Mostrar el registro sencillo

dc.contributor.advisorGrout, Ian A.
dc.contributor.authorPozo López, Diego del
dc.contributor.otherUniversidad de Cantabriaes_ES
dc.date.accessioned2021-07-20T07:26:09Z
dc.date.issued2021-04-26
dc.identifier.urihttp://hdl.handle.net/10902/22008
dc.description.abstractThe report’s intention is to bring closer different aspects of the security on the Internet. In the first chapter it is explained the concept of penetration testing and the fundamentals of this process while highlighting the importance it has in the protection of networks and devices. Then, it is given a basic view of the main attacks that can be performed to gain access, deny service, steal information and others. In chapter three, introduces from an educational point of view the possibilities for beginners to practice their abilities in a secure environment. Finally, in the fourth chapter, the research focuses on an important element of the Internet, which is databases and their security, concluding with a simulation of an SQL injection attack.es_ES
dc.format.extent72 p.es_ES
dc.language.isoenges_ES
dc.rightsAtribución-NoComercial-SinDerivadas 3.0 España*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/es/*
dc.titlePrinciples of hacking and databaseses_ES
dc.typeinfo:eu-repo/semantics/bachelorThesises_ES
dc.rights.accessRightsopenAccesses_ES
dc.description.degreeGrado en Ingeniería de Tecnologías de Telecomunicaciónes_ES


Ficheros en el ítem

Thumbnail

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo

Atribución-NoComercial-SinDerivadas 3.0 EspañaExcepto si se señala otra cosa, la licencia del ítem se describe como Atribución-NoComercial-SinDerivadas 3.0 España