Mostrando 81 - 100 Resultados de 36,031 Para Buscar 'HJCK~', tiempo de consulta: 1.73s Limitar resultados
  1. 81
    por McClure, Stuart
    Publicado 2002
    “…sections show how and why different attacks succeed, including: Cyber graffiti and Web site defacements e-Shoplifting Database access and Web applications JavaTM application servers; how to harden your JavaTM Web Server Impersonation and session hijacking Buffer overflows, the most wicked of attacks Automated attack tools and worms Appendices include a listing of Web and database ports, cheat sheets for remote command execution, and source code disclosure techniques. …”
    Libro electrónico
  2. 82
    por Perry, Bruce W.
    Publicado 2006
    Tabla de Contenidos: “…Validate Email Syntax; Checking Out the Email Syntax; Looking at the Code; Checking Email at the Door; On to Validation; The User Message; On Deck…”
    Libro electrónico
  3. 83
    por Frey, Bruce
    Publicado 2006
    “…You can do that and much more with 75 practical and fun hacks packed into Statistics Hacks. These cool tips, tricks, and mind-boggling solutions from the world of statistics, measurement, and research methods will not only amaze and entertain you, but will give you an advantage in several real-world situations-including business. …”
    Libro electrónico
  4. 84
    Publicado 2006
    Tabla de Contenidos: “…; Check your PSP; Can't Read the Memory Stick; Check the physical parts; Check the data; PSP Won't Turn On; Miscellaneous Problems; Hacking the Hack; Keep Your PSP Clean; Prevention; Cleaning…”
    Libro electrónico
  5. 85
    Publicado 2004
    Tabla de Contenidos: “…Front Matter; Contents; Foreword; Introduction; Part I Introduction to; Chapter 1 Tools of; Chapter 2 Electrical; Part II Hardware Hacks; Chapter 3 Declawing; Chapter 4 Case Modification:; Chapter 5 Macintosh; Chapter 6 Home Theater PCs; Chapter 7 Hack Your Atari; Chapter 8 Hack Your Atari; Chapter 9 Hacking the; Chapter 10 Wireless; Chapter 11 Hacking the iPod; Chapter 12 Can You Hear Me; Chapter 13 Upgrading Memory; Part III Hardware Hacking; Chapter 14 Operating; Chapter 15 Coding 101; Index…”
    Libro electrónico
  6. 86
    Publicado 2006
    Tabla de Contenidos: “…Front Cover; Hack The Stack: Using Snort and Ethereal to Master The 8 Layers of an Insecure Network; Copyright Page; Contents; Foreword; Chapter 1. …”
    Libro electrónico
  7. 87
    por Mutton, Paul
    Publicado 2004
    “…Intenet Relay Chat hacks…”
    Libro electrónico
  8. 88
    por Long, Johnny
    Publicado 2008
    Tabla de Contenidos: “…; Electronic Badge Authentication; Real World Badge Surveillance; Epiloque: Top Ten Ways to Shut Down No-Tech Hackers; Go Undercover; Shred Everything; Get Decent Locks; Put that Badge Away; Check Your Surveillance Gear; Shut Down Shoulder Surfers; Block Tailgaters; Clean your Car; Watch your Back Online; Beware of Social Engineers; Index…”
    Libro electrónico
  9. 89
    por Haines, Brad
    Publicado 2008
    Tabla de Contenidos: “…Front Cover; Kismet Hacking; Copyright Page; Contributing Authors; Contents; Chapter 1: Introduction to Wireless Networking, Wardriving, and Kismet; Exploring Past Discoveries That Led to Wireless; Discovering Electromagnetism; Exploring Conduction; Inventing the Radio; Mounting Radio-Telephones in Cars; Inventing Computers and Networks; Inventing Cell Phones; Exploring Present Applications for Wireless; Applying Wireless Technology to Vertical Markets; Using Wireless in Delivery Services; Using Wireless for Public Safety; Using Wireless in the Financial World…”
    Libro electrónico
  10. 90
    por Street, Jayson E.
    Publicado 2010
    Tabla de Contenidos: “…Front Cover; Half Title Page; Title Page; Copyright Page; Dedication; Table of Contents; Foreword; Acknowledgments; H0w t0 R34d Dissecting the Hack: The F0rb1dd3n Network; About the Authors; PART 1: F0RB1DD3N; PR010GU3; A New Assignment; CHAPTER 0N3; Problem Solved; Getting Started; The Acquisition; CHAPTER TW0; Just Another Day; The Installation; CHAPTER THR33; In Country; CHAPTER F0UR; In Real Life; CHAPTER F1V3; Status Check; Log Review; CHAPTER S1X; The Meeting; First Lead; The Discovery; CHAPTER S3V3N; Code Review; CHAPTER E1GHT; Battle Plans; Data Collection; CHAPTER N1N3; Data Analysis…”
    Libro electrónico
  11. 91
    Publicado 2010
    Tabla de Contenidos: “…""Hacking For Dummies®, 3rd Edition""; ""Contents at a Glance""; ""Table of Contents""; ""Introduction""; ""Part I: Building the Foundation for Ethical Hacking""; ""Chapter 1: Introduction to Ethical Hacking""; ""Straightening Out the Terminology""; ""Recognizing How Malicious Attackers Beget Ethical Hackers""; ""Understanding the Need to Hack Your Own Systems""; ""Understanding the Dangers Your Systems Face""; ""Obeying the Ethical Hacking Commandments""; ""Using the Ethical Hacking Process""; ""Chapter 2: Cracking the Hacker Mindset""; ""What Youâ€?…”
    Libro electrónico
  12. 92
    por Beaver, Kevin
    Publicado 2013
    Tabla de Contenidos: “…Building the foundation for ethical hacking -- pt. II. Putting ethical hacking in motion -- pt. …”
    Libro electrónico
  13. 93
    por Kramer, Jeff
    Publicado 2012
    “…Hacking the Kinect is the technogeek’s guide to developing software and creating projects involving the groundbreaking volumetric sensor known as the Microsoft Kinect. …”
    Libro electrónico
  14. 94
    por St. Jean, Jared
    Publicado 2013
    “…Hacks…”
    Libro electrónico
  15. 95
    Publicado 2019
    Tabla de Contenidos: “…Intro; Contents; Acknowledgments; 1 -- Introduction; Life Hacking Geeks and Gurus; Practical Philosophy, Self-Help, and Systems; Life Hacking's Shades of Gray; Nominal, Optimal, and Near Enemies; 2 -- The Life Hackers; Alpha Geeks and Authorpreneurs; 43 Folders and Getting Things Done; Lifehacker and the Rational Style; The 4-Hour Workweek and Lifestyle Design; Life Nomadic and Superhuman; 3 -- Hacking Time; Time Thrift; "Schedule Your Priorities"; Polyphasic Sleep; "Quadrupled My Productivity"; Privilege and Exploitation; Beggars in Spain; 4 -- Hacking Motivation; The Science of Motivation…”
    Libro electrónico
  16. 96
    por Trotter, Fred
    Publicado 2012
    Libro electrónico
  17. 97
    por Burnett, Mark
    Publicado 2004
    “…Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits, HC1 will dive right into deep code analysis. Previously undisclosed security research in combination with superior programming techniques from Foundstone and other respected organizations will be included in both the Local and Remote Code sections of the book. …”
    Libro electrónico
  18. 98
    Publicado 2013
    Tabla de Contenidos: “…Getting Started -- Theory and Practice -- Basic Hacks -- LEDs -- Batteries and Power -- Hacking Arduino -- Hacking with Modules -- Hacking with Sensors -- Audio Hacks -- Mending and Breaking Electronics -- Tools…”
    Libro electrónico
  19. 99
    por Wilhelm, Thomas
    Publicado 2011
    Tabla de Contenidos: “…Impersonation; Pretexting; Phishing; Summary; Endnotes; Chapter 7. Infiltration; Lock Picking and Safe Cracking; Alarm System Evasion; Trusted Networks; Summary; Endnotes; Chapter 8. …”
    Libro electrónico
  20. 100
    por Broad, James
    Publicado 2014
    Tabla de Contenidos: “…Front Cover; Hacking with Kali; Copyright Page; Dedication; Contents; 1 Introduction; Book Overview and Key Learning Points; Book Audience; Technical Professionals; Security Engineers; Students in Information Security and Information Assurance Programs; Who This Book Is Not for; Diagrams, Figures, and Screen Captures; Welcome; Penetration Testing Lifecycle; Terms; Penetration Testing, Pentesting; Red Team, Red Teaming; Ethical Hacking; White Hat; Black Hat; Grey Hat; Vulnerability Assessment, Vulnerability Analysis; Security Controls Assessment; Malicious User Testing, Mal User Testing…”
    Libro electrónico