Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 250
- Security measures 231
- Computer networks 192
- Penetration testing (Computer security) 109
- Hackers 82
- Engineering & Applied Sciences 72
- Computer crimes 48
- Computer Science 44
- Hacking 43
- Internet 37
- Data protection 35
- Operating systems (Computers) 30
- Electrical & Computer Engineering 29
- Examinations 29
- Certification 27
- Prevention 27
- Kali Linux 26
- Telecommunications 26
- Computer hackers 24
- Electronic data processing personnel 24
- Computers 22
- Development 22
- Application software 20
- Information technology 19
- Management 19
- Linux 18
- Access control 17
- Web sites 17
- Computer software 16
- Microsoft Windows (Computer file) 15
-
1por Guillén Núñez, PedroTabla de Contenidos: “…HACKERS:(...) -- PÁGINA LEGAL -- ÍNDICE -- INTRODUCCIÓN -- 1 CONCEPTOS BÁSICOS -- 1.1 AMENAZAS DE SEGURIDAD -- 1.1.1 Ataques pasivos -- 1.1.2 Ataques activos -- 1.2 TIPOS DE ATAQUES -- 1.3 PLATAFORMAS DE ENTRENAMIENTO -- 1.3.1 Damn Vulnerable Linux -- 1.3.2 Metasploitable -- 1.3.3 Damn Vulnerable Linux Web App -- 2 BUSCAR UN VECTOR DE ATAQUE -- 2.1 LOCALIZAR EL OBJETIVO -- 2.1.1 La Foca -- 2.1.2 Bases de datos Whois -- 2.1.3 Consultas DNS inversas -- 2.1.4 Transferencias de zonas DNS no autorizadas -- 2.1.5 Barridos de pings -- 2.1.6 Barridos de paquetes ARP -- 2.1.7 Trazado de rutas -- 2.2 ANALIZAR EL OBJETIVO -- 2.2.1 Identificar los servicios TCP y UDP -- 2.2.2 Identificar el sistema operativo -- 2.2.3 Identificar las versiones de los servicios -- 3 HACKING DE SISTEMAS -- 3.1 ESCANEO DE VULNERABILIDADES -- 3.1.1 Microsoft Baseline Security Analizer (MBSA) -- 3.1.2 GFI Languard -- 3.1.3 Retina Network Security Scanner -- 3.1.4 Shadow Security Scanner -- 3.1.5 Nessus/OpenVAS -- 3.1.6 Sara -- 3.1.7 Contramedidas -- 3.2 EXPLOTAR LAS VULNERNABILIDADES DEL SISTEMA (...) -- 3.2.1 Instalación -- 3.2.2 Buscar sistemas vulnerables -- 3.2.2 Buscar sistemas vulnerables -- 3.2.3 Utilización mediante consola -- 3.2.4 Utilización mediante interfaz web -- 3.2.5 Contramedidas -- 3.2.5 Contramedidas -- 3.3 ATAQUES CONTRA CONTRASEÑAS DE SISTEMAS WINDOWS -- 3.3.1 Obtención del fichero Sam -- 3.3.2 Crackeando el Sam (...) -- 3.3.3 Obtener la contraseña -- 3.3.4 Postexplotación -- 3.3.5 LiveCD ophcrack -- 3.3.6 Contramedidas -- 3.4 ATAQUES CONTRA CONTRASEÑAS DE SISTEMAS GNU/LINUX -- 3.4.1 John the Ripper -- 3.4.2 @stack LC5 -- 3.4.3 Contramedidas -- 4 HACKING DE REDES -- 4.1 INTRODUCCIÓN -- 4.2 MAN IN THE MIDDLE -- 4.3 ¿CÓMO FUNCIONA ARP? …”
Publicado 2014
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
2Publicado 2020Tabla de Contenidos: “…HACKERS: TÉCNICAS Y HERRAMIENTAS PARA ATACAR Y DEFENDERNOS -- PÁGINA LEGAL -- ÍNDICE -- DESCARGO DE RESPONSABILIDAD -- INTRODUCCIÓN -- 1- EMPEZANDO A CONOCER EL MUNDO HACKER -- ¿QUÉ ES UN HACKER? …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
3
-
4por Levy, StevenTabla de Contenidos: “…Table of Contents; Preface; Who's Who: The Wizards and Their Machines; Part I. True Hackers: Cambridge: The Fifties and Sixties; Chapter 1. …”
Publicado 2010
Libro electrónico -
5
-
6
-
7
-
8
-
9
-
10Publicado 2015Tabla de Contenidos: “…Medieval hackers? -- Hacking bread laws -- The first hacker Bible -- Tyndale and the Joye of piracy -- Selling statutes -- Homo hacker? …”
Libro electrónico -
11Publicado 2019Materias: “…Hackers…”
Libro electrónico -
12Publicado 2017Tabla de Contenidos: “…What type of hacker are you? -- How hackers hack -- Profile: Bruce Schneier -- Social engineering -- Profile: Kevin Mitnick -- Software vulnerabilities -- Profile: Michael Howard -- Profile: Gary McGraw -- Malware -- Profile: Susan Bradley -- Profile: Mark Russinovich -- Cryptography -- Profile: Martin Hellman -- Intrusion detection/APTs -- Profile: Dr. …”
Libro electrónico -
13Publicado 2021“…"The computer world is like an intellectual Wild West, in which you can shoot anyone you wish with your ideas, if you're willing to risk the consequences."--Hackers & Painters: Big Ideas from the Computer Age, by Paul Graham We are living in the computer age, in a world increasingly designed and engineered by computer programmers and software designers, by people who call themselves hackers. …”
Grabación no musical -
14por Graham, Paul, 1964-Tabla de Contenidos: “…Why nerds are unpopular: their minds are not on the game -- Hackers and painters: hackers are makers, like painters or architects or writers -- What you can't say: how to think heretical thoughts and what to do with them -- Good bad attitude: like Americans, hackers win by breaking rules -- The other road ahead: web-based software offers the biggest opportunity since the arrival of the microcomputer -- How to make wealth: the best way to get rich is to create wealth. …”
Publicado 2011
Libro electrónico -
15Publicado 2016Tabla de Contenidos: “…-- Further Forensic Investigation -- Gathering Data -- Summarizing My Findings -- Fake FPGAs -- The White Screen Issue -- Incorrect ID Codes -- The Solution -- Closing Thoughts -- part 3: what open hardware means to me -- Chapter 6. the story of chumby -- A Hacker-Friendly Platform -- Evolving chumby -- A More Hackable Device -- Hardware with No Secrets -- The End of Chumby, New Adventures -- Why the Best Days of Open Hardware Are Yet to Come -- Where We Came From: Open to Closed -- Where We Are: "Sit and Wait" vs. …”
Libro electrónico -
16Publicado 2017Materias:Libro electrónico
-
17
-
18
-
19por Kadavy, DavidTabla de Contenidos: “…Design for Hackers: Reverse-Engineering Beauty; About the Author; Credits; Acknowledgments; Contents; Introduction; Design as Literacy; The Hacker Attitude; The Gap in Design Knowledge; Part I: Understanding Design; Chapter 1: Why Design Matters; What Design Really Is; What Design Is Not; The Layers of Design; Conclusion; Chapter 2: The Purpose of Design; Visual Design and Its Relation to User Experience Design; Sometimes a Visual Design Is Just Good Enough; Sometimes Visual Design Is Your Advantage; Reverse-Engineering the Twitter User Experience; Knowledge Applied; Part II: Medium and Form…”
Publicado 2011
Libro electrónico -
20por Goldstein, Emmanuel J.Tabla de Contenidos: “…Dear Hacker: Letters to the Editor of 2600; About the Author; Contents; Introduction; Chapter 1: Question Upon Question; Chapter 2: Tales from the Retail Front; Chapter 3: The Challenges of Life as a Hacker; Chapter 4: Technology; Chapter 5: The Magic of the Corporate World; Chapter 6: Our Biggest Fans; Chapter 7: Behind the Walls; Chapter 8: A Culture of Rebels; Chapter 9: Strange Ramblings; Index…”
Publicado 2010
Libro electrónico