Mostrando 21 - 40 Resultados de 36,031 Para Buscar 'HJCK~', tiempo de consulta: 1.52s Limitar resultados
  1. 21
    por Vladimirov, Andrew A.
    Publicado 2004
    Libro
  2. 22
    por Urmeneta Arbusà, Pablo
    Publicado 2015
    Visualitzar TFMP
    Tesis
  3. 23
    por Twain, Mark, 1835-1910
    Publicado 1942
    Libro
  4. 24
    por McClure, Stuart
    Publicado 1999
    Libro
  5. 25
    Publicado 2013
    “…Every aspect of scholarly infrastructure is being questioned, and even more importantly, being hacked. Sympathetic scholars of traditionally disparate disciplines are canceling their association memberships and building their own networks on Facebook and Twitter. …”
    Libro electrónico
  6. 26
    Publicado 2022
    Tabla de Contenidos: “…Preparing for API security testing -- How web applications work -- The anatomy of web APIs -- API insecurities -- Setting up vulnerable API targets for testing -- Analysis and attribution -- Discovering APIs -- Endpoint analysis -- Authentication attacks -- Fuzzing -- Exploiting API authorization -- Exploiting mass assignment -- API injection -- Evasive techniques and rate limit testing -- Hacking APIs -- Breaches and bounties…”
    Libro electrónico
  7. 27
    Publicado 2016
    Tabla de Contenidos: “…-- Closing Thoughts -- Part 4: Creating Bots -- Chapter 9: Using Extrasensory Perception to Ward off Fog of War -- Background Knowledge -- Revealing Hidden Details with Lighthacks -- Adding a Central Ambient Light Source -- Increasing the Absolute Ambient Light -- Creating Other Types of Lighthacks -- Revealing Sneaky Enemies with Wallhacks -- Rendering with Z-Buffering -- Creating a Direct3D Wallhack -- Fingerprinting the Model You Want to Reveal -- Getting a Wider Field of Vision with Zoomhacks -- Using NOPing Zoomhacks -- Scratching the Surface of Hooking Zoomhacks -- Displaying Hidden Data with HUDs -- Creating an Experience HUD -- Using Hooks to Locate Data -- An Overview of Other ESP Hacks -- Closing Thoughts -- Chapter 10: Responsive Hacks -- Observing Game Events -- Monitoring Memory -- Detecting Visual Cues…”
    Libro electrónico
  8. 28
    Publicado 2016
    Libro electrónico
  9. 29
    Publicado 2021
    “…"A crash course in modern hacking techniques, Ethical Hacking is already being used to prepare the next generation of offensive security experts. …”
    Libro electrónico
  10. 30
    Publicado 2021
    “…Written by a team of global digital transformation thought leaders, Hacking Digital walks you through the implementation phase by providing the practical advice and information you need to ensure overall success. …”
    Libro electrónico
  11. 31
    por Myatt, Mike
    Publicado 2014
    Tabla de Contenidos: “…Hacking Leadership: The 11 Gaps Every Business Needs to Close and the Secrets to Closing Them Quickly; Copyright; Content; Prologue; Chapter 1: Hacking the Leadership Gap; Overview-The Commoditization of Leadership; The Leadership Gap Defined; Hacking the Control Gap; The Awareness Gap-Finding the Blind Spots; The Key to Clarity-White Space; Hacking the Status Quo; Hacking the Preparation Gap; Chapter 2: Hacking the Purpose Gap; Following in the Footsteps of Greatness-The Movement Hack; Individual Purpose-Hacking the Purpose Continuum; Hacking the Pursuit Gap; Hacking the Passion Gap…”
    Libro electrónico
  12. 32
    Publicado 2016
    “…And you don't need to be technical to do it. Hacking Marketing will show you how to conquer those challenges by adapting successful management frameworks from the software industry to the practice of marketing for any business in a digital world. …”
    Libro electrónico
  13. 33
    Publicado 2016
    Tabla de Contenidos: “…Hacking Sales: The Ultimate Playbook and Tool Guide to Building a High-Velocity Sales Machine; Contents; Author's Note; Introduction; Why Sales, Why Now?…”
    Libro electrónico
  14. 34
    Publicado 2019
    “…Master the online tools available to grow your business and conquer the competition Business Hack is your essential roadmap to business growth and online marketing success. …”
    Libro electrónico
  15. 35
    Publicado 2015
    Tabla de Contenidos: “…3D Printer AttacksROT13; Wickr; Pastebin; Women in Technology; Pirate Party; Avatar; Chaos Communication Congress/Chaos Computer Camp; Hacker Hostel; German International ID; Snopes; Wikileaks; DEFCON; OPSEC; Pentesting Hardware; Anonymous Emailers; Terminal Cornucopia; Hacking in Popular Culture; System Auditing Tools; Uber; Online Identity Hiding; 2600 Meetings…”
    Libro electrónico
  16. 36
    Publicado 2015
    Tabla de Contenidos: “…PHP Features Not Supported in Hack; References; The global Statement…”
    Libro electrónico
  17. 37
    Publicado 2016
    Tabla de Contenidos:
    Libro electrónico
  18. 38
    Publicado 2016
    Tabla de Contenidos: “…Introducion to ethical hacking ; Cracking the hacker mindset ; Developing your ethical hacking plan ; Hacking methodology -- pt. …”
    Libro electrónico
  19. 39
    Publicado 2017
    Tabla de Contenidos: “…Denning -- Profile: Michael Dubinsky -- Firewalls -- Profile: William Cheskwick -- Honeypots -- Profile: Lance Spitzner -- Password hacking -- Profile: Dr. Cormac Herley -- Wireless hacking -- Profile: Thomas d'Otreppe de Bouvette -- Penetration testing -- Profile: Aaron Higbee -- Profile: Benild Joseph -- DDoS attacks -- Profile: Brian Krebs -- Secure OS -- Profile: Joanna Rutkowska -- Profile: Aaron Margosis -- Network attacks -- Profile: Laura Chappell -- IoT hacking -- Profile: Dr. …”
    Libro electrónico
  20. 40
    Publicado 2023
    Libro electrónico