Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Security measures 92
- Computer security 80
- Computer networks 63
- Cloud computing 20
- Penetration testing (Computer security) 18
- Examinations 16
- History 16
- Management 16
- Certification 14
- Politics and government 14
- Data protection 13
- United States 13
- Artificial intelligence 12
- Engineering & Applied Sciences 12
- Application software 11
- Development 11
- Information technology 11
- National security 11
- Electronic data processing personnel 10
- Foreign relations 10
- Prevention 10
- Business enterprises 9
- Computer crimes 9
- Python (Computer program language) 9
- Access control 8
- Armed Forces 8
- Computers 8
- Electrical & Computer Engineering 7
- Military policy 7
- Operating systems (Computers) 7
-
41Publicado 2015Libro electrónico
-
42Publicado 2024“…While basic knowledge of software and security is required to understand the attack vectors and defensive techniques explained in the book, a thorough understanding of API security is all you need to get started…”
Libro electrónico -
43Publicado 2018“…Between 1966 and 1980, the War History Office of the National Defense College of Japan (now the Center for Military History of the National Institute for Defense Studies) published the 102-volume Senshi Sōsho (War History Series). …”
Electrónico -
44Publicado 2023Libro electrónico
-
45Publicado 2022“…And finally, you'll be well-versed with writing tactical, technical, and strategic intelligence reports and sharing them with the community. By the end of this book, you'll have acquired the knowledge and skills required to drive threat intelligence operations from planning to dissemination phases, protect your organization, and help in critical defense decisions. …”
Libro electrónico -
46Publicado 2024“…Highlighting the importance of a comprehensive approach, this book bridges the gap between technical solutions and business strategies to help you foster a secure organizational environment. By the end, you'll have the knowledge and tools necessary to improve your organization's cybersecurity posture and navigate the rapidly changing threat landscape. …”
Libro electrónico -
47Publicado 2019“…By the end of this Learning Path, you'll have the knowledge and skills you need to invade a system and identify all its vulnerabilities. …”
Libro electrónico -
48Publicado 2015“…Moving on, you will get to know more about scripting and input validation flaws, AJAX, and the security issues related to AJAX. At the end of the book, you will use an automated technique called fuzzing to be able to identify flaws in a web application. …”
Libro electrónico -
49Publicado 2024Libro electrónico
-
50
-
51Publicado 2017“…Build a tower defense game and earn delectable C# treats by baking cupcakes and fighting fearsome sweet-toothed pandas About This Book Build a complete and exciting 2D Tower Defense game from scratch. …”
Libro electrónico -
52
-
53
-
54Publicado 2015Libro electrónico
-
55Publicado 2007Libro electrónico
-
56Publicado 1999Libro electrónico
-
57
-
58
-
59
-
60Publicado 2022Libro electrónico