Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Application software 419
- Development 396
- Android (Electronic resource) 365
- Mobile computing 251
- Programming 148
- Smartphones 83
- Mobile apps 82
- Java (Computer program language) 65
- Design 61
- Engineering & Applied Sciences 59
- Computer programming 54
- Mobile Computing 52
- Computer Science 50
- Security measures 49
- iOS (Electronic resource) 42
- JavaScript (Computer program language) 39
- Computer programs 37
- Video games 35
- Computer security 34
- Operating systems (Computers) 34
- HTML (Document markup language) 33
- Open source software 32
- Computer games 31
- Computer networks 29
- Programming languages (Electronic computers) 27
- Web applications 27
- Microsoft .NET Framework 26
- Programming Techniques 26
- Web site development 26
- Artificial intelligence 25
-
1521Publicado 2023“…About The Author Ranjan Pandey: Ranjan Pandey is a full-stack DevOps software professional with over 11 years of experience in a variety of technologies ranging from web and mobile application development using HTML5, CSS3, JavaScript, jQuery, Bootstrap, Angular, React, Java, Spring, Spring Boot, Python, Flask, Django, NodeJS, Express, Android, Ionic, React Native, Flutter to artificial intelligence and cloud technologies such as Amazon Web Services and Microsoft Azure. …”
Video -
1522Publicado 2021“…Topics include * Information security, cybersecurity, and ethical hacking overview * Reconnaissance techniques * Network and perimeter hacking * Web application hacking * Wireless, mobile, IoT, and OT hacking * Cloud computing and cryptography Skill level: Intermediate Learn How To * Perform vulnerability assessments: Vulnerability analysis, hacking concepts, and malware * Perform reconnaissance: Actively and passively gather information about targets through online information gathering, scanning, and enumeration * Attack the network: Using information gathered in the reconnaissance phase, exploit vulnerabilities using sniffing, social engineering, DoS, and session hijacking; exploit vulnerabilities in wireless networks to gain access * Attack the app: Exploit vulnerabilities in web servers and web applications, databases, and iOS/Android applications * Attack the cloud and edge: Investigate edge IoT and cloud architectures and attack vectors * Understand cryptography: Explore symmetric and asymmetric key cryptography methods and algorithms Who Should Take This Course: * Anyone interested in passing the EC Council Certified Ethical Hacker (CEH) exam * Anyone interested in becoming a cybersecurity professional * Anyone interested in ethical hacking (penetration testing) Course Requirements: Anyone interested in earning a Certified Ethical Hacker (CEH) certification must attend training through EC-Council or show that they have two years of information security experience. …”
Video -
1523Publicado 2024“…Devices: Desktop and laptop computers, tablets running on Android v8.0 and above and iOS v13 and above, smartphones with a minimum screen size of 4.7. …”
Libro electrónico -
1524por Akkor Gul, Aysen“…The chapter concludes that human beings embrace their individuality firmly and will not abandon their self-image for that of a robot, an android, a digital avatar, or even a clone of oneself. …”
Publicado 2020
Libro electrónico -
1525Publicado 2022“…La configuración de la red se examina para Windows, Linux, macOS, iOS y Android. Se explican los métodos de acceso al medio CSMA/CA y CSMA/CD, así como el paso de testigo. …”
Acceso con credenciales UPSA.
Libro electrónico