Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 23
- Programming 21
- Security measures 20
- Development 19
- History 19
- Application software 17
- Computer networks 16
- Embedded computer systems 13
- Engineering & Applied Sciences 13
- Arduino (Programmable controller) 12
- Computer programming 12
- JavaScript (Computer program language) 12
- Literatura alemana 12
- Computer input-output equipment 11
- Raspberry Pi (Computer) 11
- Computer software 10
- Python (Computer program language) 10
- Design and construction 9
- Història 9
- Internet 9
- Programmable controllers 9
- Computer Science 8
- Diagnosis 8
- Java (Computer program language) 8
- Linux 8
- Microcontrollers 8
- Testing 8
- Data protection 7
- Hardware and Maker 7
- Mental illness 7
-
341Publicado 2023Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Contributors -- Table of Contents -- Preface -- Part 1: Introduction to Arduino and Sensor Data -- Chapter 1: Getting Started with Arduino -- Technical requirements -- Learning about Arduino - The company -- Learning about Arduino - The hardware -- Choosing your board - The Arduino MKR family -- Learning about the Arduino IDE -- Arduino Cloud IDE -- Arduino Desktop IDE -- Learning about the Arduino programming language -- Getting started with Arduino -- General purpose input and output -- Writing the first lines of code - Hello World -- Installing the board -- Blinking the onboard LED -- Summary -- Chapter 2: Leveraging Various Sensors for Data Acquisition -- Technical requirements -- Learning about input and output pins -- UART -- SPI -- I2C -- Discovering sensors -- Motion sensors -- Acoustic sensors -- Environmental sensors -- Vision sensors -- Biometric sensors -- Force -- Rotation -- Summary -- Further reading -- Chapter 3: Prototyping with Shields -- Technical requirements -- What is a shield? …”
Libro electrónico -
342Tabla de Contenidos: “…Dynamic Linearity -- Summary -- References -- Chapter 3: Key Sensor Technology Components: Hardware and Software Overview -- Smart Sensors -- Sensor Systems -- Sensor Platforms -- The Arduino I/O Board -- Shimmer -- Smartphones and Tablets -- Microcontrollers for Smart Sensors -- CPUs -- Registers -- Memory -- Timers and Counters -- Debugging Interfaces -- Common Microcontrollers -- Interfaces and Embedded Communications -- Embedded Digital Interfaces and Protocols -- Serial Peripheral Interface (SPI) -- The I 2 C Bus -- Analog Interfacing -- Sensor Communications -- Standard Wired Interfaces -- RS-232 -- Virtual Serial Ports -- RS-485 -- Universal Serial Bus (USB) -- Short- and Medium-Range Standards for Wireless Communications -- Proprietary Wireless Protocols -- Power Management and Energy Harvesting -- Power Management -- Energy Harvesting -- Microcontroller Software and Debugging -- IDEs -- Development Languages -- Testing Code -- Summary -- References -- Chapter 4: Sensor Network Topolog ies and Design Considerations -- Sensor Network Components -- Sensor Nodes -- Aggregators, Base Stations, and Gateways -- Machine-to-Machine Devices -- Proprietary M2M solutions -- Smartphones -- Traditional M2M Platforms -- Sensor Network Topologies -- Sensor Network Applications -- Personal Area Networks -- Ambient/Pervasive Home Sensor Networks -- Wide Area Networks -- Sensor Network Features and Challenges -- Security -- Key Security Goals -- Attacks on Sensor Networks -- Security Approaches -- Biometrics -- Challenges for Sensor Networks -- Summary -- References -- Chapter 5: Processing and Adding Vibrancy to Sensor Data -- Data Literacy -- The Internet of Things -- Sensors and the Cloud -- Data Quality -- Addressing Data Quality Issues -- Outlier Detection -- Automated Data Cleaning -- Plausibility Testing -- Fusing Sensor Data -- Data Mining…”
Libro electrónico -
343Publicado 2024Tabla de Contenidos: “…Cover -- Copyright -- Contributors -- Table of Contents -- Preface -- Part 1: Understanding IoT Fundamentals -- Chapter 1: IoT Essentials, All You Should Know -- The evolving definition of IoT -- Deployed from fixed to mobility -- Mobility from a local area to a wide area -- Presence from city to barren fields -- Throughput from Mb/s to Gb/s -- Battery life from days to years -- Networking from point-to-point and point-to-multipoint to mesh and star topologies -- Intelligence at edge node -- AI and ML -- Addressable markets -- Residential -- Commercial and business -- Neighborhood and campus -- Cities -- Rural areas -- Industries -- How IoT impacts us -- Living comfort and safety improvement -- Operational efficiency improvement -- Environmental protection improvement -- Industrial productivity improvement -- Summary -- Further reading -- Chapter 2: IoT Network, the Neural System of Things -- IoT networks at home -- Home Wi-Fi -- BLE -- Thread -- IoT networks on campuses and in buildings -- Enterprise Wi-Fi -- Thread mesh -- Private LoRaWAN network -- No one-size-fits-all approach -- IoT networks in cities -- Cellular network -- Public LoRaWAN network -- IoT networks in rural areas -- Private LoRaWAN network -- LEO network -- Summary -- Chapter 3: IoT End Devices, the Neuron Cells of an IoT System -- Device types -- Installing indoors versus outdoors -- Powering via external supply versus batteries -- Connected by wire versus wireless -- The need for edge computing -- Hardware architecture -- MCUs -- Roles -- Key features -- Critical components -- Off-the-shelf MCU -- DIY-friendly MCU -- Peripherals and interfaces -- GPIO -- SPI -- I2C -- UART -- USB -- SDIO -- ADCs -- DACs -- PWM outputs -- JTAG -- Timers -- Real-time clock -- Sensors and actuators -- Sensors -- Actuators -- Common pins on sensors -- Understanding sensor specifications…”
Libro electrónico -
344por Kroah-Hartman, GregTabla de Contenidos: “…DISCONTIGMEM _MANUAL -- SPARSEMEM_ MANUAL -- SECCOMP -- KEXEC -- HOTPLUG_CPU -- PM -- SOFTWARE_ SUSPEND -- ACPI -- CPU_FREQ -- CPU_FREQ_ DEFAULT_GOV_ PERFORMANCE -- CPU_FREQ_ DEFAULT_GOV_ USERSPACE -- CPU_FREQ_ GOV_ PERFORMANCE -- CPU_FREQ_ GOV_ POWERSAVE -- CPU_FREQ_ GOV_ USERSPACE -- CPU_FREQ_ GOV_ ONDEMAND -- CPU_FREQ_ GOV_ CONSERVATIVE -- PCI -- PCCARD -- PCMCIA -- CARDBUS -- HOTPLUG_PCI -- NET -- UNIX -- INET -- IP_ADVANCED_ ROUTER -- NETFILTER -- NET_SCHED -- IRDA -- IRLAN -- IRNET -- IRCOMM -- IRDA_ULTRA -- BT -- IEEE80211 -- MTD -- PARPORT -- PNP -- ISAPNP -- PNPBIOS -- IDE -- BLK_DEV_IDE -- BLK_DEV_ IDEDISK -- BLK_DEV_ IDECD -- BLK_DEV_ IDEFLOPPY -- SCSI -- BLK_DEV_SD -- CHR_DEV_ST -- BLK_DEV_SR -- CHR_DEV_SG -- CHR_DEV_SCH -- SCSI_MULTI_ LUN -- SCSI_SATA -- MD -- BLK_DEV_MD -- BLK_DEV_DM -- IEEE1394 -- I2O -- NETDEVICES -- NET_ETHERNET -- NET_RADIO -- PPP -- PPPOE -- ISDN -- PHONE -- INPUT -- VT -- VT_CONSOLE -- SERIAL_8250 -- AGP -- DRM -- I2C -- SPI -- HWMON -- VIDEO_DEV -- DVB -- FB -- VGA_CONSOLE -- LOGO -- SOUND -- SND -- SND_USB_ AUDIO -- USB -- USB_EHCI_HCD -- USB_OHCI_HCD -- USB_UHCI_HCD -- USB_STORAGE -- USB_SERIAL -- USB_GADGET -- MMC -- INFINIBAND -- EDAC -- EXT2_FS -- EXT3_FS -- REISERFS_FS -- JFS_FS -- XFS_FS -- OCFS2_FS -- INOTIFY -- QUOTA -- AUTOFS_FS -- FUSE_FS -- SMB_FS -- CIFS -- PROFILING -- OPROFILE -- KPROBES -- PRINTK_TIME -- MAGIC_SYSRQ -- DEBUG_KERNEL -- DEBUG_FS -- SECURITY -- SECURITY_ SELINUX -- IV -- Helpful Utilities -- patch and diff -- New Kernel Versions -- Managing Your Patches with quilt -- git -- ketchup -- Bibliography -- Books -- General Linux Books -- Linux Kernel Books -- Tool Locations -- Index…”
Publicado 2007
Libro electrónico -
345Publicado 2021Tabla de Contenidos: “…Writing tests -- 3 Testing techniques -- 3.1 Organizing test suites -- 3.1.1 Breaking down tests -- 3.1.2 Parallelism -- 3.1.3 Global hooks -- 3.1.4 Atomicity -- 3.2 Writing good assertions -- 3.2.1 Assertions and error handling -- 3.2.2 Loose assertions -- 3.2.3 Using custom matchers -- 3.2.4 Circular assertions -- 3.3 Test doubles: Mocks, stubs, and spies -- 3.3.1 Mocking imports -- 3.4 Choosing what to test -- 3.4.1 Don't test third-party software -- 3.4.2 To mock, or not to mock: That's the question -- 3.4.3 When in doubt, choose integration tests -- 3.5 Code coverage -- 3.5.1 Automated coverage reports -- 3.5.2 Coverage types -- 3.5.3 What coverage is good for and what it isn't -- Summary -- 4 Testing backend applications -- 4.1 Structuring a testing environment -- 4.1.1 End-to-end testing -- 4.1.2 Integration testing -- 4.1.3 Unit testing -- 4.2 Testing HTTP endpoints -- 4.2.1 Testing middleware…”
Libro electrónico -
346Publicado 2024Tabla de Contenidos: “…-- Knowledge of TQM Tools -- Tools of TQM -- Check Sheets -- Scatter Diagrams -- Cause-and-Effect Diagrams -- Pareto Charts -- Flowcharts -- Histograms -- Statistical Process Control (SPC) -- The Role of Inspection -- When and Where to Inspect -- OM in Action: Inspecting the Boeing 787 -- Source Inspection -- Service Industry Inspection -- OM in Action: Safe Patients, Smart Hospitals -- Inspection of Attributes versus Variables -- TQM in Services -- OM in Action: Richey International's Spies -- Summary -- Key Terms -- Ethical Dilemma -- Discussion Questions -- Solved Problems -- Problems -- Case Studies…”
Libro electrónico -
347Publicado 2023Tabla de Contenidos: “…-- Knowledge of TQM Tools -- Tools of TQM -- Check Sheets -- Scatter Diagrams -- Cause-and-Effect Diagrams -- Pareto Charts -- Flowcharts -- Histograms -- Statistical Process Control (SPC) -- The Role of Inspection -- When and Where to Inspect -- OM in Action: Inspecting the Boeing 787 -- Source Inspection -- Service Industry Inspection -- OM in Action: Safe Patients, Smart Hospitals -- Inspection of Attributes versus Variables -- TQM in Services -- OM in Action: Richey International's Spies -- Summary -- Key Terms -- Ethical Dilemma -- Discussion Questions -- Solved Problems -- Problems -- Case Studies…”
Libro electrónico -
348Publicado 2017Tabla de Contenidos: “…-- Service-Oriented Architectures -- 4-Tiers and microservices -- Deploying microservices -- Microservices with Seneca -- Serverless applications -- AWS Lambda -- Scaling with Claudia and API Gateway -- Installing claudia and deploying a service -- Containerized microservices -- Getting started with Docker -- Creating a Dockerfile -- Running containers -- Orchestrating Containers with Kubernetes -- Creating a basic Kubernetes cluster -- Declaring Pod deployments -- Summary -- Chapter 10: Testing Your Application -- Why testing is important -- Unit tests -- Functional tests -- Integration tests -- Native Node testing and debugging tools -- Writing to the console -- Formatting console output -- The util.format(format, [arg, arg...]) method -- The util.inspect(object, [options]) method -- The Node debugger -- The assert module -- Sandboxing -- Distinguishing between local scope and execution context -- Using compiled contexts -- Testing with Mocha, Chai, and Sinon -- Mocha -- Chai -- Sinon -- Spies…”
Libro electrónico -
349Publicado 2012Tabla de Contenidos: “…Cover -- Contents -- Introduction: Homeland Security: A Concern and a Role for Everyone -- Part 1 How We Got Here from There: The Emergence of Contemporary Homeland Security -- Chapter 1 Homeland Security: The American Tradition -- Chapter Overview -- Chapter Learning Objectives -- A Colonial Legacy: Securing Communities and Coastlines -- The Young Republic: Dangers from Within -- The New Great Power Faces Foreign Threats -- World War I: From Sabotage to Pandemics -- World War II: Safeguarding Freedom's Arsenal -- The Cold War: Foreign Spies, Domestic Radicals, and Disaster Response -- The Threat of Shadow War -- Out of the Cold: Emerging Threats to America's Homeland -- Chapter Summary -- Chapter Quiz -- Notes -- Chapter 2 The Road to 9/11: Contemporary Terrorism and the Meaning of the September 11 Attacks -- Chapter Overview -- Chapter Learning Objectives -- Terrorist Trends Anticipating 9/11 -- The Emergence of al-Qaida -- A Day That Changed the World -- Lessons for Disaster Preparedness and Response -- New Fears: Weapons of Mass Destruction and Disruption -- Chapter Summary -- Chapter Quiz -- Notes -- Chapter 3 The Birth of Contemporary Homeland Security: The National Response to 9/11 and Its Aftermath -- Chapter Overview -- Chapter Learning Objectives -- The Response to Contemporary Terrorism -- International Cooperation -- Defensive Efforts -- Katrina and What Followed -- Back to the Border -- Homeland Security's Evolving Enterprise -- Twilight of the Long War? …”
Libro electrónico -
350Publicado 2017Tabla de Contenidos: “…Other components and peripherals -- Memory -- Timers and watchdogs -- Communication interfaces: I2C, UART, and SPI -- Debug -- References -- 5 Power management -- Introduction -- ACPI Power States -- ACPI Global Power States -- ACPI Sleep States -- ACPI Device Power States -- Power Management in Sensors, Smartphones, and Tablets -- Android Wakelock Architecture -- Windows Connected Standby -- Benefits and value -- What does connected standby do? …”
Libro electrónico -
351Publicado 2023Tabla de Contenidos: “…Drive-by downloads -- Stealing passwords -- Exploiting Maintenance Difficulties -- Advanced Attacks -- Opportunistic attacks -- Targeted attacks -- Blended (opportunistic and targeted) attacks -- Some Technical Attack Techniques -- Rootkits -- Brute-force attacks -- Injection attacks -- Cross-site scripting -- SQL injection -- Session hijacking -- Malformed URL attacks -- Buffer overflow attacks -- Chapter 3 The Bad Guys You Must Defend Against -- Bad Guys and Good Guys Are Relative Terms -- Bad Guys Up to No Good -- Script kiddies -- Kids who are not kiddies -- Terrorists and other rogue groups -- Nations and states -- Corporate spies -- Criminals -- Hacktivists -- Terrorists -- Rogue insiders -- Cyberattackers and Their Colored Hats -- How Cybercriminals Monetize Their Actions -- Direct financial fraud -- Indirect financial fraud -- Profiting off illegal trading of securities -- Stealing credit card, debit card, and other payment-related information -- Stealing goods -- Stealing data -- Ransomware -- Cryptominers -- Not All Dangers Come From Attackers: Dealing with Nonmalicious Threats -- Human error -- Humans: The Achilles' heel of cybersecurity -- Social engineering -- External disasters -- Natural disasters -- Pandemics -- Environmental problems caused by humans -- Cyberwarriors and cyberspies -- The impotent Fair Credit Reporting Act -- Expunged records are no longer really expunged -- Social Security numbers -- Social media platforms -- Google's all-knowing computers -- Mobile device location tracking -- Defending against These Attackers -- 2 Personal Cybersecurity -- Chapter 1 Evaluating Your Current Cybersecurity Posture -- Don't be Achilles: Identifying Ways You May Be Less than Secure -- Your home computer(s) -- Your mobile devices -- Your Internet of Things (IoT) devices -- Your networking equipment -- Your work environment…”
Libro electrónico -
352Publicado 2017Tabla de Contenidos: “…. -- Identifying buses and interfaces -- UART identification -- SPI and I2C identification -- JTAG identification -- There's more... -- Serial interfacing for embedded devices -- Getting ready -- How to do it... -- See also -- NAND glitching -- Getting ready -- How to do it... -- See also -- JTAG debugging and exploitation -- Getting ready -- How to do it... -- See also -- Chapter 7: Radio Hacking -- Introduction -- Getting familiar with SDR -- Key terminologies in radio -- Hands-on with SDR tools -- Getting ready -- How to do it... -- Analyzing FM -- RTL-SDR for GSM analysis -- Working with GNU Radio -- There's more... -- Understanding and exploiting ZigBee -- Getting ready -- How to do it... -- There's more... -- Gaining insight into Z-Wave -- How to do it... -- Understanding and exploiting BLE -- Getting ready -- How to do it... -- There's more... -- Chapter 8: Firmware Security Best Practices -- Introduction -- Preventing memory-corruption vulnerabilities -- Getting ready -- How to do it... -- See also -- Preventing injection attacks -- How to do it... -- See also -- Securing firmware updates -- How to do it... -- Securing sensitive information -- How to do it... -- See also -- Hardening embedded frameworks -- Getting ready -- How to do it... -- Securing third-party code and components -- Getting ready -- How to do it... -- Chapter 9: Mobile Security Best Practices -- Introduction -- Storing data securely -- Getting ready -- How to do it... -- See also -- Implementing authentication controls…”
Libro electrónico -
353CybersecurityCybersecurity For DummiesPublicado 2022Tabla de Contenidos: “…Malvertising -- Drive-by downloads -- Stealing passwords -- Exploiting Maintenance Difficulties -- Advanced Attacks -- Opportunistic attacks -- Targeted attacks -- Blended (opportunistic and targeted) attacks -- Some Technical Attack Techniques -- Rootkits -- Brute-force attacks -- Injection attacks -- Cross-site scripting -- SQL injection -- Session hijacking -- Malformed URL attacks -- Buffer overflow attacks -- Chapter 3 The Bad Guys You Must Defend Against -- Bad Guys and Good Guys Are Relative Terms -- Bad Guys Up to No Good -- Script kiddies -- Kids who are not kiddies -- Terrorists and other rogue groups -- Nations and states -- Corporate spies -- Criminals -- Hacktivists -- Terrorists -- Rogue insiders -- Cyberattackers and Their Colored Hats -- How Cybercriminals Monetize Their Actions -- Direct financial fraud -- Indirect financial fraud -- Profiting off illegal trading of securities -- Stealing credit card, debit card, and other payment-related information -- Stealing goods -- Stealing data -- Ransomware -- Cryptominers -- Not All Dangers Come From Attackers: Dealing with Nonmalicious Threats -- Human error -- Humans: The Achilles' heel of cybersecurity -- Social engineering -- External disasters -- Natural disasters -- Pandemics -- Man-made environmental problems -- Cyberwarriors and cyberspies -- The impotent Fair Credit Reporting Act -- Expunged records are no longer really expunged -- Social Security numbers -- Social media platforms -- Google's all-knowing computers -- Mobile device location tracking -- Defending against These Attackers -- Part 2 Improving Your Own Personal Security -- Chapter 4 Evaluating Your Current Cybersecurity Posture -- Don't be Achilles: Identifying Ways You May Be Less than Secure -- Your home computer(s) -- Your mobile devices -- Your Internet of Things (IoT) devices -- Your networking equipment…”
Libro electrónico -
354Publicado 2018Tabla de Contenidos: “…-- Installing the global module -- Creating a React application -- Running the Create React App script -- Mocha and Chai -- Jest -- Mocha -- Chai -- Sinon -- Enzyme -- Ejecting the React app -- Configuring to use Mocha and Chai -- A quick kata to check our test setup -- The requirements -- The execution -- Starting the kata -- Summary -- Chapter 4: What to Know Before Getting Started -- Untestable code -- Dependency Injection -- Static -- Singleton -- Global state -- Abstracting third-party software -- Test doubles -- Mocking frameworks -- The SOLID principles -- The Single Responsibility Principle -- The Open/Closed principle -- The Liskov Substitution principle -- The Interface Segregation principle -- The Dependency Inversion principle -- Timely greeting -- Fragile tests -- False positives and false failures -- Abstract DateTime -- Test double types -- Dummies -- Dummy logger -- Example in C# -- Example in JavaScript -- Stubs -- Example in C# -- Example in JavaScript -- Spies -- Example in C# -- Example in JavaScript -- Mocks -- Example in C# -- Example in JavaScript -- Fakes -- Example in C# -- Example in JavaScript -- N-Tiered example -- Presentation layer -- Moq -- Business layer -- Summary…”
Libro electrónico -
355Publicado 2021Tabla de Contenidos: “…-- How Sensors Measure -- Analog Sensors -- Digital Sensors -- Examples of Sensors -- Summary -- Chapter 9: The Adafruit Microsoft IoT Pack for Raspberry Pi -- Overview -- Components Included -- Environmental Sensor: BME280 -- Color Sensor: TCS34725 -- 8-Channel 10-Bit ADC with SPI Interface: MCP3008 -- Are There Alternatives? …”
Libro electrónico -
356Publicado 2023Tabla de Contenidos: “…. -- How it works... -- See also -- Using spies on an injected service in a unit test -- Getting ready -- How to do it... -- How it works... -- See also -- Mocking child components and directives using the ng-mocks package -- Getting ready -- How to do it... -- How it works... -- See also -- Writing even easier tests with Angular CDK component harnesses -- Getting ready -- How to do it... -- How it works... -- See also -- Unit-testing responses from HTTP calls -- Getting ready -- How to do it... -- How it works... -- See also -- Unit-testing Angular pipes -- Getting ready -- How to do it... -- See also -- Chapters 11: E2E Tests in Angular with Cypress -- Technical requirements -- Writing your first Cypress test -- Getting ready -- How to do it... -- How it works... -- See also -- Validating if a DOM element is visible on the view -- Getting ready -- How to do it... -- How it works... -- See also -- Testing form inputs and submission -- Getting ready -- How to do it... -- How it works... -- See also -- Waiting for XHRs to finish -- Getting ready -- How to do it... -- How it works... -- See also -- Using Cypress bundled packages -- Getting ready -- How to do it... -- How it works... -- See also -- Using Cypress fixtures to provide mock data…”
Libro electrónico -
357Publicado 2018Tabla de Contenidos: “…-- Adding our RGB LED to the REPL -- Controlling our LED from the command-line interface -- Summary -- Questions -- Further reading -- Chapter 4: Bringing in Input with Buttons -- Technical requirements -- Using inputs in robotics projects -- Digital versus analog input -- How to handle analog input with the Raspberry Pi -- Analog GPIO expanders -- Using input devices with digital interfaces -- How Johnny-Five handles input -- The structure of a typical Johnny-Five project -- The beginning - including libraries and creating our board object -- The board ready event handler -- Constructing our component objects -- Input event handlers and output device manipulation -- The Johnny-Five button object -- The button object -- Button events -- Wiring up buttons -- Putting a button on a breadboard -- Using a pull-down resistor -- Adding buttons to our RGB LED project -- Wiring everything up -- Using the power and ground side rails -- Wiring up the buttons -- Button 1 - stop and start rainbow -- Refactoring the rainbow cycle -- Button 2 - next color -- Summary -- Questions -- Further reading -- Chapter 5: Using a Light Sensor to Create a Night-Light -- Technical requirements -- Using an analog sensor with the Pi -- Finding the right sensors for your Pi project -- I2C devices -- SPI -- How to determine if your sensor will work with Johnny-Five -- The ambient light sensor -- Wiring up the sensor -- Writing a program to get readings and print them to the command line -- The Johnny-Five sensor events…”
Libro electrónico -
358Publicado 2020Tabla de Contenidos: “…-- The Three Pillars of Cybersecurity -- Two Approaches to Security -- Physical Security: Locking Your Doors -- Securing User Accounts -- Obfuscating your usernames -- Using passwords wisely -- Generating passwords For Dummies -- Secure the Administrator account -- Managing User Security -- User accounts -- Built-in accounts -- User rights -- Permissions (who gets what) -- Group therapy -- User profiles -- Logon scripts -- Securing the Human Firewall -- Chapter 20 Hardening Your Network -- Firewalls -- The Many Types of Firewalls -- Packet filtering -- Stateful packet inspection (SPI) -- Circuit-level gateway -- Application gateway -- Next-generation firewall -- Virus Protection -- What is a virus? …”
Libro electrónico -
359
-
360