Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 380
- Development 355
- History 349
- Application software 303
- Engineering & Applied Sciences 237
- Computer Science 177
- Filosofía 152
- Computer programs 138
- Management 129
- Crítica e interpretación 124
- Computer networks 113
- Computer security 113
- Web site development 109
- Java (Computer program language) 107
- Security measures 102
- Computer programming 97
- Cloud computing 94
- Computer software 94
- Microsoft .NET Framework 94
- Historia y crítica 93
- Internet programming 80
- Programming 76
- Biblia 75
- Software engineering 71
- Cristianismo 70
- Artificial intelligence 69
- Job hunting 68
- History and criticism 66
- Design 65
- Business & Economics 63
-
7781Publicado 2023“…Ethical Hacking, Penetration Testing, and Bug Hunting--Starts with an overview of security penetration testing and bug hunting. …”
Video -
7782Publicado 2022Tabla de Contenidos: “…Table of Contents Why You Need a Threat Intelligence Program Threat Actors, Campaigns, and Tooling Guidelines and Policies Threat Intelligence Frameworks, Standards, Models, and Platforms Operational Security (OPSEC) Technical Threat Intelligence – Collection Technical Threat Analysis – Enrichment Technical Threat Analysis – Threat Hunting and Pivoting Technical Threat Analysis – Similarity Analysis Preparation and Dissemination Fusion into Other Enterprise Operations Overview of Datasets and Their Practical Application Conclusion…”
Libro electrónico -
7783Publicado 2009“…“With Search Engine Marketing, Inc., Bill Hunt and Mike Moran have successfully updated what is already known in the industry as “The Search Marketing Bible.” …”
Libro electrónico -
7784Publicado 2017Tabla de Contenidos: “…-- Making Metasploit effective and powerful using supplementary tools -- Nessus -- NMAP -- w3af -- Armitage -- Summary -- Exercises -- Chapter 2: Setting up Your Environment -- Using the Kali Linux virtual machine - the easiest way -- Installing Metasploit on Windows -- Installing Metasploit on Linux -- Setting up exploitable targets in a virtual environment -- Summary -- Exercises -- Chapter 3: Metasploit Components and Environment Configuration -- Anatomy and structure of Metasploit -- Metasploit components -- Auxiliaries -- Exploits -- Encoders -- Payloads -- Post -- Playing around with msfconsole -- Variables in Metasploit -- Updating the Metasploit Framework -- Summary -- Exercises -- Chapter 4: Information Gathering with Metasploit -- Information gathering and enumeration -- Transmission Control Protocol -- User Datagram Protocol -- File Transfer Protocol -- Server Message Block -- Hypertext Transfer Protocol -- Simple Mail Transfer Protocol -- Secure Shell -- Domain Name System -- Remote Desktop Protocol -- Password sniffing -- Advanced search with shodan -- Summary -- Exercises -- Chapter 5: Vulnerability Hunting with Metasploit -- Managing the database -- Work spaces -- Importing scans -- Backing up the database -- NMAP -- NMAP scanning approach -- Nessus -- Scanning using Nessus from msfconsole -- Vulnerability detection with Metasploit auxiliaries -- Auto exploitation with db_autopwn -- Post exploitation -- What is meterpreter?…”
Libro electrónico -
7785Publicado 2024Tabla de Contenidos: “…The incident response process -- The preparation phase -- Detection phase -- Analysis phase -- Containment and eradication phase -- Recovery phase -- Post-incident activities (postmortem) -- Information sharing and coordination -- Incident response team structure -- Introducing indicators of incidents -- Types of indicators -- IOC tools -- Introducing threat hunting -- Threat hunting tools -- Getting Started with the Threat hunting process -- Best practices for threat hunting -- Practical aspects of threat hunting -- Lab: Security incident response simulation -- Exercise 2: Threat Hunt -- Summary -- Assessment -- Answers -- Chapter 12: Social Engineering -- Introducing social engineering -- Phases of a social engineering attack -- Social engineering attack techniques -- Physical-based social engineering -- Electronic-based social engineering -- Social engineering tools -- Social-Engineer Toolkit -- Browser Exploitation Framework -- Social engineering defenses -- Protecting businesses' strategies -- Protecting businesses' policies and practices -- Protecting individuals -- The impact of AI on social engineering -- Lab -- Activities -- Summary -- Assessment -- Answers -- Chapter 13: Ethical Hacking of the Internet of Things -- What is IoT? …”
Libro electrónico -
7786“…Examines the benefits of Windows Embedded Compact 7 (WEC7) Reviews the various elements of OS design, including configuring and building a customized OS runtime image, using debugging and remote tools, and more Explains how to develop native code applications with Visual Studio 2010, develop database applications with SQL server compact, and use the application deployment option Discusses how to deploy a WEC device, use the boot loader, launch WEC using BIOSLoader, and deploy a WEC power toy If you're interested in learning more about embedded development or you're seeking a higher performance development platform, then this is the book for you…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
7787por Abbrugiati, Perle“…Les deux sans doute, puisque Tabucchi saupoudre du rêve partout, mais dénonce aussi très crûment le réel, ses menaces, ses hantises. Un auteur onirique et pourtant engagé, qui nous est ici présenté à travers plusieurs démarches : une traversée des principales œuvres narratives qui ont marqué sa carrière d’écrivain ; une déambulation à travers ses principaux thèmes et quelques-uns de ses plus beaux textes ; une série d’essais conçus comme des tentatives recommencées d’approcher un écrivain qui fascine et se dérobe. …”
Publicado 2020
Electrónico -
7788Publicado 2020“…Establish your eBay store Find techniques to make your listings stand out Make money and friends with social media Bid or buy outright Whether you’re a bargain hunter or bargain seller, declutterer or aspiring eBay tycoon, eBay for Dummies has what you need. …”
Libro electrónico -
7789por NIIT-IT Education and Training Group“…The book includes extensive information on C# and how it works with the NGWS runtime environment, Visual C++.NET, Java, Jscript, Visual Basic.NET, ADO+, ASP.NET plus much more. …”
Publicado 2002
Libro electrónico -
7790Publicado 2017“…Get an application-centric view of automation—and understand why it’s important Learn patterns and practical examples for managing continuous deployments such as rolling, A/B, blue-green, and canary Implement continuous integration pipelines with OpenShift’s Jenkins capability Explore mechanisms for separating and managing configuration from static runtime software Learn how to use and customize OpenShift’s source-to-image capability Delve into management and operational considerations when working with OpenShift-based application workloads Install a self-contained local version of the OpenShift environment on your computer…”
Libro electrónico -
7791Publicado 2017“…This book covers: Cloud-native concepts that make the app build, test, deploy, and scale faster How to deploy Cloud Foundry and the BOSH release engineering toolchain Concepts and components of Cloud Foundry’s runtime architecture Cloud Foundry’s routing mechanisms and capabilities The platform’s approach to container tooling and orchestration BOSH concepts, deployments, components, and commands Basic tools and techniques for debugging the platform Recent and soon-to-emerge features of Cloud Foundry…”
Libro electrónico -
7792Publicado 2018“…Explore security concepts including defense in depth, least privilege, and limiting the attack surface Safeguard clusters by securing worker nodes and control plane components, such as the API server and the etcd key value store Learn how Kubernetes uses authentication and authorization to grant fine-grained access Secure container images against known vulnerabilities and abuse by third parties Examine security boundaries and policy enforcement features for running containers securely Learn about the options for handling secret information such as credentials Delve into advanced topics such as monitoring, alerting, and auditing, as well as sandboxing and runtime protection…”
Libro electrónico -
7793Publicado 2018“…By providing a query language for your APIs and a runtime for fulfilling queries with your data, GraphQL presents a clear alternative to REST and ad hoc web service architectures. …”
Libro electrónico -
7794Publicado 2013“…Finally, it describes and documents multiple runtime configuration options. This second edition, SG24-8014-01, of this IBM Redbooks publication updated the information presented in this book to reflect function available in IBM Operational Decision Manager for z/OS Version 8.0.1. …”
Libro electrónico -
7795Publicado 2016“…Learn expert techniques for designing and implementing components, assembling composite applications, integrating Java, handling complex business logic, and maximizing code reuse. Runtime administration, governance, and security are covered in this practical resource. …”
Libro electrónico -
7796por Nash, Trey“…Many books introduce C#, but very few also explain how to use it optimally with the .NET Common Language Runtime (CLR). This book teaches both core C# language concepts and how to wisely employ C# idioms and object-oriented design patterns to exploit the power of C# and the CLR. …”
Publicado 2010
Libro electrónico -
7797Publicado 2019“…Fortunately, you can use Mountebank to "imitate" the components of a distributed microservices application to give you a good approximation of the runtime conditions as you test individual services. …”
Libro electrónico -
7798Publicado 2018“…In cloud-native architectures, your network becomes the fundamental determining factor for how your applications behave at runtime. The shift to microservices solves many problems, but it also introduces a new set of reliability, performance, and security challenges inherent to managing distributed systems. …”
Libro electrónico -
7799Publicado 2017“…And with an effi cient compiler and a small standard library, Kotlin imposes virtually no runtime overhead. About the Book Kotlin in Action teaches you to use the Kotlin language for production-quality applications. …”
Libro electrónico -
7800Publicado 2018“…Aditya Mathur (SUTD, Singapore &Purdue University, USA)"Control Theory for Practical Cyber-Physical Security" by Prof. Henrik Sandberg (KTH, Sweden)"Leaky CPS: Inferring Cyber Information from Physical Properties (and the other way around)" by Prof. …”
Libro electrónico