Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 1,382
- Management 690
- History 667
- Development 643
- Application software 580
- Engineering & Applied Sciences 564
- Computer networks 533
- Security measures 472
- Computer security 439
- Computer Science 380
- Filosofía 374
- Computer programs 368
- Operating systems (Computers) 354
- Database management 333
- Data processing 302
- Universidad Pontificia de Salamanca (España) 291
- Programming 280
- Design 267
- Derecho 263
- Information technology 262
- Computer programming 254
- Cloud computing 252
- Computer software 247
- Crítica e interpretación 242
- Web site development 235
- Novela norteamericana 232
- Web sites 226
- Leadership 215
- Documentales 199
- Photography 193
-
1561
-
1562
-
1563
-
1564
-
1565
-
1566
-
1567
-
1568
-
1569
-
1570por Asadoorian, PaulTabla de Contenidos: “…Front Cover; Linksys® WRT54G Ultimate Hacking; Copyright Page; Contents; Chapter 1. WRT54G Fundamentals; Introduction; Our Approach to This Book; History of the Linksys WRT54G; Linksys WRT54G Series Hardware; WRT54G Buyer's Guide; Linksys WRT54GS Hardware; Other Linksys WRT54G Hardware to Hack; Resources; Solutions Fast Track; Frequently Asked Questions; Chapter 2. …”
Publicado 2007
Libro electrónico -
1571por Kong, JosephTabla de Contenidos: “…Acknowledgments; Foreword; Introduction; 1: Loadable Kernel Modules; 2: Hooking; 3: Direct Kernel Object Manipulation; 4: Kernel Object Hooking; 5: Run-Time Kernel Memory Patching; 6: Putting It All Together; 7: Detection; Closing Words; Bibliography; Index; Updates…”
Publicado 2007
Libro electrónico -
1572por Litchfield, David, 1975-Tabla de Contenidos: “…The Oracle® Hacker's Handbook: Hacking and Defending Oracle; Contents; Introduction; Chapter 1 Overview of the Oracle RDBMS; Architecture; Processes; The File System; The Network; Oracle Patching; Wrapping Up; Chapter 2 The Oracle Network Architecture; The TNS Protocol; Getting the Oracle Version; Wrapping Up; Chapter 3 Attacking the TNS Listener and Dispatchers; Attacking the TNS Listener; The Aurora GIOP Server; The XML Database; Wrapping Up; Chapter 4 Attacking the Authentication Process; How Authentication Works; Attacks Against the Crypto Aspects; Default Usernames and Passwords…”
Publicado 2007
Libro electrónico -
1573Publicado 2014Tabla de Contenidos: “…Processes and Services Managing Networking ; Setting a Static IP Address; Viewing Network Connections; Netcat: The Swiss Army Knife of TCP/IP Connections; Check to See If a Port Is Listening; Opening a Command Shell Listener; Pushing a Command Shell Back to a Listener; Automating Tasks with cron Jobs ; Summary ; Chapter 3: Programming; Bash Scripting; Ping; A Simple Bash Script; Running Our Script; Adding Functionality with if Statements; A for Loop ; Streamlining the Results; Python Scripting; Connecting to a Port; if Statements in Python; Writing and Compiling C Programs ; Summary…”
Libro electrónico -
1574
-
1575
-
1576
-
1577
-
1578
-
1579Publicado 2001Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Biblioteca Universidad de Deusto)Libro
-
1580