Titel, Artikelname, Autor:
in 
Bücher Elektronik, Foto
Musik-CDs DVDs, Blu-ray
Spielzeug Software
Freizeit, Sport Haus und Garten
Computerspiele Küchengeräte
Essen und Trinken Drogerie und Bad
Inhaltsangaben
Kurzbeschreibungen
Zusammenfassungen

Buch, Hörbücher:

Computernetzwerke

Seite 9
The Ultimate Kali Linux Book - - Glen D. Singh

The Ultimate Kali Linux Book -

Autor: Glen D. Singh

Taschenbuch, 24.02.2022
Weiterinformieren oder bestellen


CompTIA Network+: Computer-Netzwerke verständlich erläutert. Vorbereitung auf die Prüfung N10-008 (mitp Professional) - Markus Kammermann

CompTIA Network+: Computer-Netzwerke verständlich erläutert. Vorbereitung auf die Prüfung N10-008 (mitp Professional)

Autor: Markus Kammermann

Taschenbuch, 08.06.2022
Weiterinformieren oder bestellen


Azure und Microsoft 365 Security - Göran Eibel

Azure und Microsoft 365 Security

Autor: Göran Eibel

Taschenbuch, 08.04.2022
Weiterinformieren oder bestellen


INTRODUCTION TO ARTIFICIAL INTELLIGENCE AND GENERATIVE AI FOR NOVICE: Exploring Artificial Intelligence System and their Applications - Adam Neural

INTRODUCTION TO ARTIFICIAL INTELLIGENCE AND GENERATIVE AI FOR NOVICE: Exploring Artificial Intelligence System and their Applications

Autor: Adam Neural

Gebundene Ausgabe, 21.06.2023
Weiterinformieren oder bestellen


Automotive Ethernet - Kirsten Matheus, Thomas Königseder

Automotive Ethernet

Autoren: Kirsten Matheus, Thomas Königseder

Gebundene Ausgabe, 17.06.2021
Weiterinformieren oder bestellen


Mensch und Informationssicherheit: Verhalten verstehen, Awareness fördern, Human Hacking erkennen - Kristin Weber

Mensch und Informationssicherheit: Verhalten verstehen, Awareness fördern, Human Hacking erkennen

Autor: Kristin Weber

Gebundene Ausgabe, 19.01.2024
Weiterinformieren oder bestellen


Digital Forensics and Incident Response: Incident response tools and techniques for effective cyber threat response, 3rd Edition - Gerard Johansen

Digital Forensics and Incident Response: Incident response tools and techniques for effective cyber threat response, 3rd Edition

Autor: Gerard Johansen

Taschenbuch, 16.12.2022
Weiterinformieren oder bestellen


Natural Language Processing mit Transformern: Sprachanwendungen mit Hugging Face erstellen (Animals) - Lewis Tunstall, Leandro von Werra, Thomas Wolf Übersetzer: Marcus Fraaß

Natural Language Processing mit Transformern: Sprachanwendungen mit Hugging Face erstellen (Animals)

Autoren: Lewis Tunstall, Leandro von Werra, Thomas Wolf
Übersetzer: Marcus Fraaß

Taschenbuch, 02.02.2023
Weiterinformieren oder bestellen


Craft of System Security, The - Sean Smith

Craft of System Security, The

Sean Smith

Taschenbuch
Weiterinformieren oder bestellen

I believe The Craft of System Security is one of the best software security books on the market today. It has not only breadth but depth covering topics ranging from cryptography networking and operating systems-to the Web computer-human interaction and how to improve the security of software systems by improving hardware. Bottom line this book should be required reading for all who plan to call themselves security practitioners

Human Aspects of IT for the Aged Population. Aging, Design and User Experience: Third International Conference, ITAP 2017, Held as Part of HCI ... Notes in Computer Science, Band 10297)

Human Aspects of IT for the Aged Population. Aging, Design and User Experience: Third International Conference, ITAP 2017, Held as Part of HCI ... Notes in Computer Science, Band 10297)

Taschenbuch
Weiterinformieren oder bestellen


Classic Computer Science Problems in Python - David Kopec

Classic Computer Science Problems in Python

David Kopec

Taschenbuch
Weiterinformieren oder bestellen


Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World - Joseph Menn

Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World

Joseph Menn

Taschenbuch
Weiterinformieren oder bestellen

How the Original Hacking Supergroup Might Just Save the World
Broschiertes Buch
The fast-paced, riveting story of the hacking collective that is using technology as a force for good, and fighting back against corporations and countries that are going after our freedom, privacy, even our democracy.

Building Android Apps in Python Using Kivy with Android Studio: With Pyjnius, Plyer, and Buildozer - Ahmed Fawzy Mohamed Gad

Building Android Apps in Python Using Kivy with Android Studio: With Pyjnius, Plyer, and Buildozer

Ahmed Fawzy Mohamed Gad

Taschenbuch
Weiterinformieren oder bestellen


Wireless Communications from the Ground Up: An SDR Perspective - Qasim Chaudhari

Wireless Communications from the Ground Up: An SDR Perspective

Qasim Chaudhari

Taschenbuch
Weiterinformieren oder bestellen


Darknet: Waffen, Drogen, Whistleblower - Stefan Mey

Darknet: Waffen, Drogen, Whistleblower

Stefan Mey

Taschenbuch
Weiterinformieren oder bestellen


OAuth 2 in Action - Justin Richer, Antonio Sanso

OAuth 2 in Action

Justin Richer, Antonio Sanso

Taschenbuch
Weiterinformieren oder bestellen


Hands-On Microservices with Kubernetes: Build, deploy, and manage scalable microservices on Kubernetes - Gigi Sayfan

Hands-On Microservices with Kubernetes: Build, deploy, and manage scalable microservices on Kubernetes

Gigi Sayfan

Taschenbuch
Weiterinformieren oder bestellen


Gray Hat Hacking: The Ethical Hacker's Handbook - Allen Harper, Daniel Regalado, Ryan Linn, Stephen Sims, Branko Spasojevic, Linda Martinez, Michael Baucom, Chris Eagle, Shon Harris

Gray Hat Hacking: The Ethical Hacker's Handbook

Allen Harper, Daniel Regalado, Ryan Linn, Stephen Sims, Branko Spasojevic, Linda Martinez, Michael Baucom, Chris Eagle, Shon Harris

Taschenbuch
Weiterinformieren oder bestellen

Broschiertes Buch
Cutting-edge techniques for finding and fixing critical security flaws Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition explains the enemy's current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-try testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource. And the new topic of exploiting the Internet of things is introduced in this edition. . Build and launch spoofing exploits with Ettercap . Induce error conditions and crash software using fuzzers . Use advanced reverse engineering to exploit Windows and Linux software . Bypass Windows Access Control and memory protection schemes . Exploit web applications with Padding Oracle Attacks . Learn the use-after-free technique used in recent zero days . Hijack web browsers with advanced X S S attacks . Understand ransomware and how it takes control of your desktop . Dissect Android malware with J E B and D A D decompilers . Find one-day vulnerabilities with binary diffing . Exploit wireless systems with Software Defined Radios ( S D R) . Exploit Internet of things devices . Dissect and exploit embedded devices . Understand bug bounty programs . Deploy next-generation honeypots . Dissect A T M malware and analyze common A T M attacks . Learn the business side of ethical hacking

(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (Sybex Study Guide) (English Edition) - Mike Chapple, James Michael Stewart, Darril Gibson

(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (Sybex Study Guide) (English Edition)

Autoren: Mike Chapple, James Michael Stewart, Darril Gibson

Kindle eBook und andere Ausgaben
Weiterinformieren oder bestellen


Buch, Hörbücher: Netzwerke
Weitere Seiten:
Computernetzwerke, Vorige Seite
 1      2      3      4      5      6      7      8      9      10    
Computernetzwerke, Nächste Seite


Buch, Hörbücher: Computernetzwerke
Buch, Hörbücher
Computer und Internet
PC- und Internetsicherheit

Netzwerke



04.03.2024  19