Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 1,381
- Management 690
- History 667
- Development 643
- Application software 580
- Engineering & Applied Sciences 564
- Computer networks 533
- Security measures 472
- Computer security 439
- Computer Science 380
- Filosofía 370
- Computer programs 368
- Operating systems (Computers) 354
- Database management 333
- Data processing 302
- Universidad Pontificia de Salamanca (España) 291
- Programming 280
- Design 267
- Derecho 262
- Information technology 262
- Computer programming 254
- Cloud computing 252
- Computer software 247
- Crítica e interpretación 242
- Web site development 235
- Novela norteamericana 232
- Web sites 226
- Leadership 215
- Documentales 199
- Photography 193
-
141por Hamouda, O. F.Materias: “…Hicks, John, 1904-1989 economía teoría estudio…”
Publicado 1993
Libro -
142
-
143por Chantzis, FotiosTabla de Contenidos: “…Preface Foreword Part One: The IoT Threat Landscape Chapter 1: The IoT Security World Chapter 2: Threat Modeling Chapter 3: A Security Testing Methodology Part Two: Network Hacking Chapter 4: Network Assessments Chapter 5: Analyzing Network Protocols Chapter 6: Exploiting Zero-configuration Networking Part Three: Hardware Hacking Chapter 7: UART, JTAG, and SWD Exploitation Chapter 8: Hacking SPI and I2C Chapter 9: Firmware Hacking Part Four: Radio Hacking Chapter 10: Abusing RFID Chapter 11: Exploiting Bluetooth Low Energy Chapter 12: Wi-Fi Hacking Chapter 13: Exploiting LPWAN Part Five: Targeting the IoT Ecosystem Chapter 14: Attacking Mobile Applications Chapter 15: Hacking the “Smart” Home Appendix A: Tools for IoT Hacking…”
Publicado 2021
Libro electrónico -
144Publicado 2022Libro electrónico
-
145Publicado 2020“…This book uses the concept of "hacking" our standard conventions of project management and outlines a standard path identified by conventional wisdom, an evil path that project managers frequently resort to under time/quality pressures, and a hacker path that provides a better way to look at the challenge. …”
Libro electrónico -
146Publicado 2022“…Inside, you'll find out how cybercriminals gain access, hijack devices and software, inject malicious code, steal mission-critical data, and plunder entire networks. …”
Libro electrónico -
147por Pauli, Joshua J.Tabla de Contenidos: “…Front Cover; The Basics of Web Hacking: Tools and Techniques to Attack the Web; Copyright; Dedication; Acknowledgments; Honey Bear; Lizard; Baby Bird; Family and Friends; Security Community; Scott White-Technical Reviewer; Syngress Team; My Vices; Biography; Foreword; Introduction; About this Book; A Hands-on Approach; What's in this Book?…”
Publicado 2013
Libro electrónico -
148Publicado 2018Libro electrónico
-
149Publicado 2016Tabla de Contenidos: “…; Warnung vor Gefahren; Anleitung für Anarchisten; Vom WAF; Wolkig mit Aussicht auf Verwirrung; Technische Details; Sensoren und Aktoren; Einheiten und Maße; Links und Ergänzungen; Kapitel 2: Hacks zur Lichtsteuerung; Hack: Lichtschalter dorthin verlegen, wo man sie braucht; Detaillierte Planung; Einfache Realisierung; Hack: Licht mit Bedingungen schalten; Lichtsteuerung priorisieren; Zwei Leuchten schalten; Lichtszenarien am Morgen und am Abend; Hack: Licht soll auf die Bewegung von Menschen reagieren…”
Libro electrónico -
150por Jing, Tony. author“…These skills are necessary to design work; however, without an understanding of the true potential of design and the skills required to unleash that potential in a startup setting, the impact of design may remain at a production level and not reach a position where it can positively impact product strategy and the business bottom line. Hacking Product Design addresses that gap in knowledge. …”
Publicado 2018
Libro electrónico -
151
-
152Publicado 2018Materias:Libro electrónico
-
153Publicado 2018Tabla de Contenidos: “…Why gray hat hacking? Ethics and law -- Programming survival skills -- Next-generation fuzzing -- Next-generation reverse engineering -- Software-defined radio -- So you want to be a pen tester? …”
Libro electrónico -
154Publicado 2014“…Hacks…”
Libro electrónico -
155Publicado 2021Tabla de Contenidos: “…Federation/Proxies -- Alternate Authentication Methods/Recovery -- Migrations -- Deprovision -- MFA Component Conclusion -- Main Hacking Methods -- Technical Attacks -- Human Element -- Physical -- Two or More Hacking Methods Used -- "You Didn't Hack the MFA!" …”
Libro electrónico -
156Publicado 2024“…Binary hacks…”
Libro electrónico -
157
-
158Publicado 2007Tabla de Contenidos: “…Introduction to ethical disclosure. Ethics of ethical hacking -- Ethical hacking and the legal system -- Proper and ethical disclosure. …”
Libro electrónico -
159
-
160por McLaughlin, BrettTabla de Contenidos: “…Home Theater Hacks; Credits; Contributors; Acknowledgments; Preface; How to Use This Book; How This Book Is Organized; Conventions; Using Code Examples; How to Contact Us; Got a Hack?…”
Publicado 2005
Libro electrónico