Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 1,381
- Management 690
- History 667
- Development 643
- Application software 580
- Engineering & Applied Sciences 564
- Computer networks 533
- Security measures 472
- Computer security 439
- Computer Science 380
- Filosofía 370
- Computer programs 368
- Operating systems (Computers) 354
- Database management 333
- Data processing 302
- Universidad Pontificia de Salamanca (España) 291
- Programming 280
- Design 267
- Derecho 262
- Information technology 262
- Computer programming 254
- Cloud computing 252
- Computer software 247
- Crítica e interpretación 242
- Web site development 235
- Novela norteamericana 232
- Web sites 226
- Leadership 215
- Documentales 199
- Photography 193
-
181por Flickenger, RobTabla de Contenidos: “…CVS: Adding and Removing Files and DirectoriesRemoving Files; Removing Directories; CVS: Branching Development; CVS: Watching and Locking Files; CVS: Keeping CVS Secure; Remote Repositories; Permissions; Developer Machines; CVS: Anonymous Repositories; Creating an Anonymous Repository; Installing pserver; Using a Remote pserver; Backups; Backing Up with tar over ssh; See also:; Using rsync over ssh; See also:; Archiving with Pax; Creating Archives; Expanding Archives; Interactive Restores; Recursively Copy a Directory; Incremental Backups; Skipping Files on Restore; See also…”
Publicado 2003
Libro electrónico -
182por Krikorian, RaffiTabla de Contenidos: “…TiVo Remote Control Hacks; 1.2. Remote Control Hacks; 1.3. Backdoor Hacks; 1. …”
Publicado 2003
Libro electrónico -
183
-
184por Paul, Joshua“…With digital video, the hacking possibilities are now limitless, for both amateurs and professional artists. …”
Publicado 2005
Libro electrónico -
185por Gralla, PrestonTabla de Contenidos: “…Miscellaneous Startup and Shutdown Hacks; 1.7.2. Automatically Turn On Num Lock, Scroll Lock, and Caps Lock; 1.7.3. …”
Publicado 2005
Libro electrónico -
186Publicado 2011Tabla de Contenidos: “…Retro Gaming Hacks; A Note Regarding Supplemental Files; Foreword; Credits; About the Author; Contributors; Acknowledgements; Preface; Why Retro Gaming Hacks?…”
Libro electrónico -
187por Lockhart, AndrewTabla de Contenidos: “…Check for Passwords That Never Expire; Running the Hack; 3. …”
Publicado 2007
Libro electrónico -
188por Von Hagen, WilliamTabla de Contenidos: “…Linux Server Hacks, Volume Two; Contributors; Acknowledgments; Preface; How to Use This Book; How This Book Is Organized; Conventions Used in This Book; Using Code Examples; How to Contact Us; Safari® Enabled; Got a Hack?…”
Publicado 2005
Libro electrónico -
189por Hale-Evans, RonTabla de Contenidos: “…Scamper for Ideas; How It Works; In Real Life; End Notes; 23. Deck Yourself Out; The Creative Whack Pack; The Observation Deck; In Real Life; End Notes; See Also; 24. …”
Publicado 2006
Libro electrónico -
190por Gibson, RichTabla de Contenidos: “…API tips and tricks -- Ch. 7. Extreme Google maps hacks…”
Publicado 2006
Libro electrónico -
191
-
192Publicado 2009“…This book will teach you how to: Import your entire movie collection, sync with multiple computers, and save YouTube videos Remotely access your home network, audio, and video, and even control your desktop Develop native applications for the iPhone and iPod touch on Linux, Windows, or Mac Check email, receive MMS messages, use IRC, and record full-motion video Run any application in the iPhone's background, and mirror its display on a TV Make your iPhone emulate old-school video game platforms, and play classic console and arcade games Integrate your iPhone with your car stereo Build your own electronic bridges to connect keyboards, serial devices, and more to your iPhone without "jailbreaking" iPhone Hacks explains how to set up your iPhone the way you want it, and helps you give it capabilities that will rival your desktop computer. …”
Libro electrónico -
193por Dwivedi, HimanshuTabla de Contenidos: “…EncryptionSIP Security Attacks; Username Enumeration; SIP Password Retrieval; Man-in-the-Middle Attack; Registration Hijacking; Spoofing SIP Proxy Servers and Registrars; Denial of Service via BYE Message; Denial of Service via REGISTER; Denial of Service via Un-register; Fuzzing SIP; Summary; 3: Signaling: H.323 Security; H.323 Security Basics; Enumeration; Authentication; Authorization; H.323 Security Attacks; Username Enumeration (H.323 ID); H.323 Password Retrieval; H.323 Replay Attack; H.323 Endpoint Spoofing (E.164 Alias); E.164 Alias Enumeration; E.164 Hopping Attacks…”
Publicado 2008
Libro electrónico -
194
-
195
-
196
-
197por Loewengart, VictoriaTabla de Contenidos: “…Cover; Title; Copyright; Preface; About The Author; Acknowledgements; Contents; Introduction; Chapter 1: Background; Chapter 2: Crimeware Products; "Zero Day" exploit toolkits; "Zeus"; "SpyEye"; "Darkness" DDoS botnet tool; Chapter 3: Unintentional Crimeware; SkyGrabber; Passware Kit; Maltego; Chapter 4: The Present and The Future; Chapter 5: Fighting Back; How to protect yourself from botnet infections; Active defense; Conclusion; Authoritative Sources Of Information; Bibliography; ITG Resources…”
Publicado 2012
Libro electrónico -
198Publicado 2013Tabla de Contenidos: “…The Mobile Risk Ecosystem -- Hacking the Cellular Network -- iOS -- Android -- Mobile Malware -- Mobile Services and Mobile Web -- Mobile Device Management -- Mobile Development Security -- Mobile Payments -- Consumer Security Checklist -- Security Checklist -- Mobile Application Penetration Testing Toolkit -- iOS Pen Test Toolkit -- Android Pen Test Toolkit…”
Libro electrónico -
199por Cache, Johnny“…Hacking exposed, wireless wireless security secrets and solutions…”
Publicado 2010
Libro electrónico -
200por Wiles, JackTabla de Contenidos: “…Bomb threats in ChicagoCheck those phone closets; Remove a few door signs; Review video security logs; Consider adding motion-sensing lights; Subterranean vulnerabilities; Clean Out Your Elephant Burial Ground; Spot Check Those Drop Ceilings; Internal auditors are your friends; BONUS: Home Security Tips; Summary; Chapter 3: More about locks and ways to low tech hack them; A little more about locks and lock picking; What kinds of locks are the most popular?…”
Publicado 2012
Libro electrónico