Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 1,392
- Management 690
- History 667
- Development 643
- Application software 580
- Engineering & Applied Sciences 564
- Computer networks 533
- Security measures 472
- Computer security 439
- Computer Science 380
- Filosofía 374
- Computer programs 368
- Operating systems (Computers) 354
- Database management 333
- Data processing 302
- Universidad Pontificia de Salamanca (España) 291
- Programming 280
- Design 267
- Derecho 263
- Information technology 262
- Computer programming 254
- Cloud computing 252
- Computer software 247
- Crítica e interpretación 246
- Web site development 235
- Novela norteamericana 232
- Web sites 226
- Leadership 215
- Documentales 199
- Photography 193
-
6121
-
6122
-
6123por Henry, Kevin M.Tabla de Contenidos: “…Port scanningCountermeasures to active reconnaissance; Key learning points; Questions; Chapter 5: Vulnerability Assessments; The attack vectors; References and sources of vulnerabilities; Using vulnerability assessment tools; PCI DSS requirements; Malicious code; Reporting on the vulnerability assessment; Key learning points; Questions; Chapter 6: Hacking Windows® and Unix; Having fun; Common hacking initiatives; Defeating data theft; Protecting against unauthorized access; Access controls; Actions of the attacker; Focus on UNIX/Linux; Advanced attacks; Source code review…”
Publicado 2012
Libro electrónico -
6124
-
6125
-
6126
-
6127
-
6128
-
6129Publicado 2016Tabla de Contenidos: “…Enterprise WLAN attacksSummary; Chapter 2: Planning Your Lab Environment ; Understanding what tasks your lab should fulfill; Objectives of a lab; Lab tasks; Network reconnaissance; Web application hacking; Hacking and researching network services; AD hacking; DBMS hacking; Network layer attacks; Wi-Fi penetration testing; Planning the network topology; Choosing appropriate components; Network devices; Server and workstation components; Planning lab security; Access control; Integrated security mechanisms; Security solutions; Security hints; Summary…”
Libro electrónico -
6130
-
6131por Cocks, Joan, 1947-
Publicado 2013Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
6132
-
6133
-
6134
-
6135
-
6136
-
6137
-
6138
-
6139
-
6140