Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 1,382
- Management 690
- History 667
- Development 643
- Application software 580
- Engineering & Applied Sciences 564
- Computer networks 533
- Security measures 472
- Computer security 439
- Computer Science 380
- Filosofía 374
- Computer programs 368
- Operating systems (Computers) 354
- Database management 333
- Data processing 302
- Universidad Pontificia de Salamanca (España) 291
- Programming 280
- Design 267
- Derecho 263
- Information technology 262
- Computer programming 254
- Cloud computing 252
- Computer software 247
- Crítica e interpretación 242
- Web site development 235
- Novela norteamericana 232
- Web sites 226
- Leadership 215
- Documentales 199
- Photography 193
-
1281
-
1282
-
1283
-
1284
-
1285
-
1286Publicado 2020Tabla de Contenidos: “…-- TIPOS DE HACKERS -- BREVE HISTORIA DEL MUNDO HACKER -- ACTUACIONES FAMOSAS -- LOS HACKERS MÁS RECONOCIDOS -- ÉTICA HACKER -- EL EMBLEMA HACKER -- 2- HACKING ÉTICO -- ¿QUÉ ES EL HACKING ÉTICO? -- AUDITORÍAS -- FASES DE UN PROCESO DE HACKING ÉTICO -- VULNERABILIDADES CVE -- INFORME FINAL DE AUDITORÍA -- 3- PLATAFORMAS DE ENTRENAMIENTO -- MÁQUINAS VIRTUALES -- INSTALANDO VIRTUALBOX -- CREANDO NUESTRAS MÁQUINAS VIRTUALES -- ENTRENADORES VULNERABLES -- CAPTURE DE FLAG -- 4- TÉCNICAS DE OCULTAMIENTO -- ¿POR QUÉ OCULTARSE EN LA RED? …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
1287
-
1288Publicado 2018Tabla de Contenidos: “…Practice Questions -- Chapter 6: Hacking the Caesar Cipher with Brute-Force -- Source Code for the Caesar Cipher Hacker Program -- Sample Run of the Caesar Cipher Hacker Program -- Setting Up Variables -- Looping with the range() Function -- Decrypting the Message -- Using String Formatting to Display the Key and Decrypted Messages -- Summary -- Practice Question -- Chapter 7: Encrypting with the Transposition Cipher -- How the Transposition Cipher Works -- Source Code for the Transposition Cipher Encryption Program -- Sample Run of the Transposition Cipher Encryption Program -- Creating Your Own Functions with def Statements -- Passing the Key and Message As Arguments -- The List Data Type -- The Transposition Encryption Algorithm -- Augmented Assignment Operators -- Moving currentIndex Through the Message -- The join() String Method -- Return Values and return Statements -- The __name__ Variable -- Summary -- Practice Questions -- Chapter 8: Decrypting with the Transposition Cipher -- How to Decrypt with the Transposition Cipher on Paper -- Source Code for the Transposition Cipher Decryption Program -- Sample Run of the Transposition Cipher Decryption Program -- Importing Modules and Setting Up the main() Function -- Decrypting the Message with the Key -- Calling the main() Function -- Summary -- Practice Questions -- Chapter 9: Programming a Program to Test Your Program -- Source Code for the Transposition Cipher Tester Program -- Sample Run of the Transposition Cipher Tester Program -- Importing the Modules -- Creating Pseudorandom Numbers -- Creating a Random String -- Testing Each Message -- Checking Whether the Cipher Worked and Ending the Program -- Calling the main() Function -- Testing the Test Program -- Summary -- Practice Questions -- Chapter 10: Encrypting and Decrypting Files -- Plain Text Files…”
Libro electrónico -
1289
-
1290
-
1291
-
1292Publicado 2023Tabla de Contenidos: “…Part 1 of 4 - Creating an S3 bucket with Terraform -- Part 2 of 4 - Updating the security configuration of the S3 bucket -- Part 3 of 4 - Uploading files to the S3 bucket -- Part 4 of 4 - Cleaning up and deleting the S3 bucket -- Configuring a Terraform backend with state locking -- Understanding Terraform remote backends -- Configuring a Terraform remote backend -- Verifying the state-locking setup -- Part 1 of 4 - Adding a 60-second delay to the upload script -- Part 2 of 4 - Acquiring the state lock -- Part 3 of 4 - Testing our state-lock setup -- Part 4 of 4 - Cleaning up -- Summary -- Further reading -- Part 2: Setting Up Isolated Penetration Testing Lab Environments in the Cloud -- Chapter 4: Setting Up Isolated Penetration Testing Lab Environments on GCP -- Technical requirements -- Preparing the necessary components and prerequisites -- Part 1 of 3 - Retrieving the IP address of your local machine -- Part 2 of 3 - Setting up the Google Cloud project -- Part 3 of 3 - Generating SSH keys to access the attacker VM instance -- Defining the project structure -- Preparing the isolated network -- Setting up the target VM instance -- Part 1 of 2 - Preparing the target VM instance using Terraform -- Part 2 of 2 - Using the serial console to access the target VM instance -- Importing the Kali Linux Generic Cloud Image -- Manually setting up the attacker VM instance -- Part 1 of 3 - Manually launching the attacker instance -- Part 2 of 3 - Enabling browser access to our Kali Linux server -- Part 3 of 3 - Validating our setup -- Leveraging Terraform to automatically set up the attacker VM instance -- Part 1 of 3 - Creating a golden image -- Part 2 of 3 - Using Terraform to prepare the attacker VM instance -- Part 3 of 3 - Accessing the Kali Linux desktop environment -- Simulating penetration testing in an isolated network environment -- Cleaning up…”
Libro electrónico -
1293
-
1294Publicado 2024Tabla de Contenidos: “…Local Vulnerabilities -- Using lynis for Local Checks -- OpenVAS Local Scanning -- Root Kits -- Remote Vulnerabilities -- Quick Start with OpenVAS -- Creating a Scan -- OpenVAS Reports -- Network Device Vulnerabilities -- Auditing Devices -- Database Vulnerabilities -- Identifying New Vulnerabilities -- Summary -- Useful Resources -- Chapter 5. …”
Libro electrónico -
1295
-
1296
-
1297
-
1298
-
1299
-
1300