Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 1,382
- Management 690
- History 667
- Development 643
- Application software 580
- Engineering & Applied Sciences 564
- Computer networks 533
- Security measures 472
- Computer security 439
- Computer Science 380
- Filosofía 374
- Computer programs 368
- Operating systems (Computers) 354
- Database management 333
- Data processing 302
- Universidad Pontificia de Salamanca (España) 291
- Programming 280
- Design 267
- Derecho 263
- Information technology 262
- Computer programming 254
- Cloud computing 252
- Computer software 247
- Crítica e interpretación 242
- Web site development 235
- Novela norteamericana 232
- Web sites 226
- Leadership 215
- Documentales 199
- Photography 193
-
2841Publicado 2015“…Every tip, trick, and best practice is backed up by the advice of doctors, scientists, therapists, nutritionists, and numerous fitness experts…”
Libro electrónico -
2842Seguridad informática y Malwares Análisis de amenazas e implementación de contramedidas (2a edición)Publicado 2020Materias: Acceso con credenciales UPSA.
Libro electrónico -
2843
-
2844
-
2845Publicado 2024Tabla de Contenidos: “…The role of the attacker's mindset in strengthening cybersecurity -- Ethical considerations and legal boundaries -- Ethical hacking and responsible disclosure -- The role of innovation in cybersecurity -- The benefits of and need for innovation -- Driving innovation within organizations -- Emerging technologies and future trends -- Summary -- Chapter 4: Assessing Your Organization's Security Posture -- The components of a comprehensive security posture -- Evaluating security technologies -- Understanding the role of security processes -- The human factor in a security posture -- Effective metrics for security programs and teams -- Understanding the importance of security metrics -- Selecting the right metrics -- Implementing and tracking security metrics -- Asset inventory management and its role in security posture -- Understanding asset inventory in cybersecurity -- Building a comprehensive asset inventory -- Maintaining and updating asset inventory -- Continuously monitoring and improving your security posture -- Implementing continuous monitoring practices -- Responding to incidents and implementing remediation measures -- The technological landscape in security posture -- Summary -- Chapter 5: Developing a Comprehensive Modern Cybersecurity Strategy -- Key elements of a successful cybersecurity strategy -- Foundational principles and components -- Setting objectives and goals -- The role and significance of each element -- Aligning cybersecurity strategy with business objectives -- Correlation of organizational goals and cybersecurity endeavors -- Prioritizing cybersecurity based on business impact -- Communicating cybersecurity's value to stakeholders -- Risk management and cybersecurity strategy -- Integrating risk management methodologies in strategy formulation -- Conducting comprehensive risk assessments…”
Libro electrónico -
2846por Bernhardt, ReinholdMaterias:
Publicado 1993Biblioteca Universidad de Deusto (Otras Fuentes: Biblioteca de Pastoral Madrid, Biblioteca Universitat Ramon Llull, Biblioteca Provicincial Misioneros Claretianos - Provincia de Santiago)Libro -
2847por Bernhardt, ReinholdMaterias: “…Hick, John Crítica i interpretació…”
Publicado 2000
991004904129706719 -
2848
-
2849
-
2850
-
2851Publicado 2018Libro electrónico
-
2852Publicado 2021Tabla de Contenidos: “…Cover -- Contents -- Preface: Amidst a Global Pandemic -- PART I: INTRODUCTIONS -- 1 Introduction: Biotechnologies, Bodies and Biomakers -- 2 Biology and Culture - an Overview of the Field -- PART II: BACKGROUND -- 3 The Promise of Small Things - The Cultural Presence of (Molecular) Biology -- 4 With my Own two Hands - Tracing DIY from Individualism to Maker Culture -- PART III: 'HACKING' LIFE ITSELF -- 5 'Hacking' Life Itself - In Pursuit of a Definition -- 6 #iambulletproof - A Layperson's Guide to Self-Enhancement -- 7 A Pill for Every Ill - Drugs and Supplements -- 8 Test Yourself - Making the Invisible Visible -- 9 Homo Technologicus? …”
Tesis -
2853por More, Josh“…Job Reconnaissance: Using Hacking Skills to Win the Job Hunt Game explains the job hunting process, why the most commonly followed models fail and how to better approach the search. …”
Publicado 2014
Libro electrónico -
2854por Wilhelm, Thomas“…"PART I - Setting Up Chapter 1: Introduction Chapter 2: Ethics and Hacking Chapter 3: Hacking as a Career Chapter 4: Setting up Your Lab Chapter 5: Creating and Using PenTest Targets in Your Lab Chapter 6: Methodologies Chapter 7: PenTest Metrics Chapter 8: Management of a PenTest PART II - Running a PenTest Chapter 9: Information Gathering Chapter 10: Vulnerability Identification Chapter 11: Vulnerability Verification Chapter 12: Compromising a System and Privilege Escalation Chapter 13: Maintaining Access Chapter 14: Covering Your Tracks PART III - Wrapping Everything Up Chapter 15: Reporting Results Chapter 16: Archiving Data Chapter 17: Cleaning Up Your Lab Chapter 18: Planning for Your Next PenTest Appendix A - Acronyms Appendix B - Definitions"--Resource description page…”
Publicado 2009
Libro electrónico -
2855Publicado 2019Tabla de Contenidos: “…PHP Info Disclosure -- HackerOne Hacktivity Voting -- Accessing PornHub's Memcache Installation -- Summary -- 19 Finding Your Own Bug Bounties -- Reconnaissance -- Testing the Application -- Going Further -- Summary -- 20 Vulnerability Reports -- Read the Policy -- Include Details -- Then Include More -- Reconfirm the Vulnerability -- Your Reputation -- Show Respect for the Company -- Appealing Bounty Rewards -- Summary -- A Tools -- Web Proxies -- Subdomain Enumeration -- Discovery -- Screenshotting -- Port Scanning -- Reconnaissance -- Hacking Tools -- Mobile -- Browser Plug-Ins -- B Resources -- Online Training -- Bug Bounty Platforms -- Recommended Reading -- Video Resources -- Recommended Blogs -- Index…”
Libro electrónico -
2856
-
2857
-
2858por Parry, Robin A.Click para texto completo desde fuera UPSA
Publicado 2012
Click para texto completo desde UPSA
Libro electrónico -
2859
-
2860