Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 1,381
- Management 690
- History 667
- Development 643
- Application software 580
- Engineering & Applied Sciences 564
- Computer networks 533
- Security measures 472
- Computer security 439
- Computer Science 380
- Filosofía 370
- Computer programs 368
- Operating systems (Computers) 354
- Database management 333
- Data processing 302
- Universidad Pontificia de Salamanca (España) 291
- Programming 280
- Design 267
- Derecho 262
- Information technology 262
- Computer programming 254
- Cloud computing 252
- Computer software 247
- Crítica e interpretación 242
- Web site development 235
- Novela norteamericana 232
- Web sites 226
- Leadership 215
- Documentales 199
- Photography 193
-
161Publicado 2005“…A few minutes spent reading some of the hacks in this book will save you hours of research. …”
Libro electrónico -
162por Wallingford, TedTabla de Contenidos: “…Broadband VoIP services -- Desktop telephony -- Skype and skyping -- Asterisk -- Telephony hardware hacks -- Navigate the VoIP network -- Hard-core voice…”
Publicado 2006
Libro electrónico -
163por Biafore, BonnieTabla de Contenidos: “…Screening investments -- Hacking Excel for financial analysis -- Collecting financial data -- Analyzing company fundamentals -- Technical analysis -- Executing trades -- Investing in mutual funds -- Managing your portfolio -- Financial planning…”
Publicado 2004
Libro electrónico -
164Publicado 2004“…Written by Derrick Story, photographer and author of Digital Photography Pocket Guide and other books, it goes beyond the standard fare of most digital photography books--such as camera basics, understanding memory cards, and when to use a flash--to the things that professional photographers have learned through thousands of shots' worth of experience, years of experimentation, and fiddling and hacking. The book includes a foreword by photographer Rick Smolan, author of America 24/7. …”
Libro electrónico -
165Publicado 2004“…To the uninitiated, the title may seem like an oxymoron: after all, aren't hacks what network security is supposed to prevent? …”
Libro electrónico -
166por Rankin, KyleTabla de Contenidos: “…Linux Multimedia Hacks; Contributors; Acknowledgments; Preface; How to Use This Book; How This Book Is Organized; Conventions Used in This Book; Using Code Examples; How to Contact Us; Safari Enabled; Got a Hack?…”
Publicado 2005
Libro electrónico -
167Publicado 2003“…Windows XP Hacks is the latest in O'Reilly's new Hacks Series which aims to begin reclaiming the term "hacking" for the good guys. …”
Libro electrónico -
168por Gralla, PrestonTabla de Contenidos: “…Setup and startup hacks -- Hacking the start screen, the Windows 8 interface, and apps -- Hacking the desktop -- Productivity and system performance hacks -- Cloud and social networking hacks -- Music, media, and video -- Networking, the Web, wireless, and the Internet -- Security -- Email -- Hardware -- The Registry and Group Policy Editor…”
Publicado 2013
Libro electrónico -
169por Karp, David A.Tabla de Contenidos: “…Contents; Credits; About the Author; Contributors; Best eBay Pop-Culture References; Acknowledgments; Preface; Origins; What This Book Is...and Isn't; Hacking a Dynamic System; Practical Matters; Getting Started with the Code in This Book; HTML; JavaScript; Perl; Using Code Examples; How This Book Is Organized; Hacks for All; Hacks for Buyers; Hacks for Sellers; Hacks for Developers; How to Use This Book; Conventions Used in This Book; How to Contact Us; Safari Enabled; Got a Hack?…”
Publicado 2005
Libro electrónico -
170Publicado 2015Tabla de Contenidos: “…Front Cover; Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques; Copyright; Contents; Preface; WHAT THIS BOOK COVERS; HOW DO YOU PRACTICE; TO WHOM THIS BOOK IS FOR; About the Authors; SUDHANSHU CHAUHAN; NUTAN KUMAR PANDA; Acknowledgments; SUDHANSHU CHAUHAN; NUTAN KUMAR PANDA; Chapter 1 - Foundation: Understanding the Basics; INTRODUCTION; INTERNET; WORLD WIDE WEB; DEFINING THE BASIC TERMS; WEB BROWSING-BEHIND THE SCENE; LAB ENVIRONMENT; Chapter 2 - Open Source Intelligence and Advanced Social Media Search; INTRODUCTION; OPEN SOURCE INTELLIGENCE…”
Libro electrónico -
171Publicado 2012“…Computer-Forensik Hacks – 100 Forensik-Hacks ist eine Sammlung von 100 thematisch sortierten Tricks und Tools, die dabei helfen, herausfordernde Probleme der Computer-Forensik zu lösen. …”
Libro electrónico -
172Publicado 2013“…DIY hardware hacking...easy as Pi ®! Raspberry Pi is taking off like a rocket! …”
Libro electrónico -
173Publicado 2022Tabla de Contenidos: “…Table of Contents Hacking Yourself SOC Analyst Penetration Tester Digital Forensics Analyst Cryptographer/Cryptanalyst GRC/Privacy Analyst Security Auditor Malware Analyst Cybersecurity Manager Cybersecurity Sales Engineer CISO Behavioral Interview Questions Final Thoughts…”
Libro electrónico -
174
-
175Publicado 2024Tabla de Contenidos: “…Cover -- Copyright -- Contributors -- Preface -- Chapter 1: Hacking Yourself -- How to get the most out of this book -- General interview advice -- Common interview questions -- Some additional tips for your interview -- A definition of cybersecurity -- The HACK method -- How -- Analyze -- Collect -- Know -- Personal branding and soft skills -- Personal branding -- Soft skills -- Negotiation 101 -- Managing stress -- Summary -- Chapter 2: Cybersecurity Engineer -- What is a Cybersecurity Engineer? …”
Libro electrónico -
176por Petreley, NickTabla de Contenidos: “…Set a Bitmap Boot Screen for LILOCreate Your Own LILO Boot Splash; Picking Colors; Display a GRUB Boot Splash Background; Create a GRUB Boot Splash Background; Jazz Up Your Debian System Boot; make menuconfig; Install Boot Splash and the Boot Splash init Scripts; Set Up Your Bootloader; Reboot; Graphical Consoles; Graphics on the Console; Setting Up the Kernel; Configuring the Kernel; Configuring the Bootloader; Configure LILO; Configure GRUB; Console; Redefine Keyboard Actions; Virtual Consoles; Using the "Other" Alt Key; Deep-Six the Caps Lock Key…”
Publicado 2005
Libro electrónico -
177Publicado 2004“…The hundred, industrial strength hacks in the book range from those that deal with general administration to more esoteric hacks in the areas of network deployment, patch management, and backup and recovery. …”
Libro electrónico -
178Publicado 2005Tabla de Contenidos: “…; Conventions; Using Code Examples; How to Contact Us; Got a Hack?; Get to Know Your Phone; Choose the Right Phone for the Network; Pick the Right Class of Nokia Phone; Series 40; Series 60; Series 80; Series 90; Pick a Voice Plan; Pick the Phone; Pick the Operator; Research Your Choices; Choose a Plan; After You Sign Up; Choose a Data Plan; Flavors of Cellular Data; Figure Out What You'll Need…”
Libro electrónico -
179por Stolarz, DamienTabla de Contenidos: “…Car PC Hacks; Contributors; Acknowledgments; Preface; How to Use This Book; How This Book Is Organized; Conventions Used in This Book; Using Code Examples; Safari Enabled; How to Contact Us; Got a Hack?…”
Publicado 2005
Libro electrónico -
180por Avery, JamesTabla de Contenidos: “…Contents; Credits; About the Author; Contributors; Acknowledgments; Preface; Why Visual Studio Hacks?; How to Use This Book; An Important Note About Keyboard Shortcuts; How This Book Is Organized; Conventions; Using Code Examples; Safari Enabled; How to Contact Us; Got a Hack?…”
Publicado 2005
Libro electrónico