Mostrando 2,841 - 2,860 Resultados de 36,165 Para Buscar 'HJCK~', tiempo de consulta: 1.13s Limitar resultados
  1. 2841
    Publicado 2015
    “…Every tip, trick, and best practice is backed up by the advice of doctors, scientists, therapists, nutritionists, and numerous fitness experts…”
    Libro electrónico
  2. 2842
    Publicado 2020
    Materias: Acceso con credenciales UPSA.
    Libro electrónico
  3. 2843
    Publicado 2021
    Materias:
    Libro electrónico
  4. 2844
    Publicado 2020
    Materias:
    Video
  5. 2845
    Publicado 2024
    Tabla de Contenidos: “…The role of the attacker's mindset in strengthening cybersecurity -- Ethical considerations and legal boundaries -- Ethical hacking and responsible disclosure -- The role of innovation in cybersecurity -- The benefits of and need for innovation -- Driving innovation within organizations -- Emerging technologies and future trends -- Summary -- Chapter 4: Assessing Your Organization's Security Posture -- The components of a comprehensive security posture -- Evaluating security technologies -- Understanding the role of security processes -- The human factor in a security posture -- Effective metrics for security programs and teams -- Understanding the importance of security metrics -- Selecting the right metrics -- Implementing and tracking security metrics -- Asset inventory management and its role in security posture -- Understanding asset inventory in cybersecurity -- Building a comprehensive asset inventory -- Maintaining and updating asset inventory -- Continuously monitoring and improving your security posture -- Implementing continuous monitoring practices -- Responding to incidents and implementing remediation measures -- The technological landscape in security posture -- Summary -- Chapter 5: Developing a Comprehensive Modern Cybersecurity Strategy -- Key elements of a successful cybersecurity strategy -- Foundational principles and components -- Setting objectives and goals -- The role and significance of each element -- Aligning cybersecurity strategy with business objectives -- Correlation of organizational goals and cybersecurity endeavors -- Prioritizing cybersecurity based on business impact -- Communicating cybersecurity's value to stakeholders -- Risk management and cybersecurity strategy -- Integrating risk management methodologies in strategy formulation -- Conducting comprehensive risk assessments…”
    Libro electrónico
  6. 2846
  7. 2847
    por Bernhardt, Reinhold
    Publicado 2000
    Materias: “…Hick, John Crítica i interpretació…”
    991004904129706719
  8. 2848
    Publicado 1972
    Libro
  9. 2849
    por Gupta, Aditya. author
    Publicado 2019
    Libro electrónico
  10. 2850
    por Wong, Reginald
    Publicado 2018
    Libro electrónico
  11. 2851
    Publicado 2018
    Libro electrónico
  12. 2852
    Publicado 2021
    Tabla de Contenidos: “…Cover -- Contents -- Preface: Amidst a Global Pandemic -- PART I: INTRODUCTIONS -- 1 Introduction: Biotechnologies, Bodies and Biomakers -- 2 Biology and Culture - an Overview of the Field -- PART II: BACKGROUND -- 3 The Promise of Small Things - The Cultural Presence of (Molecular) Biology -- 4 With my Own two Hands - Tracing DIY from Individualism to Maker Culture -- PART III: 'HACKING' LIFE ITSELF -- 5 'Hacking' Life Itself - In Pursuit of a Definition -- 6 #iambulletproof - A Layperson's Guide to Self-Enhancement -- 7 A Pill for Every Ill - Drugs and Supplements -- 8 Test Yourself - Making the Invisible Visible -- 9 Homo Technologicus? …”
    Tesis
  13. 2853
    por More, Josh
    Publicado 2014
    “…Job Reconnaissance: Using Hacking Skills to Win the Job Hunt Game explains the job hunting process, why the most commonly followed models fail and how to better approach the search. …”
    Libro electrónico
  14. 2854
    por Wilhelm, Thomas
    Publicado 2009
    “…"PART I - Setting Up Chapter 1: Introduction Chapter 2: Ethics and Hacking Chapter 3: Hacking as a Career Chapter 4: Setting up Your Lab Chapter 5: Creating and Using PenTest Targets in Your Lab Chapter 6: Methodologies Chapter 7: PenTest Metrics Chapter 8: Management of a PenTest PART II - Running a PenTest Chapter 9: Information Gathering Chapter 10: Vulnerability Identification Chapter 11: Vulnerability Verification Chapter 12: Compromising a System and Privilege Escalation Chapter 13: Maintaining Access Chapter 14: Covering Your Tracks PART III - Wrapping Everything Up Chapter 15: Reporting Results Chapter 16: Archiving Data Chapter 17: Cleaning Up Your Lab Chapter 18: Planning for Your Next PenTest Appendix A - Acronyms Appendix B - Definitions"--Resource description page…”
    Libro electrónico
  15. 2855
    Publicado 2019
    Tabla de Contenidos: “…PHP Info Disclosure -- HackerOne Hacktivity Voting -- Accessing PornHub's Memcache Installation -- Summary -- 19 Finding Your Own Bug Bounties -- Reconnaissance -- Testing the Application -- Going Further -- Summary -- 20 Vulnerability Reports -- Read the Policy -- Include Details -- Then Include More -- Reconfirm the Vulnerability -- Your Reputation -- Show Respect for the Company -- Appealing Bounty Rewards -- Summary -- A Tools -- Web Proxies -- Subdomain Enumeration -- Discovery -- Screenshotting -- Port Scanning -- Reconnaissance -- Hacking Tools -- Mobile -- Browser Plug-Ins -- B Resources -- Online Training -- Bug Bounty Platforms -- Recommended Reading -- Video Resources -- Recommended Blogs -- Index…”
    Libro electrónico
  16. 2856
    Publicado 2021
    Libro
  17. 2857
    Publicado 2018
    Acceso restringido usuarios UPSA
    Libro electrónico
  18. 2858
  19. 2859
    por Morris, Dick
    Publicado 1999
    Libro
  20. 2860
    Publicado 1965
    Libro