Mostrando 1,281 - 1,300 Resultados de 36,165 Para Buscar 'HJCK~', tiempo de consulta: 1.23s Limitar resultados
  1. 1281
    por Beck, Johannes
    Publicado 1994
    Libro
  2. 1282
    por Buck, Gary
    Publicado 2004
    Libro
  3. 1283
    por Buck, Frank
    Publicado 1966
    Libro
  4. 1284
    por Buck, Pearl S., 1892-1973
    Publicado 1962
    Libro
  5. 1285
    por Dick, George, 1914-
    Publicado 1986
    Libro
  6. 1286
    Publicado 2020
    Tabla de Contenidos: “…-- TIPOS DE HACKERS -- BREVE HISTORIA DEL MUNDO HACKER -- ACTUACIONES FAMOSAS -- LOS HACKERS MÁS RECONOCIDOS -- ÉTICA HACKER -- EL EMBLEMA HACKER -- 2- HACKING ÉTICO -- ¿QUÉ ES EL HACKING ÉTICO? -- AUDITORÍAS -- FASES DE UN PROCESO DE HACKING ÉTICO -- VULNERABILIDADES CVE -- INFORME FINAL DE AUDITORÍA -- 3- PLATAFORMAS DE ENTRENAMIENTO -- MÁQUINAS VIRTUALES -- INSTALANDO VIRTUALBOX -- CREANDO NUESTRAS MÁQUINAS VIRTUALES -- ENTRENADORES VULNERABLES -- CAPTURE DE FLAG -- 4- TÉCNICAS DE OCULTAMIENTO -- ¿POR QUÉ OCULTARSE EN LA RED? …”
    Libro electrónico
  7. 1287
    Publicado 2018
    Materias:
    Libro electrónico
  8. 1288
    Publicado 2018
    Tabla de Contenidos: “…Practice Questions -- Chapter 6: Hacking the Caesar Cipher with Brute-Force -- Source Code for the Caesar Cipher Hacker Program -- Sample Run of the Caesar Cipher Hacker Program -- Setting Up Variables -- Looping with the range() Function -- Decrypting the Message -- Using String Formatting to Display the Key and Decrypted Messages -- Summary -- Practice Question -- Chapter 7: Encrypting with the Transposition Cipher -- How the Transposition Cipher Works -- Source Code for the Transposition Cipher Encryption Program -- Sample Run of the Transposition Cipher Encryption Program -- Creating Your Own Functions with def Statements -- Passing the Key and Message As Arguments -- The List Data Type -- The Transposition Encryption Algorithm -- Augmented Assignment Operators -- Moving currentIndex Through the Message -- The join() String Method -- Return Values and return Statements -- The __name__ Variable -- Summary -- Practice Questions -- Chapter 8: Decrypting with the Transposition Cipher -- How to Decrypt with the Transposition Cipher on Paper -- Source Code for the Transposition Cipher Decryption Program -- Sample Run of the Transposition Cipher Decryption Program -- Importing Modules and Setting Up the main() Function -- Decrypting the Message with the Key -- Calling the main() Function -- Summary -- Practice Questions -- Chapter 9: Programming a Program to Test Your Program -- Source Code for the Transposition Cipher Tester Program -- Sample Run of the Transposition Cipher Tester Program -- Importing the Modules -- Creating Pseudorandom Numbers -- Creating a Random String -- Testing Each Message -- Checking Whether the Cipher Worked and Ending the Program -- Calling the main() Function -- Testing the Test Program -- Summary -- Practice Questions -- Chapter 10: Encrypting and Decrypting Files -- Plain Text Files…”
    Libro electrónico
  9. 1289
    Publicado 2019
    Materias:
    Video
  10. 1290
    Publicado 2018
    Materias:
    Video
  11. 1291
    Publicado 2020
    Materias:
    Libro electrónico
  12. 1292
    Publicado 2023
    Tabla de Contenidos: “…Part 1 of 4 - Creating an S3 bucket with Terraform -- Part 2 of 4 - Updating the security configuration of the S3 bucket -- Part 3 of 4 - Uploading files to the S3 bucket -- Part 4 of 4 - Cleaning up and deleting the S3 bucket -- Configuring a Terraform backend with state locking -- Understanding Terraform remote backends -- Configuring a Terraform remote backend -- Verifying the state-locking setup -- Part 1 of 4 - Adding a 60-second delay to the upload script -- Part 2 of 4 - Acquiring the state lock -- Part 3 of 4 - Testing our state-lock setup -- Part 4 of 4 - Cleaning up -- Summary -- Further reading -- Part 2: Setting Up Isolated Penetration Testing Lab Environments in the Cloud -- Chapter 4: Setting Up Isolated Penetration Testing Lab Environments on GCP -- Technical requirements -- Preparing the necessary components and prerequisites -- Part 1 of 3 - Retrieving the IP address of your local machine -- Part 2 of 3 - Setting up the Google Cloud project -- Part 3 of 3 - Generating SSH keys to access the attacker VM instance -- Defining the project structure -- Preparing the isolated network -- Setting up the target VM instance -- Part 1 of 2 - Preparing the target VM instance using Terraform -- Part 2 of 2 - Using the serial console to access the target VM instance -- Importing the Kali Linux Generic Cloud Image -- Manually setting up the attacker VM instance -- Part 1 of 3 - Manually launching the attacker instance -- Part 2 of 3 - Enabling browser access to our Kali Linux server -- Part 3 of 3 - Validating our setup -- Leveraging Terraform to automatically set up the attacker VM instance -- Part 1 of 3 - Creating a golden image -- Part 2 of 3 - Using Terraform to prepare the attacker VM instance -- Part 3 of 3 - Accessing the Kali Linux desktop environment -- Simulating penetration testing in an isolated network environment -- Cleaning up…”
    Libro electrónico
  13. 1293
    Publicado 2024
    Materias:
    Libro electrónico
  14. 1294
    Publicado 2024
    Tabla de Contenidos: “…Local Vulnerabilities -- Using lynis for Local Checks -- OpenVAS Local Scanning -- Root Kits -- Remote Vulnerabilities -- Quick Start with OpenVAS -- Creating a Scan -- OpenVAS Reports -- Network Device Vulnerabilities -- Auditing Devices -- Database Vulnerabilities -- Identifying New Vulnerabilities -- Summary -- Useful Resources -- Chapter 5. …”
    Libro electrónico
  15. 1295
    Publicado 2013
    “…¿Qué haces hoy princesa I?…”
    Libro
  16. 1296
    por Vega, Clara de la
    Publicado 1960
    Libro
  17. 1297
    por Vega, Clara de la
    Publicado 1963
    Libro
  18. 1298
    por Martín, Andreu
    Publicado 1989
    Libro
  19. 1299
    por Fallaci, Oriana
    Publicado 1962
    Libro
  20. 1300
    Libro