Mostrando 1,501 - 1,509 Resultados de 1,509 Para Buscar '"Android"', tiempo de consulta: 0.05s Limitar resultados
  1. 1501
    por Beorlegui, Carlos, 1947-
    Publicado 2019
    “…Si en la antigüedad se definía en relación a lo divino y, más tarde, en comparación con otras culturas humanas, en la actualidad el elemento de contraste son los animales (lo prehumano) y lo poshumano (ciborgs, androides y robots). Desde Darwin, muchos piensan que hay que superar el antropocentrismo y difuminar toda línea divisoria entre lo humano y el resto de las especies vivas. …”
    Libro
  2. 1502
    Publicado 2020
    “…Dos capítulos están dedicados al análisis de malware en sistemas operativos móviles: el sistema operativo Android de Google y el de Apple, iOS. La última parte de este libro expone los métodos que permiten erradicar los malwares previamente identificados y analizados. …”
    Acceso con credenciales UPSA.
    Libro electrónico
  3. 1503
    Publicado 2014
    “…—Mark Frauenfelder, co-founder of bOING bOING You'll learn how to: Create a basic Apple Wi-Fi network, and connect to it from OS X, iOS, Windows 10, Android, and Chrome OS. Efficiently swap a new base station in place of an old one. …”
    Libro electrónico
  4. 1504
    Publicado 2023
    “…About The Author Ranjan Pandey: Ranjan Pandey is a full-stack DevOps software professional with over 11 years of experience in a variety of technologies ranging from web and mobile application development using HTML5, CSS3, JavaScript, jQuery, Bootstrap, Angular, React, Java, Spring, Spring Boot, Python, Flask, Django, NodeJS, Express, Android, Ionic, React Native, Flutter to artificial intelligence and cloud technologies such as Amazon Web Services and Microsoft Azure. …”
    Video
  5. 1505
    Publicado 2023
    “…About The Author Ranjan Pandey: Ranjan Pandey is a full-stack DevOps software professional with over 11 years of experience in a variety of technologies ranging from web and mobile application development using HTML5, CSS3, JavaScript, jQuery, Bootstrap, Angular, React, Java, Spring, Spring Boot, Python, Flask, Django, NodeJS, Express, Android, Ionic, React Native, Flutter to artificial intelligence and cloud technologies such as Amazon Web Services and Microsoft Azure. …”
    Video
  6. 1506
    Publicado 2021
    “…Topics include * Information security, cybersecurity, and ethical hacking overview * Reconnaissance techniques * Network and perimeter hacking * Web application hacking * Wireless, mobile, IoT, and OT hacking * Cloud computing and cryptography Skill level: Intermediate Learn How To * Perform vulnerability assessments: Vulnerability analysis, hacking concepts, and malware * Perform reconnaissance: Actively and passively gather information about targets through online information gathering, scanning, and enumeration * Attack the network: Using information gathered in the reconnaissance phase, exploit vulnerabilities using sniffing, social engineering, DoS, and session hijacking; exploit vulnerabilities in wireless networks to gain access * Attack the app: Exploit vulnerabilities in web servers and web applications, databases, and iOS/Android applications * Attack the cloud and edge: Investigate edge IoT and cloud architectures and attack vectors * Understand cryptography: Explore symmetric and asymmetric key cryptography methods and algorithms Who Should Take This Course: * Anyone interested in passing the EC Council Certified Ethical Hacker (CEH) exam * Anyone interested in becoming a cybersecurity professional * Anyone interested in ethical hacking (penetration testing) Course Requirements: Anyone interested in earning a Certified Ethical Hacker (CEH) certification must attend training through EC-Council or show that they have two years of information security experience. …”
    Video
  7. 1507
    Publicado 2024
    “…Devices: Desktop and laptop computers, tablets running on Android v8.0 and above and iOS v13 and above, smartphones with a minimum screen size of 4.7. …”
    Libro electrónico
  8. 1508
    por Akkor Gul, Aysen
    Publicado 2020
    “…The chapter concludes that human beings embrace their individuality firmly and will not abandon their self-image for that of a robot, an android, a digital avatar, or even a clone of oneself. …”
    Libro electrónico
  9. 1509
    Publicado 2022
    “…La configuración de la red se examina para Windows, Linux, macOS, iOS y Android. Se explican los métodos de acceso al medio CSMA/CA y CSMA/CD, así como el paso de testigo. …”
    Acceso con credenciales UPSA.
    Libro electrónico