Mostrando 7,781 - 7,800 Resultados de 9,969 Para Buscar 'Huntik~', tiempo de consulta: 1.24s Limitar resultados
  1. 7781
    Publicado 2023
    “…Ethical Hacking, Penetration Testing, and Bug Hunting--Starts with an overview of security penetration testing and bug hunting. …”
    Video
  2. 7782
    Publicado 2022
    Tabla de Contenidos: “…Table of Contents Why You Need a Threat Intelligence Program Threat Actors, Campaigns, and Tooling Guidelines and Policies Threat Intelligence Frameworks, Standards, Models, and Platforms Operational Security (OPSEC) Technical Threat Intelligence – Collection Technical Threat Analysis – Enrichment Technical Threat Analysis – Threat Hunting and Pivoting Technical Threat Analysis – Similarity Analysis Preparation and Dissemination Fusion into Other Enterprise Operations Overview of Datasets and Their Practical Application Conclusion…”
    Libro electrónico
  3. 7783
    Publicado 2009
    “…“With Search Engine Marketing, Inc., Bill Hunt and Mike Moran have successfully updated what is already known in the industry as “The Search Marketing Bible.” …”
    Libro electrónico
  4. 7784
    Publicado 2017
    Tabla de Contenidos: “…-- Making Metasploit effective and powerful using supplementary tools -- Nessus -- NMAP -- w3af -- Armitage -- Summary -- Exercises -- Chapter 2: Setting up Your Environment -- Using the Kali Linux virtual machine - the easiest way -- Installing Metasploit on Windows -- Installing Metasploit on Linux -- Setting up exploitable targets in a virtual environment -- Summary -- Exercises -- Chapter 3: Metasploit Components and Environment Configuration -- Anatomy and structure of Metasploit -- Metasploit components -- Auxiliaries -- Exploits -- Encoders -- Payloads -- Post -- Playing around with msfconsole -- Variables in Metasploit -- Updating the Metasploit Framework -- Summary -- Exercises -- Chapter 4: Information Gathering with Metasploit -- Information gathering and enumeration -- Transmission Control Protocol -- User Datagram Protocol -- File Transfer Protocol -- Server Message Block -- Hypertext Transfer Protocol -- Simple Mail Transfer Protocol -- Secure Shell -- Domain Name System -- Remote Desktop Protocol -- Password sniffing -- Advanced search with shodan -- Summary -- Exercises -- Chapter 5: Vulnerability Hunting with Metasploit -- Managing the database -- Work spaces -- Importing scans -- Backing up the database -- NMAP -- NMAP scanning approach -- Nessus -- Scanning using Nessus from msfconsole -- Vulnerability detection with Metasploit auxiliaries -- Auto exploitation with db_autopwn -- Post exploitation -- What is meterpreter?…”
    Libro electrónico
  5. 7785
    Publicado 2024
    Tabla de Contenidos: “…The incident response process -- The preparation phase -- Detection phase -- Analysis phase -- Containment and eradication phase -- Recovery phase -- Post-incident activities (postmortem) -- Information sharing and coordination -- Incident response team structure -- Introducing indicators of incidents -- Types of indicators -- IOC tools -- Introducing threat hunting -- Threat hunting tools -- Getting Started with the Threat hunting process -- Best practices for threat hunting -- Practical aspects of threat hunting -- Lab: Security incident response simulation -- Exercise 2: Threat Hunt -- Summary -- Assessment -- Answers -- Chapter 12: Social Engineering -- Introducing social engineering -- Phases of a social engineering attack -- Social engineering attack techniques -- Physical-based social engineering -- Electronic-based social engineering -- Social engineering tools -- Social-Engineer Toolkit -- Browser Exploitation Framework -- Social engineering defenses -- Protecting businesses' strategies -- Protecting businesses' policies and practices -- Protecting individuals -- The impact of AI on social engineering -- Lab -- Activities -- Summary -- Assessment -- Answers -- Chapter 13: Ethical Hacking of the Internet of Things -- What is IoT? …”
    Libro electrónico
  6. 7786
    “…Examines the benefits of Windows Embedded Compact 7 (WEC7) Reviews the various elements of OS design, including configuring and building a customized OS runtime image, using debugging and remote tools, and more Explains how to develop native code applications with Visual Studio 2010, develop database applications with SQL server compact, and use the application deployment option Discusses how to deploy a WEC device, use the boot loader, launch WEC using BIOSLoader, and deploy a WEC power toy If you're interested in learning more about embedded development or you're seeking a higher performance development platform, then this is the book for you…”
    Libro electrónico
  7. 7787
    por Abbrugiati, Perle
    Publicado 2020
    “…Les deux sans doute, puisque Tabucchi saupoudre du rêve partout, mais dénonce aussi très crûment le réel, ses menaces, ses hantises. Un auteur onirique et pourtant engagé, qui nous est ici présenté à travers plusieurs démarches : une traversée des principales œuvres narratives qui ont marqué sa carrière d’écrivain ; une déambulation à travers ses principaux thèmes et quelques-uns de ses plus beaux textes ; une série d’essais conçus comme des tentatives recommencées d’approcher un écrivain qui fascine et se dérobe. …”
    Electrónico
  8. 7788
    Publicado 2020
    “…Establish your eBay store Find techniques to make your listings stand out Make money and friends with social media Bid or buy outright Whether you’re a bargain hunter or bargain seller, declutterer or aspiring eBay tycoon, eBay for Dummies has what you need. …”
    Libro electrónico
  9. 7789
    “…The book includes extensive information on C# and how it works with the NGWS runtime environment, Visual C++.NET, Java, Jscript, Visual Basic.NET, ADO+, ASP.NET plus much more. …”
    Libro electrónico
  10. 7790
    Publicado 2017
    “…Get an application-centric view of automation—and understand why it’s important Learn patterns and practical examples for managing continuous deployments such as rolling, A/B, blue-green, and canary Implement continuous integration pipelines with OpenShift’s Jenkins capability Explore mechanisms for separating and managing configuration from static runtime software Learn how to use and customize OpenShift’s source-to-image capability Delve into management and operational considerations when working with OpenShift-based application workloads Install a self-contained local version of the OpenShift environment on your computer…”
    Libro electrónico
  11. 7791
    Publicado 2017
    “…This book covers: Cloud-native concepts that make the app build, test, deploy, and scale faster How to deploy Cloud Foundry and the BOSH release engineering toolchain Concepts and components of Cloud Foundry’s runtime architecture Cloud Foundry’s routing mechanisms and capabilities The platform’s approach to container tooling and orchestration BOSH concepts, deployments, components, and commands Basic tools and techniques for debugging the platform Recent and soon-to-emerge features of Cloud Foundry…”
    Libro electrónico
  12. 7792
    Publicado 2018
    “…Explore security concepts including defense in depth, least privilege, and limiting the attack surface Safeguard clusters by securing worker nodes and control plane components, such as the API server and the etcd key value store Learn how Kubernetes uses authentication and authorization to grant fine-grained access Secure container images against known vulnerabilities and abuse by third parties Examine security boundaries and policy enforcement features for running containers securely Learn about the options for handling secret information such as credentials Delve into advanced topics such as monitoring, alerting, and auditing, as well as sandboxing and runtime protection…”
    Libro electrónico
  13. 7793
    Publicado 2018
    “…By providing a query language for your APIs and a runtime for fulfilling queries with your data, GraphQL presents a clear alternative to REST and ad hoc web service architectures. …”
    Libro electrónico
  14. 7794
    Publicado 2013
    “…Finally, it describes and documents multiple runtime configuration options. This second edition, SG24-8014-01, of this IBM Redbooks publication updated the information presented in this book to reflect function available in IBM Operational Decision Manager for z/OS Version 8.0.1. …”
    Libro electrónico
  15. 7795
    Publicado 2016
    “…Learn expert techniques for designing and implementing components, assembling composite applications, integrating Java, handling complex business logic, and maximizing code reuse. Runtime administration, governance, and security are covered in this practical resource. …”
    Libro electrónico
  16. 7796
    por Nash, Trey
    Publicado 2010
    “…Many books introduce C#, but very few also explain how to use it optimally with the .NET Common Language Runtime (CLR). This book teaches both core C# language concepts and how to wisely employ C# idioms and object-oriented design patterns to exploit the power of C# and the CLR. …”
    Libro electrónico
  17. 7797
    Publicado 2019
    “…Fortunately, you can use Mountebank to "imitate" the components of a distributed microservices application to give you a good approximation of the runtime conditions as you test individual services. …”
    Libro electrónico
  18. 7798
    Publicado 2018
    “…In cloud-native architectures, your network becomes the fundamental determining factor for how your applications behave at runtime. The shift to microservices solves many problems, but it also introduces a new set of reliability, performance, and security challenges inherent to managing distributed systems. …”
    Libro electrónico
  19. 7799
    Publicado 2017
    “…And with an effi cient compiler and a small standard library, Kotlin imposes virtually no runtime overhead. About the Book Kotlin in Action teaches you to use the Kotlin language for production-quality applications. …”
    Libro electrónico
  20. 7800
    Publicado 2018
    “…Aditya Mathur (SUTD, Singapore &Purdue University, USA)"Control Theory for Practical Cyber-Physical Security" by Prof. Henrik Sandberg (KTH, Sweden)"Leaky CPS: Inferring Cyber Information from Physical Properties (and the other way around)" by Prof. …”
    Libro electrónico