Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 250
- Security measures 231
- Computer networks 192
- Penetration testing (Computer security) 109
- Hackers 82
- Engineering & Applied Sciences 72
- Computer crimes 48
- Computer Science 44
- Hacking 43
- Internet 37
- Data protection 35
- Operating systems (Computers) 30
- Electrical & Computer Engineering 29
- Examinations 29
- Certification 27
- Prevention 27
- Kali Linux 26
- Telecommunications 26
- Computer hackers 24
- Electronic data processing personnel 24
- Computers 22
- Development 22
- Application software 20
- Information technology 19
- Management 19
- Linux 18
- Access control 17
- Web sites 17
- Computer software 16
- Microsoft Windows (Computer file) 15
-
161por Baker, Gordon P.
Publicado 1980Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Biblioteca Universidad de Deusto)Libro -
162
-
163
-
164
-
165
-
166
-
167
-
168Publicado 2005Tabla de Contenidos: “…Hacking the casinos for a million bucks -- When terrorists come calling -- The Texas prison hack -- Cops and robbers -- The Robin Hood hacker --The wisdom and folly of penetration testing -- Of course your bank is secure, right? …”
Libro electrónico -
169
-
170
-
171Publicado 2000Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
172Publicado 2011Tabla de Contenidos: “….); WITTGENSTEIN: FILOSOFÍA DE LA (...); HACKER EN TORNO A LOS CONCEPTOS; ANTROPOLOGÍA O HISTORIA NATURAL; EL ENFOQUE ETNOLÓGICO DE (...); HACKER SOBRE WITTGENSTEIN; OBSERVACIONES SOBRE LA ANTROPOLOGÍA (...); ABREVIATURAS; BIOGRAFÍAS DE LOS AUTORES…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
173Publicado 2022Materias:Libro electrónico
-
174
-
175Publicado 2016“…CEH v9 : certified ethical hacker version 9 practice tests…”
Libro electrónico -
176Publicado 2017Libro electrónico
-
177Publicado 2011Libro electrónico
-
178Publicado 2025Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Contents at a Glance -- Contents -- Introduction -- What to Expect -- Chapter 1 The Human Years -- The Odyssey 2 -- The Commodore 64 -- Newb Before It Was a Thing -- Windows into the Corporate World -- A Hacker Is Born -- A Life Divided -- Flesh Is Stronger Than Steel -- Chapter 2 A Change in Direction -- Into the Light -- Road Warrior -- Chapter 3 Symbiotic Attack Vector -- Tap-to-Pwn -- My First Attack: Dinner and a Show -- Chapter 4 Transhumanism: We Who Are Not As Others -- A Brief History of Transhumanism -- I, Cyborg -- Bad Intentions -- Notes -- Chapter 5 Using Their Laws Against Them -- Prepare for Takeoff Seat Backs and Tray Tables -- Obfuscation by Law -- Chapter 6 A Technological Rebirth -- Finding My Techno-shaman -- Honey, We Need to Talk -- Chapter 7 My First Installs -- Human MFA -- Touching Digital -- Cyberpunk in Downtown Austin -- I Am Machine -- Physical Meets Biological -- Digital Lockpicks -- Magnetic Vision -- My Tools -- Note -- Chapter 8 I Am the Cyber Threat -- Mobile Devices -- L3pr@cy Attack -- Fl3h-H00k Attack -- Implant a Man-in-the-Middle Attack -- Implant Phishing/Smishing Attack -- Implant Automation Attack -- Physical Access -- H@nd-h@k3 -- Magnetic Tracing -- Notes -- Chapter 9 Living the Transhuman Life -- VivoKey Chips -- VivoKey Spark 2 -- VivoKey Apex -- Cheeseburger Use Cases -- Walletmor -- NeXT Chip and BioMagnet -- Chapter 10 I'm Hackable -- Identity Evolution -- Cultural Significance -- What Is "Acceptable"? …”
Libro electrónico -
179
-
180Publicado 1973Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca Universidad de Deusto)Libro