Mostrando 321 - 340 Resultados de 529 Para Buscar '"Spy"', tiempo de consulta: 0.09s Limitar resultados
  1. 321
    Publicado 2017
    Tabla de Contenidos: “…. -- Basics of I2C and checking the I2C devices present on a port -- Getting ready -- How to do it... -- Basics of SPI and setting up an SPI module -- Getting ready -- How to do it... -- Converting a 5V signal into a 3.3V signal and slew rates…”
    Libro electrónico
  2. 322
    Publicado 2024
    Tabla de Contenidos: “…Modifying the design for use on the board -- Introducing a few other external memory types -- QDR SRAM -- HyperRAM -- SPI RAM -- Summary -- Questions -- Answers -- Challenge -- Further reading -- Chapter 10: A Better Way to Display - VGA -- Technical requirements -- Project 12 - Introducing the VGA -- Defining registers -- Coding a simple AXI-Lite interface -- Generating timing for the VGA -- The VGA monitor timing generator -- Displaying text -- Requesting memory -- Testing the VGA controller -- Examining the constraints -- Summary -- Questions -- Answer -- Challenge -- Further reading -- Chapter 11: Bringing It All Together -- Technical requirements -- Investigating the keyboard interface -- Project 13 - Handling the keyboard -- Testing the PS/2 -- Project 14 - Bringing it all together -- Displaying PS/2 keycodes on the VGA screen -- Displaying the temperature sensor data -- Adding a custom character to the text ROM -- Displaying audio data -- Summary -- Questions -- Answers -- Challenge -- Further reading -- Chapter 12: Using the PMOD Connectors - SPI and UART -- Technical requirements -- UART PMOD -- ACL2 PMOD -- Understanding Peripheral Modules (PMODs) -- PMOD Type 1 and 1A -- PMOD Type 2 and 2A -- PMOD Type 3 and 3A -- PMOD Type 4, 5, and 5A -- PMOD Type 6 and 6A -- PMOD Type 7 and 7A -- Introduction to Universal Asynchronous Receiver-Transmitter (UART) -- Bus interface -- Waveform -- Register interface -- RBR - Receive Buffer Register -- THR - Transmit Holding Register -- IER - Interrupt Enable Register -- ISR - Interrupt Status Register -- FCR - FIFO Control Register -- LCR - Line Control Register -- MCR - Modem Control Register -- LSR - Line Status Register -- MSR - Modem Status Register -- SCRATCH - Scratch Pad Register -- DLL, DLM - Divisor Register LSB and MSB -- UART Implementation -- CPU Interface -- UART Core -- My UART origins…”
    Libro electrónico
  3. 323
    Publicado 2020
    Tabla de Contenidos: “…-- 1.3 Der Arduino im Vergleich -- 1.4 Der ftDuino -- 1.5 Anschlüsse -- 1.6 Anbau -- 1.7 Motor Shield -- 1.8 Literatur und Links -- Die Programmierung des Arduino -- 2.1 Grundsätzliches -- 2.2 Bibliotheken -- 2.3 Serieller Monitor -- Ausgabe -- Eingabe -- Debugging -- 2.4 I/O-Ports -- Digitale Ports -- Analoger Output -- Analoge Ports -- 2.5 Interrupts -- 2.6 Timer -- 2.7 Serielle Protokolle -- I2C-Protokoll -- SPI-Protokoll -- 2.8 Mathematische Operationen -- 2.9 Adafruit Motor Shield -- Gleichstrommotoren -- Schrittmotoren -- Servomotoren -- 2.10 Literatur und Links -- Der Buggy -- 3.1 Die Geschichte des Buggys -- 3.2 Das Buggy-Basismodell -- Mechanischer Aufbau -- Akku, Controller und Motorsteuerung -- 3.3 Buggy-Steuerung -- Tanzender Buggy -- IR-Fernsteuerung -- Bewegungssteuerung -- Hinderniserkennung mit Bumpern -- Hinderniserkennung mit Ultraschall -- Spurfolger mit IR-Sensor -- Objektfolger mit Kamera -- Spurfolger mit Kamera -- Tacho- und Hodometer -- 3.4 Literatur und Links -- Der Flitzer -- 4.1 Einführung -- 4.2 Konstruktion des Flitzers -- Vorderradlenkung -- Karosserie und Beleuchtung - vorne -- Hinterradantrieb -- Karosserie und Beleuchtung - hinten -- Erläuterung der Konstruktion -- Controller, Akku und Verkabelung -- Konstruktionsvarianten -- 4.3 Die Steuerung -- Lenkung -- Beleuchtung und Hupe -- Tachometer -- Funkfernsteuerung mit Joystick -- Funkfernsteuerung mit Nunchuk -- Geschwindigkeitsbegrenzer und Abstandsregeltempomat -- Spurverlasswarner und Spurhalteassistent -- Parkmanöverassistent -- 4.4 Literatur -- Der Plotter -- 5.1 Hintergrund -- 5.2 Mechanische Konstruktion -- Grundplatte -- Schlitten…”
    Libro electrónico
  4. 324
    Publicado 2015
    Tabla de Contenidos: “…Cover; Title Page; Copyright; Contents; Preface; About the Authors; Chapter 1 Network Security Overview; 1.1 Mission and Definitions; 1.2 Common Attacks and Defense Mechanisms; 1.2.1 Eavesdropping; 1.2.2 Cryptanalysis; 1.2.3 Password Pilfering; 1.2.4 Identity Spoofing; 1.2.5 Buffer-Overflow Exploitations; 1.2.6 Repudiation; 1.2.7 Intrusion; 1.2.8 Traffic Analysis; 1.2.9 Denial of Service Attacks; 1.2.10 Malicious Software; 1.3 Attacker Profiles; 1.3.1 Hackers; 1.3.2 Script Kiddies; 1.3.3 Cyber Spies; 1.3.4 Vicious Employees; 1.3.5 Cyber Terrorists; 1.3.6 Hypothetical Attackers…”
    Libro electrónico
  5. 325
    Publicado 2023
    Tabla de Contenidos: “…-- Hit by password phishing -- Use of your credit cards -- Ransomware -- Invading privacy and extortion/phone spying -- Summary -- Chapter 4: Remote Working and the Element of Trust -- Remote working - not new for everyone -- Pandemic and remote working -- View of remote working for various industries -- Risks to organizations -- Summary -- Chapter 5: The Emergence of Zero Trust and Risk Equation -- Zero Trust in real life -- Zero Trust is a new digital transformation -- Lesson learned from a global pandemic -- Modern principles of Zero Trust -- The NIST approach to Zero Trust architecture -- The Sunburst attack example -- Zero Trust across the digital estate -- Example of controlling access with intelligent policies and continuous risk assessment -- Zero Trust makes compliance easier -- Isolation -- Monitoring and visibility -- Summary -- Part 2: Risk Redefined at Work -- Chapter 6: The Human Risk at the Workplace -- Innocent intent -- Start of day -- During the day -- Wrapping up -- A quick relook at the risks -- Good worker -- Start of the day -- During the day -- Wrapping up -- Self-obsessed -- Rebel intent -- Malicious intent -- Summary…”
    Libro electrónico
  6. 326
    Publicado 2011
    Tabla de Contenidos: “…Mocking and Stubbing -- 16.1 An Overview of Test Doubles -- 16.2 Test Verification -- 16.3 Stubs -- 16.4 Test Spies -- 16.5 Using a Stub Library -- 16.6 Mocks -- 16.7 Mocks or Stubs? …”
    Libro electrónico
  7. 327
    Publicado 2009
    Tabla de Contenidos: “…3.2 Types of ADCs3.2.1 Tracking ADC; 3.2.2 Flash ADC; 3.2.3 Successive Approximation Converter; 3.2.4 Dual-Slope (Integrating) ADC; 3.2.5 Sigma-Delta; 3.2.6 Half-Flash; 3.3 ADC Comparison; 3.4 Sample and Hold; 3.5 Real Parts; 3.5.1 Input Levels; 3.5.2 Internal Reference; 3.5.3 Reference Bypassing; 3.5.4 Internal S/H; 3.6 Microprocessor Interfacing; 3.6.1 Output Coding; 3.6.2 Parallel Interfaces; 3.6.3 Data Access Time; 3.6.4 -BUSY Output; 3.6.5 Bus Relinquish; 3.6.6 Coupling; 3.6.7 Delay between Conversions; 3.6.8 LSB Errors; 3.7 Clocked Interfaces; 3.8 Serial Interfaces; 3.8.1 SPI/Microwire…”
    Libro electrónico
  8. 328
    Publicado 2018
    Tabla de Contenidos: “…-- Loops -- Program 2: Button Inputs -- Multiple Buttons -- Program 3: Touch Inputs -- Variables -- Program 4: The Temperature Sensor -- Formatting the Output -- Program 5: The Compass Sensor -- Program 6: The Accelerometer Sensor -- Delays -- Reading Raw Accelerometer Data -- Program 7: The Fruit Catcher Game -- The Setup -- The Main Program Loop -- Conditional Loops -- Conditional Statements -- Drawing the Sprites -- Finishing the Program -- Further Steps -- Part 3 -- Chapter 8 The Wireless BBC micro:bit -- The BBC micro:bit Radio -- Program 1: One-to-One Communication -- Program 2: One-to-Many Communication -- Program 3: Radio Groups -- Testing the Group Feature -- Using the BBC micro:bit with a Smartphone or Tablet -- Chapter 9 The BBC micro:bit and the Raspberry Pi -- About the Raspberry Pi -- Connecting the Raspberry Pi to the BBC micro:bit -- Reading from the BBC micro:bit -- Using the BBC micro:bit Display -- Practical Example: A CPU Monitor -- Chapter 10 Building Circuits -- Electronic Equipment -- The Input-Output Pins -- The Large Pins -- The Small Pins -- Serial Peripheral Interface (SPI) -- Inter-Integrated Circuit (I2C) -- Universal Asynchronous Receiver/Transmitter (UART) -- Your First Circuits -- Reading from a Button Input -- Reading Resistor Colour Codes -- Writing to an LED Output -- Fading an LED via PWM -- Reading an Analogue Input -- Chapter 11 Extending the BBC micro:bit -- Extending via Breakout Boards -- Kitronik Edge Connector Breakout Board…”
    Libro electrónico
  9. 329
    por Martin, Robert C.
    Publicado 2022
    Tabla de Contenidos: “…Intro -- Impressum -- Vorwort -- Vorwort des Übersetzers der deutschen Ausgabe -- Einleitung -- Über den Begriff »Craftsmanship« -- Auf dem einzig wahren Weg -- Einführung in das Buch -- Danksagungen -- Über den Autor -- Kapitel 1: Craftsmanship -- Teil I: Die Praktiken -- Kapitel 2: Testgetriebene Entwicklung -- 2.1 Überblick -- 2.1.1 Software -- 2.1.2 Die drei Gesetze des TDD -- 2.1.3 Das vierte Gesetz -- 2.2 Die Grundlagen -- 2.2.1 Einfache Beispiele -- 2.2.2 ‌Stack -- 2.2.3 ‌Primfaktoren -- 2.2.4 ‌Bowling -- 2.3 Fazit -- Kapitel 3: Fortgeschrittenes TDD -- 3.1 Sort 1 -- 3.2 Sort 2 -- 3.3 Steckenbleiben -- 3.4 Erstellen, Ausführen, Sicherstellen -- 3.4.1 BDD einführen -- 3.4.2 Endliche Automate‌‌n -- 3.4.3 Und wieder‌ BDD -- 3.5 ‌Test-Doubles -- 3.5.1 ‌Dummy -- 3.5.2 Stub -- 3.5.3 Spy -- 3.5.4 Mock -- 3.5.5 Fake -- 3.5.6 Das TDD-Unsicherheitsprinzi‌‌p -- 3.5.7 London vs. …”
    Libro electrónico
  10. 330
    Publicado 2023
    Tabla de Contenidos: “…The standard data seed -- Table-driven - when test data drives behavior -- Scriptable users and structure -- Exploring synthetic users -- Leveraging production refreshes -- Exploring development, test, and production environments -- Understanding the regulatory issues in test data management -- The user spy feature -- Summary -- Part 2: Testing and Software Delivery -- Chapter 8: Delivery Models and Testing -- Technical requirements -- Waterfall -- The advantages of and place for the waterfall -- The V-Model -- Iterative, incremental, and mini waterfalls -- Extreme Programming (XP) -- The context of XP -- Scrum and SAFe -- The context of Scrum -- SAFe and its context -- House-rules software development -- The Agile Manifesto -- Context-driven testing -- Illustrations of the principles in action -- Kanban as a house rule -- Continuous delivery and deployment -- DevOps, Platform Engineering, SRE -- Summary -- Further reading -- Chapter 9: The Puzzle Pieces of Good Testing -- Technical requirements -- Recipes - how to do hard things -- Defining recipes -- Shouldn't recipes just be automated? …”
    Libro electrónico
  11. 331
    Publicado 2012
    Tabla de Contenidos: “…: no, a new gag for an old goose, 1624 ; Appello Caesarem : a just appeal from two unjust informers, 1625 / Richard Montagu ; Appendix : William Barlow on falling from grace at the Hampton Court Conference, 1604 -- Riches of mercy to men in misery : or, certain excellent treatises concerning the dignity and duty of God's children, ca. 1624 ; "The buckler of a believer," "Self-seeking opposite to Christ's interest" ; "Free grace magnified" / John Preston -- The locusts, or Apollyonists, 1627 / Phineas Fletcher -- The spy : discovering the danger of Arminian heresy and Spanisha treachery, 1628 / J.R. -- Microcosmography : or, a piece of the world discovered, in essays and characters, 1628 / John Earle -- God no impostor nor deluder, 1629 / William Prynne -- The estate of a Christian laid forth in a sermon preached at Gray's Inn, late 1620s / Joseph Hall -- The Gospel treasury opened, ca. 1625-36 ; "Of milk for babes ; and of meat for strong men" ; "All power given to Jesus Christ, in heaven and earth" / John Everard -- The bruised reed and smoking flax, 1630 / Richard Sibbes -- The story books of Little Gidding : being the religious dialogues recited in the great room 1631-32 / The Little Gidding Source Books -- Divine fancies : digested into epigrams, meditations, and observations, 1632 / Francis Quarles -- Sermons preached at Brancepath, 1632-33 / John Cosin -- "Upon faithful window, ", ca. 1632-33 / Richard Corbett -- "On Fairford windows" ; "On the Bible" ; "Justification" ; On the same M.M.P…”
    Click para texto completo desde fuera UPSA
    Click para texto completo desde UPSA
    Libro electrónico
  12. 332
    Publicado 2019
    Tabla de Contenidos: “…Les tentatives de restauration de la paix dans le Nord à l'époque du congrès d'Utrecht (1713-1714) / Éric Schnakenbourg -- The confessional issue and Utrecht: ambassadors and clerics, spies and rebels / Linda S. Frey, Marsha L. Frey -- The peace of Utrecht and the question of servitudes: God and cod, ports and forts / Linda S. …”
    Libro
  13. 333
    Publicado 2005
    Tabla de Contenidos: “…. -- ...and Dynamic Tunnels Eliminate the Need for Host Route Propagation -- Mobile IP: Components -- Mobile Node -- Home Network and Home Address -- Home Agent -- Care-of Address -- Foreign Agent -- Correspondent Node -- Mobile IP Protocol Concepts -- Mobile IP Agent Discovery -- Location Discovery -- Move Detection and Mobile IP Handover Policy -- Mobile IP Handover -- Mobile IP Registration -- Identification -- Services -- Authentication -- Relevant Address Fields -- Registration Reply Codes -- Registration Delivery -- Mobile IP Example -- Tunneling -- Encapsulation -- Triangle Routing -- Summary -- Review Questions -- Chapter 3 Mobile IP Security -- Protocol Authentication Extensions -- Security Associations -- SPI -- Algorithm and Mode -- Key -- Replay Protection Methods -- Mobile Node and Foreign Agent Authentication and Challenge Mechanism -- FA Challenge -- MN-AAA Authentication -- Dynamic Keying -- Standards-Based Dynamic Keying -- Cisco Dynamic Security Association and Key Distribution -- Location Privacy -- Summary -- Review Questions -- Chapter 4 IOS Mobile IP in the Lab -- Building the Baseline Topology -- Intermediate System Configuration -- Correspondent Node Configuration -- Home Agent Configuration…”
    Libro electrónico
  14. 334
    Publicado 2020
    Tabla de Contenidos: “…-- TensorBoard -- TensorBoard installieren -- Daten an TensorBoard übermitteln -- Hooks in PyTorch -- Mittelwert und Standardabweichung visualisieren -- Class Activation Mapping -- Flammendiagramme -- py-spy installieren -- Flammendiagramme interpretieren -- Eine langsame Transformation beheben -- Debuggen von GPU-Problemen -- Die GPU überwachen -- Gradient-Checkpointing -- Zusammenfassung -- Weiterführende Literatur…”
    Libro electrónico
  15. 335
    Publicado 2024
    Tabla de Contenidos: “…Understanding the role of localization (l10n) in creating multi-lingual experiences -- Challenges and considerations for designing internationally friendly applications -- Exploring popular internationalization libraries for Angular -- @angular/localize -- ngx-translate -- @ngneat/transloco -- angular-i18next -- Working with ngx-translate for internationalization -- Integrating ngx-translate into an Angular application -- Tips and tricks for working with ngx-translate -- Working with PrimeNG Locale -- Summary -- Chapter 13: Testing PrimeNG Components -- Technical requirements -- Getting started with basic Angular testing -- Introduction to Angular testing fundamentals -- Angular testing with Jest -- Step-by-step guide to writing your initial Angular tests -- Breaking down a simple unit test -- Writing test for PrimeNG components -- How PrimeNG tests its components -- Creating and testing our own component -- Utilizing testing tips and tricks -- Isolate unit tests -- Utilize NO_ERRORS_SCHEMA -- Utilize the spyOn method -- Working with fakeAsync -- Utilizing third-party libraries - Spectator -- Utilizing third-party libraries - ng-mocks -- Summary -- Part 4: Real-World Application -- Chapter 14: Building a Responsive Web Application -- Technical requirements -- Introduction to building a responsive web application -- Why responsive web applications matter -- The benefits of responsive web applications -- Key principles of responsive web design -- Introducing our responsive web application project -- Creating the layout of the website -- Starting to develop the website -- Prerequisites -- Header with navigation -- Hero section -- Features section -- Testimonials section -- Pricing section -- Footer section -- Deploying the responsive web application -- Getting the project ready for production -- Different options for deployment…”
    Libro electrónico
  16. 336
    Publicado 2024
    Tabla de Contenidos: “…Chapter 6: Event and Data Handling in Vue.js -- Technical requirements -- Exploring the Companion App changes -- Folders and file changes -- Logic changes -- Deepening our knowledge of props -- Props configurations -- Creating a basic button -- Handling native events in Vue.js -- Event modifiers -- Connecting components with custom events -- Event arguments -- Summary -- Chapter 7: Handling API Data and Managing Async Components with Vue.js -- Technical requirements -- Loading data from an API using the Vue.js life cycle -- Loading social posts from an API -- Fixing the SocialPost.vue properties' misalignment -- Load comments on demand -- Watching for changes in components using watch -- Handling asynchronous components with &lt -- Suspense&gt -- -- Understanding asynchronous components -- Turning a component into an asynchronous component -- Rendering async components -- Summary -- Part 3: Expanding Your Knowledge with Vue.js and Its Core Libraries -- Chapter 8: Testing Your App with Vitest and Cypress -- Technical requirements -- The testing pyramids -- Increased flexibility and the reduced risk of change -- Unit testing with Vitest -- Installing Vitest in your application -- Writing our first unit test -- E2E tests with Cypress -- Installing Cypress into your project -- Learning the E2E tests' file format and file location -- Writing your first E2E test -- Introducing advanced testing techniques -- Mocking -- Spying -- shallowMount (unit tests only) -- Summary -- Chapter 9: Introduction to Advanced Vue.js Techniques - Slots, Lifecycle, and Template Refs -- Technical requirements -- The power of slots -- Adding default values to a slot -- Slot versus property -- Provide multiple slots with named slots -- Accessing components elements with Template Refs -- Focus an onMounted element -- Access from native validation…”
    Libro electrónico
  17. 337
    Publicado 2022
    Tabla de Contenidos: “…Digital signatures with the ElGamal algorithm -- Blind signatures -- Blind signature with RSA -- Notes on the blind signature protocol -- Summary -- Section 3: New Cryptography Algorithms and Protocols -- Chapter 5: Zero-Knowledge Protocols -- The main scenario of a ZKP - the digital cave -- Non-interactive ZKPs -- Demonstration of a non-interactive ZKP -- Demonstrating an attack on an RSA ZKP -- Schnorr's interactive ZKP -- A demonstration of an interactive ZKP -- A challenge for a disruptive attack on an interactive ZKP -- One-round ZKP -- How it works mathematically -- Numerical example -- Notes on the one-round protocol -- An introduction to zk-SNARKs - spooky moon math -- Understanding how a zk-SNARK works -- Demonstrating an attack on a zk-SNARK protocol -- ZK13 - a ZKP for authentication and key exchange -- ZK13 explained -- Demonstrating the ZK13 protocol -- Notes and possible attacks on the ZK13 protocol -- Possible attacks on ZK13 -- Summary -- Chapter 6: New Inventions in Cryptography and Logical Attacks -- The genesis of the MB09 algorithm and blockchain -- Introducing the MB09 algorithm and an attempt at demonstrating Fermat's Last Theorem -- An extensive explanation of the MB09 algorithm -- Introducing the MBXI algorithm -- A numerical example of MBXI -- Notes on the MBXI algorithm and the prelude to an attack on RSA -- Unconventional attacks and self-reverse decryption on RSA -- A new protocol to protect RSA and asymmetric algorithms from spying -- Digital signatures on MBXI -- A direct signature method in MBXI -- The appendix signature method with MBXI -- A mathematical demonstration of the MBXI digital signature algorithm -- The evolution of MB09 and MBXI: an introduction to MBXX -- An explanation of the MBXX protocol -- Notes on the MBXX protocol -- Conclusions on the MBXX protocol -- Lightweight encryption…”
    Libro electrónico
  18. 338
    por Oner, Vedat Ozan
    Publicado 2023
    Tabla de Contenidos: “…Cover -- Copyright -- Contributors -- Table of Contents -- Preface -- Chapter 1: Introduction to IoT development and the ESP32 platform -- Technical requirements -- Understanding the basic structure of IoT solutions -- IoT security -- The ESP32 product family -- ESP32 series -- Other SoCs -- Development platforms and frameworks -- RTOS options -- Summary -- Chapter 2: Understanding theDevelopment Tools -- Technical requirements -- ESP-IDF -- The first application -- ESP-IDF Terminal -- PlatformIO -- Hello world with PlatformIO -- PlatformIO Terminal -- FreeRTOS -- Creating the producer-consumer project -- Coding application -- Running the application -- Debugging -- Unit testing -- Creating a project -- Coding the application -- Adding unit tests -- Running unit tests -- Summary -- Questions -- Further reading -- Chapter 3: Using ESP32 Peripherals -- Technical requirements -- Driving General-Purpose Input/Output (GPIO) -- Turning an LED on/off by using a button -- Creating a project -- Coding the application -- Troubleshooting -- Interfacing with sensors over Inter-Integrated Circuit (I2C) -- Developing a multisensor application -- Creating a project -- Coding the application -- Troubleshooting -- Integrating with SD cards over Serial Peripheral Interface (SPI) -- Adding SD card storage -- Creating the project -- Coding the application -- Testing the application -- Troubleshooting -- Audio output over Inter-IC Sound (I2S) -- Developing a simple audio player -- Coding the application -- Testing the application -- Developing graphical user interfaces on Liquid-Crystal Display (LCD) -- A simple graphical user interface (GUI) on ESP32 -- Creating the project -- Coding the application -- Testing the application -- Summary -- Questions -- Further reading -- Chapter 4: Employing Third-Party Libraries in ESP32 Projects -- Technical requirements…”
    Libro electrónico
  19. 339
    Publicado 2017
    Tabla de Contenidos: “…GPIO callback functions -- DC motor control in Python -- Some mini-project challenges for the reader -- Summary -- Chapter 4: Communication Interfaces -- UART - serial port -- Raspberry Pi Zero's UART port -- Setting up the Raspberry Pi Zero serial port -- Example 1 - interfacing a carbon dioxide sensor to the Raspberry Pi -- Python code for serial port communication -- I2C communication -- Example 2 - PiGlow -- Installing libraries -- Example -- Example 3 - Sensorian add-on hardware for the Raspberry Pi -- I2C drivers for the lux sensor -- Challenge -- The SPI interface -- Example 4 - writing to external memory chip -- Challenge to the reader -- Summary -- Chapter 5: Data Types and Object-Oriented Programming in Python -- Lists -- Operations that could be performed on a list -- Append element to list: -- Remove element from list: -- Retrieving the index of an element -- Popping an element from the list -- Counting the instances of an element: -- Inserting element at a specific position: -- Challenge to the reader -- Extending a list -- Clearing the elements of a list -- Sorting the elements of a list -- Reverse the order of elements in list -- Create copies of a list -- Accessing list elements -- Accessing a set of elements within a list -- List membership -- Let's build a simple game! …”
    Libro electrónico
  20. 340
    Publicado 2016
    Tabla de Contenidos: “…Creating a Metasploit Payload -- Determining Your Target Make -- Interactive Probing -- Passive CAN Bus Fingerprinting -- Responsible Exploitation -- Summary -- Chapter 12: Attacking Wireless Systems with SDR -- Wireless Systems and SDR -- Signal Modulation -- Hacking with TPMS -- Eavesdropping with a Radio Receiver -- TPMS Packets -- Activating a Signal -- Tracking a Vehicle -- Event Triggering -- Sending Forged Packets -- Attacking Key Fobs and Immobilizers -- Key Fob Hacks -- Attacking a PKES System -- Immobilizer Cryptography -- Physical Attacks on the Immobilizer System -- Flashback: Hotwiring -- Summary -- Chapter 13: Performance Tuning -- Performance Tuning Trade-Offs -- ECU Tuning -- Chip Tuning -- Flash Tuning -- Stand-Alone Engine Management -- Summary -- Appendix A: Tools of the Trade -- Hardware -- Lower-End CAN Devices -- Higher-End CAN Devices -- Software -- Wireshark -- PyOBD Module -- Linux Tools -- CANiBUS Server -- Kayak -- SavvyCAN -- O2OO Data Logger -- Caring Caribou -- c0f Fingerprinting Tool -- UDSim ECU Simulator -- Octane CAN Bus Sniffer -- AVRDUDESS GUI -- RomRaider ECU Tuner -- Komodo CAN Bus Sniffer -- Vehicle Spy -- Appendix B: Diagnostic Code Modes and PIDs -- Modes Above 0x10 -- Useful PIDs -- Appendix C: Creating Your Own Open Garage -- Filling Out the Character Sheet -- When to Meet -- Affiliations and Private Memberships -- Defining Your Meeting Space -- Contact Information -- Initial Managing Officers -- Equipment -- Abbreviations -- Index -- Footnotes -- Chapter 10: Vehicle-to-Vehicle Communication -- Chapter 12: Attacking Wireless Systems with SDR…”
    Libro electrónico