Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 1,381
- Management 690
- History 667
- Development 643
- Application software 580
- Engineering & Applied Sciences 564
- Computer networks 533
- Security measures 472
- Computer security 439
- Computer Science 380
- Filosofía 370
- Computer programs 368
- Operating systems (Computers) 354
- Database management 333
- Data processing 302
- Universidad Pontificia de Salamanca (España) 291
- Programming 280
- Design 267
- Derecho 262
- Information technology 262
- Computer programming 254
- Cloud computing 252
- Computer software 247
- Crítica e interpretación 242
- Web site development 235
- Novela norteamericana 232
- Web sites 226
- Leadership 215
- Documentales 199
- Photography 193
-
81por McClure, Stuart“…sections show how and why different attacks succeed, including: Cyber graffiti and Web site defacements e-Shoplifting Database access and Web applications JavaTM application servers; how to harden your JavaTM Web Server Impersonation and session hijacking Buffer overflows, the most wicked of attacks Automated attack tools and worms Appendices include a listing of Web and database ports, cheat sheets for remote command execution, and source code disclosure techniques. …”
Publicado 2002
Libro electrónico -
82por Perry, Bruce W.Tabla de Contenidos: “…Validate Email Syntax; Checking Out the Email Syntax; Looking at the Code; Checking Email at the Door; On to Validation; The User Message; On Deck…”
Publicado 2006
Libro electrónico -
83por Frey, Bruce“…You can do that and much more with 75 practical and fun hacks packed into Statistics Hacks. These cool tips, tricks, and mind-boggling solutions from the world of statistics, measurement, and research methods will not only amaze and entertain you, but will give you an advantage in several real-world situations-including business. …”
Publicado 2006
Libro electrónico -
84Publicado 2006Tabla de Contenidos: “…; Check your PSP; Can't Read the Memory Stick; Check the physical parts; Check the data; PSP Won't Turn On; Miscellaneous Problems; Hacking the Hack; Keep Your PSP Clean; Prevention; Cleaning…”
Libro electrónico -
85Publicado 2004Tabla de Contenidos: “…Front Matter; Contents; Foreword; Introduction; Part I Introduction to; Chapter 1 Tools of; Chapter 2 Electrical; Part II Hardware Hacks; Chapter 3 Declawing; Chapter 4 Case Modification:; Chapter 5 Macintosh; Chapter 6 Home Theater PCs; Chapter 7 Hack Your Atari; Chapter 8 Hack Your Atari; Chapter 9 Hacking the; Chapter 10 Wireless; Chapter 11 Hacking the iPod; Chapter 12 Can You Hear Me; Chapter 13 Upgrading Memory; Part III Hardware Hacking; Chapter 14 Operating; Chapter 15 Coding 101; Index…”
Libro electrónico -
86Publicado 2006Tabla de Contenidos: “…Front Cover; Hack The Stack: Using Snort and Ethereal to Master The 8 Layers of an Insecure Network; Copyright Page; Contents; Foreword; Chapter 1. …”
Libro electrónico -
87
-
88por Long, JohnnyTabla de Contenidos: “…; Electronic Badge Authentication; Real World Badge Surveillance; Epiloque: Top Ten Ways to Shut Down No-Tech Hackers; Go Undercover; Shred Everything; Get Decent Locks; Put that Badge Away; Check Your Surveillance Gear; Shut Down Shoulder Surfers; Block Tailgaters; Clean your Car; Watch your Back Online; Beware of Social Engineers; Index…”
Publicado 2008
Libro electrónico -
89por Haines, BradTabla de Contenidos: “…Front Cover; Kismet Hacking; Copyright Page; Contributing Authors; Contents; Chapter 1: Introduction to Wireless Networking, Wardriving, and Kismet; Exploring Past Discoveries That Led to Wireless; Discovering Electromagnetism; Exploring Conduction; Inventing the Radio; Mounting Radio-Telephones in Cars; Inventing Computers and Networks; Inventing Cell Phones; Exploring Present Applications for Wireless; Applying Wireless Technology to Vertical Markets; Using Wireless in Delivery Services; Using Wireless for Public Safety; Using Wireless in the Financial World…”
Publicado 2008
Libro electrónico -
90por Street, Jayson E.Tabla de Contenidos: “…Front Cover; Half Title Page; Title Page; Copyright Page; Dedication; Table of Contents; Foreword; Acknowledgments; H0w t0 R34d Dissecting the Hack: The F0rb1dd3n Network; About the Authors; PART 1: F0RB1DD3N; PR010GU3; A New Assignment; CHAPTER 0N3; Problem Solved; Getting Started; The Acquisition; CHAPTER TW0; Just Another Day; The Installation; CHAPTER THR33; In Country; CHAPTER F0UR; In Real Life; CHAPTER F1V3; Status Check; Log Review; CHAPTER S1X; The Meeting; First Lead; The Discovery; CHAPTER S3V3N; Code Review; CHAPTER E1GHT; Battle Plans; Data Collection; CHAPTER N1N3; Data Analysis…”
Publicado 2010
Libro electrónico -
91Publicado 2010Tabla de Contenidos: “…""Hacking For Dummies®, 3rd Edition""; ""Contents at a Glance""; ""Table of Contents""; ""Introduction""; ""Part I: Building the Foundation for Ethical Hacking""; ""Chapter 1: Introduction to Ethical Hacking""; ""Straightening Out the Terminology""; ""Recognizing How Malicious Attackers Beget Ethical Hackers""; ""Understanding the Need to Hack Your Own Systems""; ""Understanding the Dangers Your Systems Face""; ""Obeying the Ethical Hacking Commandments""; ""Using the Ethical Hacking Process""; ""Chapter 2: Cracking the Hacker Mindset""; ""What Youâ€?…”
Libro electrónico -
92por Beaver, KevinTabla de Contenidos: “…Building the foundation for ethical hacking -- pt. II. Putting ethical hacking in motion -- pt. …”
Publicado 2013
Libro electrónico -
93por Kramer, Jeff“…Hacking the Kinect is the technogeek’s guide to developing software and creating projects involving the groundbreaking volumetric sensor known as the Microsoft Kinect. …”
Publicado 2012
Libro electrónico -
94
-
95Publicado 2019Tabla de Contenidos: “…Intro; Contents; Acknowledgments; 1 -- Introduction; Life Hacking Geeks and Gurus; Practical Philosophy, Self-Help, and Systems; Life Hacking's Shades of Gray; Nominal, Optimal, and Near Enemies; 2 -- The Life Hackers; Alpha Geeks and Authorpreneurs; 43 Folders and Getting Things Done; Lifehacker and the Rational Style; The 4-Hour Workweek and Lifestyle Design; Life Nomadic and Superhuman; 3 -- Hacking Time; Time Thrift; "Schedule Your Priorities"; Polyphasic Sleep; "Quadrupled My Productivity"; Privilege and Exploitation; Beggars in Spain; 4 -- Hacking Motivation; The Science of Motivation…”
Libro electrónico -
96
-
97por Burnett, Mark“…Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits, HC1 will dive right into deep code analysis. Previously undisclosed security research in combination with superior programming techniques from Foundstone and other respected organizations will be included in both the Local and Remote Code sections of the book. …”
Publicado 2004
Libro electrónico -
98Publicado 2013Tabla de Contenidos: “…Getting Started -- Theory and Practice -- Basic Hacks -- LEDs -- Batteries and Power -- Hacking Arduino -- Hacking with Modules -- Hacking with Sensors -- Audio Hacks -- Mending and Breaking Electronics -- Tools…”
Libro electrónico -
99por Wilhelm, ThomasTabla de Contenidos: “…Impersonation; Pretexting; Phishing; Summary; Endnotes; Chapter 7. Infiltration; Lock Picking and Safe Cracking; Alarm System Evasion; Trusted Networks; Summary; Endnotes; Chapter 8. …”
Publicado 2011
Libro electrónico -
100por Broad, JamesTabla de Contenidos: “…Front Cover; Hacking with Kali; Copyright Page; Dedication; Contents; 1 Introduction; Book Overview and Key Learning Points; Book Audience; Technical Professionals; Security Engineers; Students in Information Security and Information Assurance Programs; Who This Book Is Not for; Diagrams, Figures, and Screen Captures; Welcome; Penetration Testing Lifecycle; Terms; Penetration Testing, Pentesting; Red Team, Red Teaming; Ethical Hacking; White Hat; Black Hat; Grey Hat; Vulnerability Assessment, Vulnerability Analysis; Security Controls Assessment; Malicious User Testing, Mal User Testing…”
Publicado 2014
Libro electrónico