Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Història 167
- Raspberry Pi (Computer) 123
- Python (Computer program language) 79
- Historia 78
- Programming 67
- Biografia 58
- Computer input-output equipment 49
- Hardware and Maker 45
- Política 40
- Nacionalisme 37
- Política i govern 37
- Pi i Margall, Francesc 35
- Pi i Sunyer, Carles 35
- Linux 32
- Biblia 29
- Computer programming 28
- Microcomputers 27
- Federalisme 26
- Internet of things 25
- Punts de vista polítics i socials 24
- Bíblia 22
- Application software 21
- Development 21
- Guerra Civil Espanyola, 1936-1939 21
- Descripcions i viatges 20
- Església de Santa Maria del Pi (Barcelona, Catalunya) 20
- Operating systems (Computers) 20
- Polítics 20
- Govern 19
- Arduino (Programmable controller) 17
-
3081Publicado 2021Tabla de Contenidos: “…-- Free IDS/IPS -- IPS versus IDS -- Summary -- Chapter 9: Deep Diving into Physical Security -- Technical requirements -- Understanding physical security and associated threats -- The powerful LAN Turtle -- The stealthy Plunder Bug LAN Tap -- The dangerous Packet Squirrel -- The portable Shark Jack -- The amazing Screen Crab -- The advanced Key Croc -- USB threats -- Equipment theft -- Environmental risks -- Physical security mechanisms -- Mastering physical security -- Clean desk policy -- Physical security audits -- Summary -- Further reading -- Chapter 10: Applying IoT Security -- Understanding the Internet of Things -- The risks -- The vulnerabilities -- Understanding IoT networking technologies -- LoRaWAN -- Zigbee -- Sigfox -- Bluetooth -- Security considerations -- Improving IoT security -- Creating cybersecurity hardware using IoT-enabled devices -- Raspberry Pi firewall and intrusion detection system -- Defensive security systems for industrial control systems (SCADA) -- Secure USB-to-USB copy machine -- Creating a 10 honeypot -- Advanced monitoring of web apps and networks -- Creating an internet ad blocker -- Access control and physical security systems -- Bonus track - Understanding the danger of unauthorized IoT devices -- Detecting unauthorized IoT devices -- Detecting a Raspberry Pi -- Disabling rogue Raspberry Pi devices -- Summary -- Further reading -- Chapter 11: Secure Development and Deployment on the Cloud -- Technical requirements -- Secure deployment and implementation of cloud applications…”
Libro electrónico -
3082
-
3083
-
3084
-
3085
-
3086por Clark, Liz. author“…The ASUS Tinker Board offers an increase in hardware specs and, as a result, is more powerful compared to other single-board computers on the market, making it a great option for projects that would have previously been a challenge to run on other boards, such as the Raspberry Pi. Single-board computers in general are also gaining in popularity as solutions for many DIY tech projects, ranging from gaming to file storage to being a small form factor desktop Linux computer. …”
Publicado 2019
Libro electrónico -
3087por Osborn, Steven. author“…You’ll also meet Eben Upton, who put cheap, powerful computing in the hands of everyone with the Raspberry Pi; Becky Stern, who jazzes up clothing with sensors and LEDs; and bunnie Huang, who knows the ins and outs of the Shenzhen, China, electronics parts markets as well as anyone. …”
Publicado 2013
Libro electrónico -
3088por Cooper, Peter. author“…And, now, Ruby also has applications using the Raspberry Pi, popular among hobbyists and makers. Many former Java developers still use Ruby on Rails today, the most popular framework for building Ruby applications. …”
Publicado 2016
Libro electrónico -
3089por Cook, Mike. author“…“Grumpy Mike” Cook, co-author of several books on the Raspberry Pi and frequent answerer of questions of the Arduino forums, brings you a fun and instructive mix and simple and complex projects to help you understand how the Arduino can work with the MIDI system to create musical instruments and manipulate sound. …”
Publicado 2015
Libro electrónico -
3090
-
3091
-
3092
991005146279706719 -
3093
-
3094por Puente, Luis de la, 1554-1624Accés lliure
Publicado 1757
Accés Lliure
Accés Lliure
991006637839706719 -
3095por Concina, Daniele, 1687-1756
Publicado 1767Biblioteca Pública Episcopal del Seminario de Barcelona (Otras Fuentes: Biblioteca Universitat Ramon Llull)Accés lliure
Accés lliure
Accés lliure
Accés Lliure
Accés Lliure
Accés Lliure
Libro -
3096Publicado 2014“….深入解析NFC的架構,學習與RFID之間的差異之處 .在Android上撰寫範例應用軟體,使用PhoneGap與其NFC附加元件 .深入學習NDEF:介紹已有的標籤讀取器應用軟體、打造屬於你自己的NFC應用專案 .聆聽並過濾NDEF訊息,使用PhoneGap的事件聆聽者函式 .建立完整的Android應用軟體,控制住家內的燈光與音響系統 .運用Arduino建立旅館入住退宿系統,接待櫃檯的報到機制,門鎖與身分驗證 .在兩台Android裝置之間進行點對點對等式NFC訊息傳輸 .探索嵌入式Linux開發板,以Raspberry Pi與BeagleBone為範例…”
Libro electrónico -
3097
-
3098
-
3099
-
3100