Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 1,381
- Management 690
- History 667
- Development 643
- Application software 580
- Engineering & Applied Sciences 564
- Computer networks 533
- Security measures 472
- Computer security 439
- Computer Science 380
- Filosofía 370
- Computer programs 368
- Operating systems (Computers) 354
- Database management 333
- Data processing 302
- Universidad Pontificia de Salamanca (España) 291
- Programming 280
- Design 267
- Derecho 262
- Information technology 262
- Computer programming 254
- Cloud computing 252
- Computer software 247
- Crítica e interpretación 242
- Web site development 235
- Novela norteamericana 232
- Web sites 226
- Leadership 215
- Documentales 199
- Photography 193
-
241Publicado 2002Tabla de Contenidos: “…Cover; Table of Contents; Foreword v 1.0; Foreword v 1.5; Chapter 1 How To Hack; Chapter 2 The Laws of Security; Chapter 3 Classes of Attack; Chapter 4 Methodology; Chapter 5 Diffing; Chapter 6 Cryptography; Chapter 7 Unexpected Input; Chapter 8 Buffer Overflow; Chapter 9 Format Strings; Chapter 10 Sniffing; Chapter 11 Session Hijacking; Chapter 12 Spoofing: Attacks on Trusted Identity; Chapter 13 Tunneling; Chapter 14 Hardware Hacking; Chapter 15 Viruses, Trojan Horses, and Worms; Chapter 16 IDS Evasion; Chapter 17 Automated Security Review and Attack Tools…”
Libro electrónico -
242por Sinha, Sanjib. authorTabla de Contenidos: “…Chapter - 1. Legal Side of Hacking -- Chapter - 2. Hacking Environment -- Chapter - 3. …”
Publicado 2017
Libro electrónico -
243
-
244
-
245
-
246Publicado 2017Tabla de Contenidos: “…WAPs in medical environments -- chapter 7. Hacking wireless access points : governmental context -- chapter 8. …”
Libro electrónico -
247Publicado 2017“…Arm yourself for the escalating war against malware and rootkits Thwart debilitating cyber-attacks and dramatically improve your organization’s security posture using the proven defense strategies in this thoroughly updated guide. Hacking ExposedTM Malware and Rootkits: Security Secrets & Solutions, Second Edition fully explains the hacker’s latest methods alongside ready-to-deploy countermeasures. …”
Libro electrónico -
248Publicado 2016Tabla de Contenidos: “…Link: search for links to a pageInanchor: locate text within link text; Cache: show the cached version of a page; Numrange: search for a number; Daterange: search for pages published within a certain date range; Info: show Google's summary information; Related: show related sites; Stocks: search for stock information; Define: show the definition of a term; Colliding operators and bad search-fu; Summary; Fast track solutions; Links to sites; Chapter 3 - Google Hacking Basics; Introduction; Anonymity with caches; Directory listings; Locating directory listings; Finding specific directories…”
Libro electrónico -
249por Bayles, Aaron W.“…"InfoSec Career Hacking? starts out by describing the many, different InfoSec careers available including Security Engineer, Security Analyst, Penetration Tester, Auditor, Security Administrator, Programmer, and Security Program Manager. …”
Publicado 2005
Libro electrónico -
250Publicado 2003“…Mac OS X Hacks is the third in O'Reilly's new Hacks Serier which aims to begin reclaiming the term "hacking" for the good guys. …”
Libro electrónico -
251por Peterson, Eric T.Tabla de Contenidos: “…Contents; Foreword; Credits; About the Author; Contributors; Acknowledgments; Preface; Why Web Site Measurement Hacks?; How This Book Is Organized; About the Use of Screenshots and Vendor Information in This Book; Conventions Used in This Book; Using Code Examples; How to Contact Us; Safari Enabled; Got a Hack?…”
Publicado 2005
Libro electrónico -
252por Long, JohnnyTabla de Contenidos: “…Front Cover; Google Hacking for Penetration Testers, Volume 2; Copyright Page; Contents; Chapter 1. …”
Publicado 2008
Libro electrónico -
253por Seibold, ChrisTabla de Contenidos: “…CONTENTS; PREFACE; How to Use This Book; How This Book Is Organized; Conventions Used in This Book; Using Code Examples; Acknowledgments; We'd Like to Hear from You; 1 BEFORE YOU HACK; HACK 01: Back Up Now with Disk Utility; Backing Up with Disk Utility; That's Great, But I've Got One Mac and No External Hard Drive!…”
Publicado 2008
Libro electrónico -
254por Engebretson, Pat 1974-“…The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. …”
Publicado 2010
Libro electrónico -
255por Spivey, Mark D.Tabla de Contenidos: “…References; Appendix B. Tool Syntax; Index; Back cover…”
Publicado 2006
Libro electrónico -
256por Engebretson, Pat 1974-“…The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. …”
Publicado 2013
Libro electrónico -
257por Bennett, XanderTabla de Contenidos: “…Cover; Screenwriting Tips, You Hack 150 Practical Pointers for Becoming a Better Screenwriter; Copyright; Table of Contents; Introduction; Chapter one FADE IN: Before You Put Digits to Keyboard; Screenwriting Tip #1; Screenwriting Tip #2; Screenwriting Tip #3; Screenwriting Tip #4; Screenwriting Tip #5; Screenwriting Tip #6; Screenwriting Tip #7; Screenwriting Tip #8; Screenwriting Tip #9; Screenwriting Tip #10; Chapter two No Idea: Concept Is King; Screenwriting Tip #11; Screenwriting Tip #12; Screenwriting Tip #13; Screenwriting Tip #14; Screenwriting Tip #15; Screenwriting Tip #16…”
Publicado 2012
Libro electrónico -
258Publicado 2011“…Written by recognized security practitioners and thought leaders, Hacking Exposed Web Applications, Third Edition is fully updated to cover new infiltration methods and countermeasures. …”
Libro electrónico -
259Publicado 2020Tabla de Contenidos: “…Kapitel 19: Eigene Bug-Bounties -- 19.1 Erkundung -- 19.1.1 Subdomain-Auflistung -- 19.1.2 Port-Scanning -- 19.1.3 Screenshots -- 19.1.4 Content Discovery - Inhalte entdecken -- 19.1.5 Frühere Bugs -- 19.2 Die Anwendung testen -- 19.2.1 Der Technologie-Stack -- 19.2.2 Abbildung der Funktionalitäten -- 19.2.3 Schwachstellen aufspüren -- 19.3 Nächste Schritte -- 19.3.1 Ihre Arbeit automatisieren -- 19.3.2 Mobile Apps untersuchen -- 19.3.3 Neue Funktionalitäten identifizieren -- 19.3.4 JavaScript-Dateien finden -- 19.3.5 Den Zugriff auf neue Funktionalitäten bezahlen -- 19.3.6 Die Technologie lernen -- 19.4 Zusammenfassung -- Kapitel 20: Bug-Reports -- 20.1 Lesen Sie die Regeln -- 20.2 Zuerst die Details und dann mehr -- 20.3 Überprüfen Sie die Schwachstelle noch einmal -- 20.4 Ihre Reputation -- 20.5 Zeigen Sie dem Unternehmen gegenüber Respekt -- 20.6 Die Höhe von Bounties ansprechen -- 20.7 Zusammenfassung -- Anhang A: Tools -- A.1 Web-Proxies -- A.2 Subdomain-Auflistung -- A.3 Entdeckung (Discovery) -- A.4 Screenshots -- A.5 Port-Scanning -- A.6 Erkundung (Reconnaissance) -- A.7 Hacking-Tools -- A.8 Mobile Apps -- A.9 Browser-Plug-ins -- Anhang B: Ressourcen -- B.1 Onlinetraining -- B.2 Bug-Bounty-Plattformen -- B.3 Empfohlene Literatur -- B.4 Videos -- B.5 Empfohlene Blogs -- Stichwortverzeichnis…”
Libro electrónico -
260Publicado 2019Tabla de Contenidos: “…Security penetration testing (the art of hacking series) / Hacking web applications (the art of hacking series) / Wireless networks, IoT, and mobile devices hacking / Enterprise penetration testing and continuous monitoring…”