Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Engineering & Applied Sciences 45
- Programming 44
- Computer networks 41
- Security measures 38
- iPhone (Smartphone) 33
- Application software 32
- Computer Science 28
- Wireless communication systems 28
- Smartphones 27
- Mobile computing 26
- Operating systems (Computers) 26
- Android (Electronic resource) 24
- Pocket computers 23
- Development 21
- Computer security 19
- Raspberry Pi (Computer) 18
- Bluetooth (Tecnologia) 17
- Electrical & Computer Engineering 17
- Mac OS 17
- Microcomputers 17
- iPad (Computer) 17
- Arduino (Programmable controller) 16
- Certification 16
- Design and construction 16
- Examinations 16
- iOS (Electronic resource) 16
- Bluetooth technology 14
- Computer input-output equipment 14
- Internet of things 14
- Macintosh (Computer) 14
-
41
-
42
-
43
-
44
-
45
-
46Publicado 2013Tabla de Contenidos: “…It takes two to tango -- Bluetooth for Mindstorms NXT : a closer look -- One for all and all for one -- Creating a team of movers and shakers -- Bluetooth programming in NXT-G and LabVIEW -- Robot environments, teamwork strategies, and goals -- Give your team of robots Java power with leJOS -- Got Linux and Darwin on your team of robots? …”
Libro electrónico -
47
-
48
-
49
-
50
-
51
-
52
-
53
-
54por Westerfield, MikeTabla de Contenidos: “…Getting familiar with techBASIC and built-in sensors -- Accessing the other built-in sensors -- Creating a metal detector -- HiJack -- Creating a moisture meter with HiJack -- Bluetooth low energy -- Bluetooth low energy iPhone rocket -- Hacking a radio-controlled truck with Bluetooth low energy and arduino -- Peer-to-peer Bluetooth low energy -- Paddles: A Bluetooth pong tribute -- WiFi -- WiFi servos…”
Publicado 2013
Libro electrónico -
55
-
56
-
57Publicado 2015Libro electrónico
-
58por Torres Gómez, Eduard deMaterias: “…Bluetooth (Tecnologia) TFMP…”
Publicado 2016
Visualitzar TFMP
Tesis -
59Publicado 2017Tabla de Contenidos: “…. -- Attacking WPS -- Getting ready -- How to do it... -- Chapter 7: Bluetooth Attacks -- Introduction -- A brief history of Bluetooth -- A look at the technology -- Bluetooth in operation -- Bluetooth protocol stack -- Vulnerabilities in Bluetooth -- Selecting the Bluetooth hardware -- Types of attack -- Bluesmacking -- Getting ready -- How to do it... -- Bluejacking -- Getting ready -- How to do it... -- Bluesnarfing -- Getting ready -- How to do it... -- Index…”
Libro electrónico -
60