the technology behind both attack and defense but do not want to go so far as to become security experts. …”
    Libro electrónico
  11. 1051
    Publicado 2024
    “…Certifications: GIAC Security Essentials; Azure Fundamentals; Microsoft 365 Fundamentals; Cybersec First Responder; CompTIA ITF+, A+, Network+, Security+, Project+; MCP; MCT; MCDST; MCITP; MCTS; MCSA; MCSE; MCDBA; Certified Ethical Hacker; Certified Wireless Administrator; Certified Internet Web Professional…”
    Video
  12. 1052
    Publicado 2014
    “…Skill Level All Levels What You Will Learn A solid understanding of 3D printing How to create and manipulate 3D computer graphics models using free open source software and how to prepare a computer model for printing How to set up, configure, and operate a consumer-grade desktop 3D printer Who Should Take This Course Those with a general interest in 3D printing Industrial designers, sculptors, and anyone studying in arts/design/industrial innovation areas DIYers, members of hacker spaces and maker spaces, artists, engineers, and manufacturers Course Requirements Beginner level—general interest Table of Contents Introduction Lesson 1: Introduction to 3D Printing Learning objectives 1.1 Understand 3D printing 1.2 Understand plastic extrusion 1.3 Understand digital light processing DLP resin 1.4 Understand direct laser metal sintering Lesson 2: 3D Modeling with Blender Learning objectives 2.1 Install Blender 2.2 Understand Blender basics 2.3 Understand basic modeling with Blender Lesson 3: Intermediate Modeling with Blender Learning objectives 3.1 Understand more advanced Blender techniques—Part I 3.2 Understand more advanced Blender techniques—Part II Lesson 4: Slicing and Dicing Learning objectives 4.1 Understand slicing and different slicing applications 4.2 Understand Gcode 4.3 Understand slic3r parameters 4.4 Understand Solar1 Slicer and Skeinforge 4.5 Troubleshoot when things go wrong Lesson 5: Printing Learning objectives 5.1 Unders..…”
    Video
  13. 1053
    Publicado 2021
    Acceso desde SUMMA, acceso abierto
    Acceso desde SUMMA, acceso abierto
    Video
  14. 1054
    Publicado 2023
    “…Jason Haddix is the CISO and ""Hacker in Charge"" at BuddoBot, a world-class adversary emulation consultancy. …”
    Video
  15. 1055
    Publicado 2024
    “…Certifications: GIAC Security Essentials; Azure Fundamentals; Microsoft 365 Fundamentals; Cybersec First Responder; CompTIA ITF+, A+, Network+, Security+, Project+; MCP; MCT; MCDST; MCITP; MCTS; MCSA; MCSE; MCDBA; Certified Ethical Hacker; Certified Wireless Administrator; Certified Internet Web Professional Cherokee Boose: Cherokee Boose started as a computer technician and moved to a network administrator role. …”
    Video
  16. 1056
    Publicado 2020
    “…What You Will Learn Discern which attacks are easy to prevent, and which are more challenging, in the framework Dig into ASP.NET Core 3.1 source code to understand how the security services work Establish a baseline for understanding how to design more secure software Properly apply cryptography in software development Take a deep dive into web security concepts Validate input in a way that allows legitimate traffic but blocks malicious traffic Understand parameterized queries and why they are so important to ASP.NET Core Fix issues in a well-implemented solution Know how the new logging system in ASP.NET Core falls short of security needs Incorporate security into your software development process This book is for software developers who have experience creating websites in ASP.NET and want to know how to make their websites secure from hackers and security professionals who work with a development team that uses ASP.NET Core. …”
    Libro electrónico
  17. 1057
    Publicado 2022
    “…In addition to his experience with performing security audits and assessments, Gregg has authored or coauthored more than 20 books, including Certified Ethical Hacker Exam Prep (Que), CISSP Exam Cram 2 (Que), and Security Administrator Street Smarts (Sybex). …”
    Video
  18. 1058
    por Marta Peirano
    Publicado 2015
    Texto completo en Odilo
    Otros