Mostrando 2,381 - 2,400 Resultados de 36,165 Para Buscar 'HJCK~', tiempo de consulta: 1.02s Limitar resultados
  1. 2381
    por Hocking, John G.
    Publicado 1970
    Libro
  2. 2382
    Libro
  3. 2383
  4. 2384
    por Bradley, Grose
    Publicado 1998
    Libro
  5. 2385
    Libro
  6. 2386
    por Hacking, Ian
    Publicado 1997
    Libro
  7. 2387
    por Bolton, Teresa Hicks
    Publicado 1922
    Libro
  8. 2388
    Libro
  9. 2389
    Publicado 2023
    Tabla de Contenidos: “…-- Bitcoin-Invested Hedge Funds -- Notes -- Chapter 6 Cryptocurrency Spreads -- Behavioral Economics -- Limited Rationality -- Social Preferences -- Lack of Self-Control -- Notes -- Chapter 7 Altcoin, Stablecoin Utility Coins, and CBDC -- Altcoin -- Stablecoin -- Utility Coins -- Central Bank Digital Currency (CBDC) -- Not Like Before: Digital Currencies Debut Amid COVID-19 -- COVID-19 Has Led to an Increased Interest in Digital Currencies Around the World -- Notes -- Chapter 8 Cryptocurrency Tumblers and Mixing Services -- The European Union -- The United States -- Japan -- Notes -- Chapter 9 The Darknet -- The Darknet and the Epidemics -- About The Onion Router -- Notes -- Chapter 10 Illicit Use of Cryptocurrencies -- Notes…”
    Libro electrónico
  10. 2390
    Publicado 2022
    Materias:
    Libro electrónico
  11. 2391
    Publicado 2017
    Materias:
    Video
  12. 2392
    Publicado 2024
    Materias:
    Libro electrónico
  13. 2393
    Publicado 1998
    Materias: “…Asset-backed financing Law and legislation Periodicals…”
    Tesis
  14. 2394
    Publicado 2014
    “…By the end of the book, you’ll be able to hack and modify existing circuits to create your own unique designs. …”
    Libro electrónico
  15. 2395
    Publicado 2017
    Tabla de Contenidos: “…Identifying the Players -- Smart(er) VBA Document Deployment -- Email and Saved Passwords -- Keyloggers and Cookies -- Bringing It All Together -- Summary -- Exercises -- Chapter 6: Criminal Intelligence -- Payload Delivery Part VI: Deploying with HTA -- Malware Detection -- Privilege Escalation in Microsoft Windows -- Escalating Privileges with Local Exploits -- Exploiting Automated OS Installations -- Exploiting the Task Scheduler -- Exploiting Vulnerable Services -- Hijacking DLLs -- Mining the Windows Registry -- Command and Control Part VI: The Creeper Box -- Creeper Box Specification -- Introducing the Raspberry Pi and Its Components -- GPIO -- Choosing an OS -- Configuring Full-Disk Encryption -- A Word on Stealth -- Configuring Out-of-Band Command and Control Using 3G/4G -- Creating a Transparent Bridge -- Using a Pi as a Wireless AP to Provision Access by Remote Keyloggers -- The Attack -- Spoofing Caller ID and SMS Messages -- Summary -- Exercises -- Chapter 7: War Games -- Background and Mission Briefing -- Payload Delivery Part VII: USB Shotgun Attack -- USB Media -- A Little Social Engineering -- Command and Control Part VII: Advanced Autonomous Data Exfiltration -- What We Mean When We Talk About "Autonomy" -- Means of Egress -- The Attack -- Constructing a Payload to Attack a Classified Network -- Stealthy 3G/4G Software Install -- Attacking the Target and Deploying the Payload -- Efficient "Burst-Rate" Data Exfiltration -- Summary -- Exercises -- Chapter 8: Hack Journalists -- Briefing -- Advanced Concepts in Social Engineering -- Cold Reading -- C2 Part VIII: Experimental Concepts in Command and Control -- Scenario 1: C2 Server Guided Agent Management -- Scenario 2: Semi-Autonomous C2 Agent Management -- Payload Delivery Part VIII: Miscellaneous Rich Web Content -- Java Web Start -- Adobe AIR -- A Word on HTML5 -- The Attack…”
    Libro electrónico
  16. 2396
    Publicado 2010
    Tabla de Contenidos: “…; Think Like a Hacker; Functional Fixedness; A Few Words on Nutrition; Tips for Newbies; Picking a Recipe; Reading Between the Lines; Cooking for One; Cooking for Others; Chapter 2: Initializing the Kitchen; Approaching the Kitchen; Calibrating Your Instruments; Prepping Ingredients; Kitchen Equipment; Bare Minimum Equipment; Standard Kitchen Equipment; Kitchen Organization; O(1) Retrieval; Functional Grouping; Uniform Storage Containers; Counter Layout; Kitchen Pruning; Giving Kitchen Tools As Gifts…”
    Libro electrónico
  17. 2397
    por Karp, David A.
    Publicado 2010
    “…This thorough guide gives you the tools you need to fix the troublesome parts of this operating system, plus the solutions, hacks, and timesaving tips to make the most of your PC. …”
    Libro electrónico
  18. 2398
    Publicado 2009
    “…Chained exploits are far more complex and far more difficult to defend. Few security or hacking books cover them well and most don’t cover them at all. …”
    Libro electrónico
  19. 2399
    por Wilhelm, Thomas
    Publicado 2013
    Tabla de Contenidos: “…Creating and Learning in a Hacking Lab…”
    Libro electrónico
  20. 2400
    Publicado 2018
    Tabla de Contenidos: “…-- The concept of a port scanner -- How to create an efficient port scanner -- Summary -- Chapter 3: Sniffing and Penetration Testing -- Introducing a network sniffer -- Passive sniffing -- Active sniffing -- Implementing a network sniffer using Python -- Format characters -- Learning about packet crafting -- Introducing ARP spoofing and implementing it using Python -- The ARP request -- The ARP reply -- The ARP cache -- Testing the security system using custom packet crafting -- A half-open scan -- The FIN scan -- ACK flag scanning -- Summary -- Chapter 4: Network Attacks and Prevention -- Technical requirements -- DHCP starvation attack -- The MAC flooding attack -- How the switch uses the CAM tables -- The MAC flood logic -- Gateway disassociation by RAW socket…”
    Libro electrónico