Mostrando 281 - 300 Resultados de 494 Para Buscar '"Spy"', tiempo de consulta: 0.19s Limitar resultados
  1. 281
    por Avery, James
    Publicado 2007
    Tabla de Contenidos: “…2.4 Learning More About Windows Controls with Control Spy…”
    Libro electrónico
  2. 282
    por Hitchens, Ron
    Publicado 2002
    Tabla de Contenidos: “…NIO and the JNI; Appendix B. Selectable Channels SPI; Appendix C. NIO Quick Reference; Package java.nio; Buffer; BufferOverflowException; BufferUnderflowException; ByteBuffer; ByteOrder; CharBuffer; DoubleBuffer; FloatBuffer; IntBuffer; InvalidMarkException; LongBuffer; MappedByteBuffer; ReadOnlyBufferException; ShortBuffer; Package java.nio.channels; AlreadyConnectedException; AsynchronousCloseException; ByteChannel…”
    Libro electrónico
  3. 283
    por Barambones Zubiria, Josu
    Publicado 2012
    Tabla de Contenidos: “…DATOS PRELIMINARES; 5.1.1. TOTALLY SPIES-BEREBIZIKO ESPIOIAK; 5.1.2. BRACEFACE-BURDIN AHO; 5.2. …”
    Libro electrónico
  4. 284
    Publicado 2015
    Tabla de Contenidos: “…PID matrix score; 4.2.2.2. PreSPI; 4.2.2.3. DCC; 4.2.2.4. MEGADOCK; 4.2.2.5. Meta approach; 4.2.3. …”
    Libro electrónico
  5. 285
    Publicado 2022
    “…Who controls access to the hardware, who runs the software, who can spy on us, hack us, data farm us? What are the threats that we need to mitigate against democratically, societally and personally? …”
    Libro electrónico
  6. 286
    Publicado 2018
    Tabla de Contenidos: “…-- The rules -- Summary -- Chapter 6: Handling Real-World Use Cases -- Technical requirements -- Form validation -- The interactions -- Modeling the observable state -- Onto the actions -- Completing the triad with reactions -- React components -- The UserEnrollmentForm component -- Other observer components -- Page routing -- The Cart checkout workflow -- Modeling the observable state -- A route for a step, a step for a route -- The WorkflowStep -- Actions and reactions of the workflow -- Loading a step -- The HistoryTracker -- The React components -- The TemplateStepComponent -- The ShowCart component -- A state-based router -- Summary -- Chapter 7: Special API for Special Cases -- Technical requirements -- Direct manipulation with the object API -- Granular reads and writes -- From MobX to JavaScript -- Watching the events flow by -- Hooking into the observability -- Lazy loading the temperature -- Gatekeeper of changes -- Intercepting the change -- observe() the changes -- Development utilities -- Using spy() to track the reactivity -- Tracing a reaction -- Visual debugging with mobx-react-devtools -- A few other APIs -- Querying the reactive system -- Probing deeper into the reactive system -- Summary -- Chapter 8: Exploring mobx-utils and mobx-state-tree -- Technical requirements -- The utility functions of mobx-utils -- Visualizing async-operations with fromPromise() -- Using lazyObservable() for deferred updates -- A generalized lazyObservable() with fromResource() -- A view model to manage edits -- There is lot more to discover -- An opinionated MobX with mobx-state-tree…”
    Libro electrónico
  7. 287
    Publicado 2022
    Tabla de Contenidos: “…Using the Mobile APP Bluetooth Terminal -- Changing the PIN on the HC-06 -- Using AT Commands -- Using Tera Term to Change the PIN -- Using PuTTY to Program the HC-06 -- Programming the HC-06 with AT Command from the PIC Micro -- Analysis of Listing 8-2 -- The HC-SR501 PIR Motion Sensor -- Analysis of Listing 8-3 -- Summary -- Chapter 9: Communication -- Getting the PIC to Communicate with Other Devices -- The SPI Mode -- The Buffer Full (BF) Flag in the SSPSTAT Register -- Synchronizing the Sequence -- SSPSTAT Register -- The SSPCON1 Register -- Using the SPI to Read from the TC72 -- Operating Modes for the TC72 -- The Registers of the TC72 -- The Algorithm for Using the TC72 -- Displaying the Temperature Reading -- Binary Numbers -- Adding Binary Numbers -- Analysis of Listing 9-1 -- Reading the Temperature from the TC72 -- Examples of the 2's Complement Process -- Using the Sprintf Function -- Analysis of Listing 9-2 -- Comparing the Two Approaches -- Using the PIC18f4525 as the Slave -- Analysis of Listing 9-3 -- Analysis of Listing 9-4 -- Summary -- Chapter 10: Using the I2C Protocol -- I2C Communication Protocol -- EEPROM -- 24LC256 EEPROM -- Writing to the EEPROM -- Reading from the EEPROM -- TC74 Temperature Sensor -- Reading the Temperature -- Using I2C with 24LC256 and TC74 -- Analysis of Listing 10-1 -- That Little Thought -- Summary -- Chapter 11: Using the UART -- UART at a Glance -- Interrupts and How They Work -- Analysis of Listing 11-1 -- The Baud Rate -- Using Tera Term -- Using Handshaking -- Analysis of Listing 11-2 -- Two PICs Communicate via the UART -- Analysis of Listing 11-3 -- Summary -- Chapter 12: Real-Time Clock and Interrupts -- The RTC Program -- Analysis of Listing 12-1 -- The DS1307 RTC Module -- Setting Up and Reading from the DS1307 -- The I2C Protocol -- Writing to the Slave -- The Start Bit…”
    Libro electrónico
  8. 288
    por Ollam, Deviant
    Publicado 2010
    “…Unlike other texts on the subject (which tend to be either massive volumes detailing every conceivable style of lock or brief ""spy manuals"" that only skim the surface) this book is for INFOSEC professionals that need essential, core knowledge of lockpicking and seek the ability to open most locks with relative ease. …”
    Libro electrónico
  9. 289
    Publicado 2014
    Tabla de Contenidos: “…Project 6.6-Minielectronic OrganProject 6.7-Frequency Counter with an LCD Display; Project 6.8-Reaction Timer; Project 6.9-Temperature and Relative Humidity Measurement; Project 6.10-Thermometer with an RS232 Serial Output; Project 6.11-Microcontroller and a PC-Based Calculator; Project 6.12-GPS with an LCD Output; Project 6.13-ON-OFF Temperature Control; Chapter 7 - Advanced PIC18 Projects; Project 7.1-Bluetooth Serial Communication-Slave Mode; Project 7.2-Bluetooth Serial Communication-Master Mode; Project 7.3-Using the RFID; Project 7.4-RFID Lock; Project 7.5-Complex SPI Bus Project…”
    Libro electrónico
  10. 290
    Publicado 2024
    Tabla de Contenidos: “…Ingress API - event -- Ingress API - command -- Egress SPI - webhook -- Egress API - query -- Tackling common data challenges -- Idempotence -- Enriching data -- Latching and cross-referencing -- Slow data resync -- Summary -- Chapter 8: Reacting to Events with More Events -- Promoting inter-service collaboration -- Choreography's pros and cons -- Dissecting the Control Service pattern -- collect -- correlate -- collate -- evaluate -- emit -- expire -- Orchestrating business processes -- Entry and exit events -- Parallel execution -- Employing the Saga pattern -- Compensating transactions -- Abort events -- Calculating event-sourcing snapshots -- What is ACID 2.0? …”
    Libro electrónico
  11. 291
    Publicado 2018
    Tabla de Contenidos: “…No-UI time duration input -- Components to manage efforts -- The visual efforts timeline -- Recapitulating on efforts management -- Summary -- Chapter 9: Spaceship Dashboard -- Introduction to Chartist -- Projects dashboard -- Creating the projects dashboard component -- Project summary component -- Integrating the projects dashboard -- Creating your first chart -- Processing activity data -- Creating an activity chart -- Visualizing open tasks -- Preparing task data -- Modeling the problem -- Creating an open tasks chart -- Creating a chart legend -- Making the tasks chart interactive -- Summary -- Chapter 10: Putting Things to the Test -- An introduction to Jasmine and Karma -- Karma and integration to Angular CLI -- Writing our first test -- Spying on component output -- Utilities to test components -- Injecting in tests -- Using TestBed for running Angular tests -- Component fixture -- Mocking child components -- Mocking services -- Testing components in action -- Testing component interaction -- Summary -- Other Books You May Enjoy -- Index…”
    Libro electrónico
  12. 292
    por Zwicky, Elizabeth D.
    Publicado 2000
    Tabla de Contenidos: “…Scorekeepers; 1.2.2.4. Spies (industrial and otherwise); 1.2.3. Stupidity and Accidents; 1.2.4. …”
    Libro electrónico
  13. 293
    Publicado 2017
    Tabla de Contenidos: “…. -- Basics of I2C and checking the I2C devices present on a port -- Getting ready -- How to do it... -- Basics of SPI and setting up an SPI module -- Getting ready -- How to do it... -- Converting a 5V signal into a 3.3V signal and slew rates…”
    Libro electrónico
  14. 294
    Publicado 2024
    Tabla de Contenidos: “…Modifying the design for use on the board -- Introducing a few other external memory types -- QDR SRAM -- HyperRAM -- SPI RAM -- Summary -- Questions -- Answers -- Challenge -- Further reading -- Chapter 10: A Better Way to Display - VGA -- Technical requirements -- Project 12 - Introducing the VGA -- Defining registers -- Coding a simple AXI-Lite interface -- Generating timing for the VGA -- The VGA monitor timing generator -- Displaying text -- Requesting memory -- Testing the VGA controller -- Examining the constraints -- Summary -- Questions -- Answer -- Challenge -- Further reading -- Chapter 11: Bringing It All Together -- Technical requirements -- Investigating the keyboard interface -- Project 13 - Handling the keyboard -- Testing the PS/2 -- Project 14 - Bringing it all together -- Displaying PS/2 keycodes on the VGA screen -- Displaying the temperature sensor data -- Adding a custom character to the text ROM -- Displaying audio data -- Summary -- Questions -- Answers -- Challenge -- Further reading -- Chapter 12: Using the PMOD Connectors - SPI and UART -- Technical requirements -- UART PMOD -- ACL2 PMOD -- Understanding Peripheral Modules (PMODs) -- PMOD Type 1 and 1A -- PMOD Type 2 and 2A -- PMOD Type 3 and 3A -- PMOD Type 4, 5, and 5A -- PMOD Type 6 and 6A -- PMOD Type 7 and 7A -- Introduction to Universal Asynchronous Receiver-Transmitter (UART) -- Bus interface -- Waveform -- Register interface -- RBR - Receive Buffer Register -- THR - Transmit Holding Register -- IER - Interrupt Enable Register -- ISR - Interrupt Status Register -- FCR - FIFO Control Register -- LCR - Line Control Register -- MCR - Modem Control Register -- LSR - Line Status Register -- MSR - Modem Status Register -- SCRATCH - Scratch Pad Register -- DLL, DLM - Divisor Register LSB and MSB -- UART Implementation -- CPU Interface -- UART Core -- My UART origins…”
    Libro electrónico
  15. 295
    Publicado 2018
    “…You'll also learn how to crack the password for any Wi-Fi network (whether it uses WEP, WPA, or WPA2) and spy on the connected devices. Moving on, you will discover how to gain access to remote computer systems using client-side and server-side attacks. …”
    Libro electrónico
  16. 296
    Publicado 2010
    Tabla de Contenidos: “…B.13 Background() -- B.14 BackgroundDetect() -- B.15 Bridge() -- B.16 Busy() -- B.17 ChangeMonitor() -- B.18 ChanIsAvail() -- B.19 ChannelRedirect() -- B.20 ChanSpy() -- B.21 CheckGroup() -- B.22 ClearHash() -- B.23 Congestion() -- B.24 ContinueWhile() -- B.25 ControlPlayback() -- B.26 Curl() -- B.27 Cut() -- B.28 DAHDIBarge() -- B.29 DAHDIRAS() -- B.30 DAHDIScan() -- B.31 DAHDISendKeypadFacility() -- B.32 DateTime() -- B.33 DBdel() -- B.34 DBdeltree() -- B.35 DBget() -- B.36 DBput() -- B.37 DeadAGI() -- B.38 Dial() -- B.39 Dictate() -- B.40 DigitTimeout() -- B.41 Directory() -- B.42 DISA() -- B.43 DumpChan() -- B.44 DUNDiLookup() -- B.45 EAGI() -- B.46 Echo() -- B.47 EndWhile() -- B.48 EnumLookup() -- B.49 Eval() -- B.50 Exec() -- B.51 ExecIf() -- B.52 ExecIfTime() -- B.53 ExitWhile() -- B.54 ExtenSpy() -- B.55 ExternalIVR() -- B.56 FastAGI() -- B.57 Festival() -- B.58 Flash() -- B.59 FollowMe() -- B.60 ForkCDR() -- B.61 GetCPEID() -- B.62 GetGroupCount() -- B.63 GetGroupMatchCount() -- B.64 Gosub() -- B.65 GosubIf() -- B.66 Goto() -- B.67 GotoIf() -- B.68 GotoIfTime() -- B.69 Hangup() -- B.70 HasNewVoicemail() -- B.71 HasVoicemail() -- B.72 IAX2Provision() -- B.73 ICES() -- B.74 ImportVar() -- B.75 Incomplete() -- B.76 JabberSend() -- B.77 JabberStatus() -- B.78 KeepAlive() -- B.79 Log() -- B.80 LookupBlacklist() -- B.81 LookupCIDName() -- B.82 Macro() -- B.83 MacroExclusive() -- B.84 MacroExit() -- B.85 MacroIf() -- B.86 mailboxExists() -- B.87 Math() -- B.88 MD5() -- B.89 MD5Check() -- B.90 MeetMe() -- B.91 MeetMeAdmin() -- B.92 MeetMeChannelAdmin() -- B.93 MeetMeCount() -- B.94 Milliwatt() -- B.95 MinivmAccMess() -- B.96 MinivmDelete() -- B.97 MinivmGreet() -- B.98 MinivmNotify() -- B.99 MinivmRecord() -- B.100 MixMonitor() -- B.101 Monitor() -- B.102 Morsecode() -- B.103 MP3Player() -- B.104 MSet() -- B.105 MusicOnHold() -- B.106 NBScat()…”
    Libro electrónico
  17. 297
    Publicado 2020
    Tabla de Contenidos: “…-- 1.3 Der Arduino im Vergleich -- 1.4 Der ftDuino -- 1.5 Anschlüsse -- 1.6 Anbau -- 1.7 Motor Shield -- 1.8 Literatur und Links -- Die Programmierung des Arduino -- 2.1 Grundsätzliches -- 2.2 Bibliotheken -- 2.3 Serieller Monitor -- Ausgabe -- Eingabe -- Debugging -- 2.4 I/O-Ports -- Digitale Ports -- Analoger Output -- Analoge Ports -- 2.5 Interrupts -- 2.6 Timer -- 2.7 Serielle Protokolle -- I2C-Protokoll -- SPI-Protokoll -- 2.8 Mathematische Operationen -- 2.9 Adafruit Motor Shield -- Gleichstrommotoren -- Schrittmotoren -- Servomotoren -- 2.10 Literatur und Links -- Der Buggy -- 3.1 Die Geschichte des Buggys -- 3.2 Das Buggy-Basismodell -- Mechanischer Aufbau -- Akku, Controller und Motorsteuerung -- 3.3 Buggy-Steuerung -- Tanzender Buggy -- IR-Fernsteuerung -- Bewegungssteuerung -- Hinderniserkennung mit Bumpern -- Hinderniserkennung mit Ultraschall -- Spurfolger mit IR-Sensor -- Objektfolger mit Kamera -- Spurfolger mit Kamera -- Tacho- und Hodometer -- 3.4 Literatur und Links -- Der Flitzer -- 4.1 Einführung -- 4.2 Konstruktion des Flitzers -- Vorderradlenkung -- Karosserie und Beleuchtung - vorne -- Hinterradantrieb -- Karosserie und Beleuchtung - hinten -- Erläuterung der Konstruktion -- Controller, Akku und Verkabelung -- Konstruktionsvarianten -- 4.3 Die Steuerung -- Lenkung -- Beleuchtung und Hupe -- Tachometer -- Funkfernsteuerung mit Joystick -- Funkfernsteuerung mit Nunchuk -- Geschwindigkeitsbegrenzer und Abstandsregeltempomat -- Spurverlasswarner und Spurhalteassistent -- Parkmanöverassistent -- 4.4 Literatur -- Der Plotter -- 5.1 Hintergrund -- 5.2 Mechanische Konstruktion -- Grundplatte -- Schlitten…”
    Libro electrónico
  18. 298
    Publicado 2015
    Tabla de Contenidos: “…Cover; Title Page; Copyright; Contents; Preface; About the Authors; Chapter 1 Network Security Overview; 1.1 Mission and Definitions; 1.2 Common Attacks and Defense Mechanisms; 1.2.1 Eavesdropping; 1.2.2 Cryptanalysis; 1.2.3 Password Pilfering; 1.2.4 Identity Spoofing; 1.2.5 Buffer-Overflow Exploitations; 1.2.6 Repudiation; 1.2.7 Intrusion; 1.2.8 Traffic Analysis; 1.2.9 Denial of Service Attacks; 1.2.10 Malicious Software; 1.3 Attacker Profiles; 1.3.1 Hackers; 1.3.2 Script Kiddies; 1.3.3 Cyber Spies; 1.3.4 Vicious Employees; 1.3.5 Cyber Terrorists; 1.3.6 Hypothetical Attackers…”
    Libro electrónico
  19. 299
    Publicado 2023
    Tabla de Contenidos: “…-- Hit by password phishing -- Use of your credit cards -- Ransomware -- Invading privacy and extortion/phone spying -- Summary -- Chapter 4: Remote Working and the Element of Trust -- Remote working - not new for everyone -- Pandemic and remote working -- View of remote working for various industries -- Risks to organizations -- Summary -- Chapter 5: The Emergence of Zero Trust and Risk Equation -- Zero Trust in real life -- Zero Trust is a new digital transformation -- Lesson learned from a global pandemic -- Modern principles of Zero Trust -- The NIST approach to Zero Trust architecture -- The Sunburst attack example -- Zero Trust across the digital estate -- Example of controlling access with intelligent policies and continuous risk assessment -- Zero Trust makes compliance easier -- Isolation -- Monitoring and visibility -- Summary -- Part 2: Risk Redefined at Work -- Chapter 6: The Human Risk at the Workplace -- Innocent intent -- Start of day -- During the day -- Wrapping up -- A quick relook at the risks -- Good worker -- Start of the day -- During the day -- Wrapping up -- Self-obsessed -- Rebel intent -- Malicious intent -- Summary…”
    Libro electrónico
  20. 300
    Publicado 2011
    Tabla de Contenidos: “…Mocking and Stubbing -- 16.1 An Overview of Test Doubles -- 16.2 Test Verification -- 16.3 Stubs -- 16.4 Test Spies -- 16.5 Using a Stub Library -- 16.6 Mocks -- 16.7 Mocks or Stubs? …”
    Libro electrónico