Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 1,382
- Management 690
- History 667
- Development 643
- Application software 580
- Engineering & Applied Sciences 564
- Computer networks 533
- Security measures 472
- Computer security 439
- Computer Science 380
- Filosofía 374
- Computer programs 368
- Operating systems (Computers) 354
- Database management 333
- Data processing 302
- Universidad Pontificia de Salamanca (España) 291
- Programming 280
- Design 267
- Derecho 263
- Information technology 262
- Computer programming 254
- Cloud computing 252
- Computer software 247
- Crítica e interpretación 242
- Web site development 235
- Novela norteamericana 232
- Web sites 226
- Leadership 215
- Documentales 199
- Photography 193
-
2381
-
2382
-
2383
-
2384
-
2385por Hicks, Ursula Kathleen Webb, Lady, 1896-1985
Publicado 1965Biblioteca Universidad de Deusto (Otras Fuentes: Biblioteca de la Universidad de Navarra)Libro -
2386por Hacking, Ian
Publicado 1997Biblioteca Universidad de Deusto (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca de la Universidad de Navarra)Libro -
2387
-
2388
-
2389Publicado 2023Tabla de Contenidos: “…-- Bitcoin-Invested Hedge Funds -- Notes -- Chapter 6 Cryptocurrency Spreads -- Behavioral Economics -- Limited Rationality -- Social Preferences -- Lack of Self-Control -- Notes -- Chapter 7 Altcoin, Stablecoin Utility Coins, and CBDC -- Altcoin -- Stablecoin -- Utility Coins -- Central Bank Digital Currency (CBDC) -- Not Like Before: Digital Currencies Debut Amid COVID-19 -- COVID-19 Has Led to an Increased Interest in Digital Currencies Around the World -- Notes -- Chapter 8 Cryptocurrency Tumblers and Mixing Services -- The European Union -- The United States -- Japan -- Notes -- Chapter 9 The Darknet -- The Darknet and the Epidemics -- About The Onion Router -- Notes -- Chapter 10 Illicit Use of Cryptocurrencies -- Notes…”
Libro electrónico -
2390Publicado 2022Materias:Libro electrónico
-
2391
-
2392Publicado 2024Materias:Libro electrónico
-
2393Publicado 1998Materias: “…Asset-backed financing Law and legislation Periodicals…”
Tesis -
2394Publicado 2014“…By the end of the book, you’ll be able to hack and modify existing circuits to create your own unique designs. …”
Libro electrónico -
2395Publicado 2017Tabla de Contenidos: “…Identifying the Players -- Smart(er) VBA Document Deployment -- Email and Saved Passwords -- Keyloggers and Cookies -- Bringing It All Together -- Summary -- Exercises -- Chapter 6: Criminal Intelligence -- Payload Delivery Part VI: Deploying with HTA -- Malware Detection -- Privilege Escalation in Microsoft Windows -- Escalating Privileges with Local Exploits -- Exploiting Automated OS Installations -- Exploiting the Task Scheduler -- Exploiting Vulnerable Services -- Hijacking DLLs -- Mining the Windows Registry -- Command and Control Part VI: The Creeper Box -- Creeper Box Specification -- Introducing the Raspberry Pi and Its Components -- GPIO -- Choosing an OS -- Configuring Full-Disk Encryption -- A Word on Stealth -- Configuring Out-of-Band Command and Control Using 3G/4G -- Creating a Transparent Bridge -- Using a Pi as a Wireless AP to Provision Access by Remote Keyloggers -- The Attack -- Spoofing Caller ID and SMS Messages -- Summary -- Exercises -- Chapter 7: War Games -- Background and Mission Briefing -- Payload Delivery Part VII: USB Shotgun Attack -- USB Media -- A Little Social Engineering -- Command and Control Part VII: Advanced Autonomous Data Exfiltration -- What We Mean When We Talk About "Autonomy" -- Means of Egress -- The Attack -- Constructing a Payload to Attack a Classified Network -- Stealthy 3G/4G Software Install -- Attacking the Target and Deploying the Payload -- Efficient "Burst-Rate" Data Exfiltration -- Summary -- Exercises -- Chapter 8: Hack Journalists -- Briefing -- Advanced Concepts in Social Engineering -- Cold Reading -- C2 Part VIII: Experimental Concepts in Command and Control -- Scenario 1: C2 Server Guided Agent Management -- Scenario 2: Semi-Autonomous C2 Agent Management -- Payload Delivery Part VIII: Miscellaneous Rich Web Content -- Java Web Start -- Adobe AIR -- A Word on HTML5 -- The Attack…”
Libro electrónico -
2396Publicado 2010Tabla de Contenidos: “…; Think Like a Hacker; Functional Fixedness; A Few Words on Nutrition; Tips for Newbies; Picking a Recipe; Reading Between the Lines; Cooking for One; Cooking for Others; Chapter 2: Initializing the Kitchen; Approaching the Kitchen; Calibrating Your Instruments; Prepping Ingredients; Kitchen Equipment; Bare Minimum Equipment; Standard Kitchen Equipment; Kitchen Organization; O(1) Retrieval; Functional Grouping; Uniform Storage Containers; Counter Layout; Kitchen Pruning; Giving Kitchen Tools As Gifts…”
Libro electrónico -
2397por Karp, David A.“…This thorough guide gives you the tools you need to fix the troublesome parts of this operating system, plus the solutions, hacks, and timesaving tips to make the most of your PC. …”
Publicado 2010
Libro electrónico -
2398Publicado 2009“…Chained exploits are far more complex and far more difficult to defend. Few security or hacking books cover them well and most don’t cover them at all. …”
Libro electrónico -
2399por Wilhelm, ThomasTabla de Contenidos: “…Creating and Learning in a Hacking Lab…”
Publicado 2013
Libro electrónico -
2400Publicado 2018Tabla de Contenidos: “…-- The concept of a port scanner -- How to create an efficient port scanner -- Summary -- Chapter 3: Sniffing and Penetration Testing -- Introducing a network sniffer -- Passive sniffing -- Active sniffing -- Implementing a network sniffer using Python -- Format characters -- Learning about packet crafting -- Introducing ARP spoofing and implementing it using Python -- The ARP request -- The ARP reply -- The ARP cache -- Testing the security system using custom packet crafting -- A half-open scan -- The FIN scan -- ACK flag scanning -- Summary -- Chapter 4: Network Attacks and Prevention -- Technical requirements -- DHCP starvation attack -- The MAC flooding attack -- How the switch uses the CAM tables -- The MAC flood logic -- Gateway disassociation by RAW socket…”
Libro electrónico