Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 250
- Security measures 231
- Computer networks 192
- Penetration testing (Computer security) 109
- Hackers 82
- Engineering & Applied Sciences 72
- Computer crimes 48
- Computer Science 44
- Hacking 43
- Internet 37
- Data protection 35
- Operating systems (Computers) 30
- Electrical & Computer Engineering 29
- Examinations 29
- Certification 27
- Prevention 27
- Kali Linux 26
- Telecommunications 26
- Computer hackers 24
- Electronic data processing personnel 24
- Computers 22
- Development 22
- Application software 20
- Information technology 19
- Management 19
- Linux 18
- Access control 17
- Web sites 17
- Computer software 16
- Microsoft Windows (Computer file) 15
-
101
-
102por Berek, Jonathan S.
Publicado 2010Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
103
-
104por Hacker, PaulTabla de Contenidos: “…Vorwort des Herausgebers - Zur redaktionellen Bearbeitung - Paul Hacker, Studien zum Realismus I.S.Turgenevs - Beobachtung als Grundlage von Turgenevs Kunst - Die Bedeutung der Gegenwartsnähe für das Schaffen Turgenevs - Turgenevs Aesthetik…”
Publicado 1988
Tesis -
105
-
106por Raymond, Eric S.Materias: “…Hackers.…”
Click para texto completo desde fuera UPSA
Click para texto completo desde UPSA
Libro electrónico -
107Publicado 2017“…EducaçÃμes, culturas e hackers…”
Libro electrónico -
108Publicado 2021“…13+ Hours of Video Instruction Designed to help you pass the EC-Council Certified Ethical Hacker (CEH) certification exam. Overview: The Certified Ethical Hacker (CEH) Complete Video Course, 3rd Edition gives you a complete overview of the topics in the EC-Council's updated Certified Ethical Hacker (CEH), V11 exam. …”
Video -
109Publicado 2014“…How do high-growth businesses, world-class heart surgeons, and underdog marketers beat the norm? Like computer hackers, a handful of innovators in every era use lateral thinking to find better routes to stunning accomplishments. …”
Libro electrónico -
110Publicado 2019“…18+ Hours of Video Instruction Learn everything you need to know to pass the Certified Ethical Hacker exam. Overview Certified Ethical Hacker (CEH) Complete Video Course provides a complete overview of the topics contained in the EC-Council Blueprint for the CEH exam. …”
-
111por Dube, RogerTabla de Contenidos: “…Hardware-Based Computer Security Techniques to Defeat Hackers; CONTENTS; 1 THE ELEMENTS OF COMPUTER SECURITY; Cryptography; Symmetric Key Cryptography; Asymmetric Key Cryptography; Passwords and Keys; Password/Key Strength; Password/Key Storage and Theft; Passwords and Authentication; Something You Know; Something You Have; Something You Are; Random-Number Generators; Pseudo-Random-Number Generators (PRGs); Hardware-Based Random-Number Generators; Hybrid Hardware/Software Random-Number Generators; Key Generation; Security and the Internet; References; 2 CRYPTOGRAPHY APPROACHES AND ATTACKS…”
Publicado 2008
Libro electrónico -
112
-
113
-
114
-
115
-
116
-
117
-
118Publicado 1999Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca Universidad de Deusto)Libro
-
119Publicado 1999Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca Universidad de Deusto)Libro
-
120