Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Application software 419
- Development 396
- Android (Electronic resource) 365
- Mobile computing 251
- Programming 148
- Smartphones 83
- Mobile apps 82
- Java (Computer program language) 65
- Design 61
- Engineering & Applied Sciences 59
- Computer programming 54
- Mobile Computing 52
- Computer Science 50
- Security measures 49
- iOS (Electronic resource) 42
- JavaScript (Computer program language) 39
- Computer programs 37
- Video games 35
- Computer security 34
- Operating systems (Computers) 34
- HTML (Document markup language) 33
- Open source software 32
- Computer games 31
- Computer networks 29
- Programming languages (Electronic computers) 27
- Web applications 27
- Microsoft .NET Framework 26
- Programming Techniques 26
- Web site development 26
- Artificial intelligence 25
-
1501por Beorlegui, Carlos, 1947-“…Si en la antigüedad se definía en relación a lo divino y, más tarde, en comparación con otras culturas humanas, en la actualidad el elemento de contraste son los animales (lo prehumano) y lo poshumano (ciborgs, androides y robots). Desde Darwin, muchos piensan que hay que superar el antropocentrismo y difuminar toda línea divisoria entre lo humano y el resto de las especies vivas. …”
Publicado 2019
Biblioteca Universidad Eclesiástica San Dámaso (Otras Fuentes: Biblioteca Universitat Ramon Llull, Biblioteca del Instituto Superior de Teología de las Islas Canarias, Universidad Loyola - Universidad Loyola Granada, Bibliotecas de la Diócesis de Teruel y Albarracín, Biblioteca del Instituto Diocesano de Teología y Pastoral de Bilbao, Biblioteca Universidad de Deusto, Biblioteca de la Universidad Pontificia de Salamanca)Libro -
1502Seguridad informática y Malwares Análisis de amenazas e implementación de contramedidas (2a edición)Publicado 2020“…Dos capítulos están dedicados al análisis de malware en sistemas operativos móviles: el sistema operativo Android de Google y el de Apple, iOS. La última parte de este libro expone los métodos que permiten erradicar los malwares previamente identificados y analizados. …”
Acceso con credenciales UPSA.
Libro electrónico -
1503Publicado 2014“…—Mark Frauenfelder, co-founder of bOING bOING You'll learn how to: Create a basic Apple Wi-Fi network, and connect to it from OS X, iOS, Windows 10, Android, and Chrome OS. Efficiently swap a new base station in place of an old one. …”
Libro electrónico -
1504Publicado 2023“…About The Author Ranjan Pandey: Ranjan Pandey is a full-stack DevOps software professional with over 11 years of experience in a variety of technologies ranging from web and mobile application development using HTML5, CSS3, JavaScript, jQuery, Bootstrap, Angular, React, Java, Spring, Spring Boot, Python, Flask, Django, NodeJS, Express, Android, Ionic, React Native, Flutter to artificial intelligence and cloud technologies such as Amazon Web Services and Microsoft Azure. …”
Video -
1505Publicado 2023“…About The Author Ranjan Pandey: Ranjan Pandey is a full-stack DevOps software professional with over 11 years of experience in a variety of technologies ranging from web and mobile application development using HTML5, CSS3, JavaScript, jQuery, Bootstrap, Angular, React, Java, Spring, Spring Boot, Python, Flask, Django, NodeJS, Express, Android, Ionic, React Native, Flutter to artificial intelligence and cloud technologies such as Amazon Web Services and Microsoft Azure. …”
Video -
1506Publicado 2021“…Topics include * Information security, cybersecurity, and ethical hacking overview * Reconnaissance techniques * Network and perimeter hacking * Web application hacking * Wireless, mobile, IoT, and OT hacking * Cloud computing and cryptography Skill level: Intermediate Learn How To * Perform vulnerability assessments: Vulnerability analysis, hacking concepts, and malware * Perform reconnaissance: Actively and passively gather information about targets through online information gathering, scanning, and enumeration * Attack the network: Using information gathered in the reconnaissance phase, exploit vulnerabilities using sniffing, social engineering, DoS, and session hijacking; exploit vulnerabilities in wireless networks to gain access * Attack the app: Exploit vulnerabilities in web servers and web applications, databases, and iOS/Android applications * Attack the cloud and edge: Investigate edge IoT and cloud architectures and attack vectors * Understand cryptography: Explore symmetric and asymmetric key cryptography methods and algorithms Who Should Take This Course: * Anyone interested in passing the EC Council Certified Ethical Hacker (CEH) exam * Anyone interested in becoming a cybersecurity professional * Anyone interested in ethical hacking (penetration testing) Course Requirements: Anyone interested in earning a Certified Ethical Hacker (CEH) certification must attend training through EC-Council or show that they have two years of information security experience. …”
Video -
1507Publicado 2024“…Devices: Desktop and laptop computers, tablets running on Android v8.0 and above and iOS v13 and above, smartphones with a minimum screen size of 4.7. …”
Libro electrónico -
1508por Akkor Gul, Aysen“…The chapter concludes that human beings embrace their individuality firmly and will not abandon their self-image for that of a robot, an android, a digital avatar, or even a clone of oneself. …”
Publicado 2020
Libro electrónico -
1509Publicado 2022“…La configuración de la red se examina para Windows, Linux, macOS, iOS y Android. Se explican los métodos de acceso al medio CSMA/CA y CSMA/CD, así como el paso de testigo. …”
Acceso con credenciales UPSA.
Libro electrónico