Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 31
- Espionaje 27
- Espías 24
- Computer security 23
- Programming 21
- Novela inglesa 20
- Security measures 20
- Development 19
- Guerra mundial, 1939-1945 19
- History 19
- Application software 17
- Computer networks 16
- Embedded computer systems 13
- Engineering & Applied Sciences 13
- Arduino (Programmable controller) 12
- Computer programming 12
- JavaScript (Computer program language) 12
- Literatura alemana 12
- Servicios de inteligencia 12
- Servicios secretos 12
- Computer input-output equipment 11
- Raspberry Pi (Computer) 11
- Computer software 10
- Internet 10
- Política y gobierno 10
- Python (Computer program language) 10
- Design and construction 9
- Programmable controllers 9
- Relaciones 9
- Computer Science 8
-
481Publicado 2020Tabla de Contenidos: “…-- TensorBoard -- TensorBoard installieren -- Daten an TensorBoard übermitteln -- Hooks in PyTorch -- Mittelwert und Standardabweichung visualisieren -- Class Activation Mapping -- Flammendiagramme -- py-spy installieren -- Flammendiagramme interpretieren -- Eine langsame Transformation beheben -- Debuggen von GPU-Problemen -- Die GPU überwachen -- Gradient-Checkpointing -- Zusammenfassung -- Weiterführende Literatur…”
Libro electrónico -
482Publicado 2024Tabla de Contenidos: “…Understanding the role of localization (l10n) in creating multi-lingual experiences -- Challenges and considerations for designing internationally friendly applications -- Exploring popular internationalization libraries for Angular -- @angular/localize -- ngx-translate -- @ngneat/transloco -- angular-i18next -- Working with ngx-translate for internationalization -- Integrating ngx-translate into an Angular application -- Tips and tricks for working with ngx-translate -- Working with PrimeNG Locale -- Summary -- Chapter 13: Testing PrimeNG Components -- Technical requirements -- Getting started with basic Angular testing -- Introduction to Angular testing fundamentals -- Angular testing with Jest -- Step-by-step guide to writing your initial Angular tests -- Breaking down a simple unit test -- Writing test for PrimeNG components -- How PrimeNG tests its components -- Creating and testing our own component -- Utilizing testing tips and tricks -- Isolate unit tests -- Utilize NO_ERRORS_SCHEMA -- Utilize the spyOn method -- Working with fakeAsync -- Utilizing third-party libraries - Spectator -- Utilizing third-party libraries - ng-mocks -- Summary -- Part 4: Real-World Application -- Chapter 14: Building a Responsive Web Application -- Technical requirements -- Introduction to building a responsive web application -- Why responsive web applications matter -- The benefits of responsive web applications -- Key principles of responsive web design -- Introducing our responsive web application project -- Creating the layout of the website -- Starting to develop the website -- Prerequisites -- Header with navigation -- Hero section -- Features section -- Testimonials section -- Pricing section -- Footer section -- Deploying the responsive web application -- Getting the project ready for production -- Different options for deployment…”
Libro electrónico -
483Publicado 2024Tabla de Contenidos: “…Chapter 6: Event and Data Handling in Vue.js -- Technical requirements -- Exploring the Companion App changes -- Folders and file changes -- Logic changes -- Deepening our knowledge of props -- Props configurations -- Creating a basic button -- Handling native events in Vue.js -- Event modifiers -- Connecting components with custom events -- Event arguments -- Summary -- Chapter 7: Handling API Data and Managing Async Components with Vue.js -- Technical requirements -- Loading data from an API using the Vue.js life cycle -- Loading social posts from an API -- Fixing the SocialPost.vue properties' misalignment -- Load comments on demand -- Watching for changes in components using watch -- Handling asynchronous components with < -- Suspense> -- -- Understanding asynchronous components -- Turning a component into an asynchronous component -- Rendering async components -- Summary -- Part 3: Expanding Your Knowledge with Vue.js and Its Core Libraries -- Chapter 8: Testing Your App with Vitest and Cypress -- Technical requirements -- The testing pyramids -- Increased flexibility and the reduced risk of change -- Unit testing with Vitest -- Installing Vitest in your application -- Writing our first unit test -- E2E tests with Cypress -- Installing Cypress into your project -- Learning the E2E tests' file format and file location -- Writing your first E2E test -- Introducing advanced testing techniques -- Mocking -- Spying -- shallowMount (unit tests only) -- Summary -- Chapter 9: Introduction to Advanced Vue.js Techniques - Slots, Lifecycle, and Template Refs -- Technical requirements -- The power of slots -- Adding default values to a slot -- Slot versus property -- Provide multiple slots with named slots -- Accessing components elements with Template Refs -- Focus an onMounted element -- Access from native validation…”
Libro electrónico -
484Publicado 2022Tabla de Contenidos: “…Digital signatures with the ElGamal algorithm -- Blind signatures -- Blind signature with RSA -- Notes on the blind signature protocol -- Summary -- Section 3: New Cryptography Algorithms and Protocols -- Chapter 5: Zero-Knowledge Protocols -- The main scenario of a ZKP - the digital cave -- Non-interactive ZKPs -- Demonstration of a non-interactive ZKP -- Demonstrating an attack on an RSA ZKP -- Schnorr's interactive ZKP -- A demonstration of an interactive ZKP -- A challenge for a disruptive attack on an interactive ZKP -- One-round ZKP -- How it works mathematically -- Numerical example -- Notes on the one-round protocol -- An introduction to zk-SNARKs - spooky moon math -- Understanding how a zk-SNARK works -- Demonstrating an attack on a zk-SNARK protocol -- ZK13 - a ZKP for authentication and key exchange -- ZK13 explained -- Demonstrating the ZK13 protocol -- Notes and possible attacks on the ZK13 protocol -- Possible attacks on ZK13 -- Summary -- Chapter 6: New Inventions in Cryptography and Logical Attacks -- The genesis of the MB09 algorithm and blockchain -- Introducing the MB09 algorithm and an attempt at demonstrating Fermat's Last Theorem -- An extensive explanation of the MB09 algorithm -- Introducing the MBXI algorithm -- A numerical example of MBXI -- Notes on the MBXI algorithm and the prelude to an attack on RSA -- Unconventional attacks and self-reverse decryption on RSA -- A new protocol to protect RSA and asymmetric algorithms from spying -- Digital signatures on MBXI -- A direct signature method in MBXI -- The appendix signature method with MBXI -- A mathematical demonstration of the MBXI digital signature algorithm -- The evolution of MB09 and MBXI: an introduction to MBXX -- An explanation of the MBXX protocol -- Notes on the MBXX protocol -- Conclusions on the MBXX protocol -- Lightweight encryption…”
Libro electrónico -
485por Oner, Vedat OzanTabla de Contenidos: “…Cover -- Copyright -- Contributors -- Table of Contents -- Preface -- Chapter 1: Introduction to IoT development and the ESP32 platform -- Technical requirements -- Understanding the basic structure of IoT solutions -- IoT security -- The ESP32 product family -- ESP32 series -- Other SoCs -- Development platforms and frameworks -- RTOS options -- Summary -- Chapter 2: Understanding theDevelopment Tools -- Technical requirements -- ESP-IDF -- The first application -- ESP-IDF Terminal -- PlatformIO -- Hello world with PlatformIO -- PlatformIO Terminal -- FreeRTOS -- Creating the producer-consumer project -- Coding application -- Running the application -- Debugging -- Unit testing -- Creating a project -- Coding the application -- Adding unit tests -- Running unit tests -- Summary -- Questions -- Further reading -- Chapter 3: Using ESP32 Peripherals -- Technical requirements -- Driving General-Purpose Input/Output (GPIO) -- Turning an LED on/off by using a button -- Creating a project -- Coding the application -- Troubleshooting -- Interfacing with sensors over Inter-Integrated Circuit (I2C) -- Developing a multisensor application -- Creating a project -- Coding the application -- Troubleshooting -- Integrating with SD cards over Serial Peripheral Interface (SPI) -- Adding SD card storage -- Creating the project -- Coding the application -- Testing the application -- Troubleshooting -- Audio output over Inter-IC Sound (I2S) -- Developing a simple audio player -- Coding the application -- Testing the application -- Developing graphical user interfaces on Liquid-Crystal Display (LCD) -- A simple graphical user interface (GUI) on ESP32 -- Creating the project -- Coding the application -- Testing the application -- Summary -- Questions -- Further reading -- Chapter 4: Employing Third-Party Libraries in ESP32 Projects -- Technical requirements…”
Publicado 2023
Libro electrónico -
486Publicado 2017Tabla de Contenidos: “…GPIO callback functions -- DC motor control in Python -- Some mini-project challenges for the reader -- Summary -- Chapter 4: Communication Interfaces -- UART - serial port -- Raspberry Pi Zero's UART port -- Setting up the Raspberry Pi Zero serial port -- Example 1 - interfacing a carbon dioxide sensor to the Raspberry Pi -- Python code for serial port communication -- I2C communication -- Example 2 - PiGlow -- Installing libraries -- Example -- Example 3 - Sensorian add-on hardware for the Raspberry Pi -- I2C drivers for the lux sensor -- Challenge -- The SPI interface -- Example 4 - writing to external memory chip -- Challenge to the reader -- Summary -- Chapter 5: Data Types and Object-Oriented Programming in Python -- Lists -- Operations that could be performed on a list -- Append element to list: -- Remove element from list: -- Retrieving the index of an element -- Popping an element from the list -- Counting the instances of an element: -- Inserting element at a specific position: -- Challenge to the reader -- Extending a list -- Clearing the elements of a list -- Sorting the elements of a list -- Reverse the order of elements in list -- Create copies of a list -- Accessing list elements -- Accessing a set of elements within a list -- List membership -- Let's build a simple game! …”
Libro electrónico -
487Publicado 2016Tabla de Contenidos: “…Creating a Metasploit Payload -- Determining Your Target Make -- Interactive Probing -- Passive CAN Bus Fingerprinting -- Responsible Exploitation -- Summary -- Chapter 12: Attacking Wireless Systems with SDR -- Wireless Systems and SDR -- Signal Modulation -- Hacking with TPMS -- Eavesdropping with a Radio Receiver -- TPMS Packets -- Activating a Signal -- Tracking a Vehicle -- Event Triggering -- Sending Forged Packets -- Attacking Key Fobs and Immobilizers -- Key Fob Hacks -- Attacking a PKES System -- Immobilizer Cryptography -- Physical Attacks on the Immobilizer System -- Flashback: Hotwiring -- Summary -- Chapter 13: Performance Tuning -- Performance Tuning Trade-Offs -- ECU Tuning -- Chip Tuning -- Flash Tuning -- Stand-Alone Engine Management -- Summary -- Appendix A: Tools of the Trade -- Hardware -- Lower-End CAN Devices -- Higher-End CAN Devices -- Software -- Wireshark -- PyOBD Module -- Linux Tools -- CANiBUS Server -- Kayak -- SavvyCAN -- O2OO Data Logger -- Caring Caribou -- c0f Fingerprinting Tool -- UDSim ECU Simulator -- Octane CAN Bus Sniffer -- AVRDUDESS GUI -- RomRaider ECU Tuner -- Komodo CAN Bus Sniffer -- Vehicle Spy -- Appendix B: Diagnostic Code Modes and PIDs -- Modes Above 0x10 -- Useful PIDs -- Appendix C: Creating Your Own Open Garage -- Filling Out the Character Sheet -- When to Meet -- Affiliations and Private Memberships -- Defining Your Meeting Space -- Contact Information -- Initial Managing Officers -- Equipment -- Abbreviations -- Index -- Footnotes -- Chapter 10: Vehicle-to-Vehicle Communication -- Chapter 12: Attacking Wireless Systems with SDR…”
Libro electrónico -
488Publicado 2023Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Contributors -- Table of Contents -- Preface -- Part 1: Introduction to Arduino and Sensor Data -- Chapter 1: Getting Started with Arduino -- Technical requirements -- Learning about Arduino - The company -- Learning about Arduino - The hardware -- Choosing your board - The Arduino MKR family -- Learning about the Arduino IDE -- Arduino Cloud IDE -- Arduino Desktop IDE -- Learning about the Arduino programming language -- Getting started with Arduino -- General purpose input and output -- Writing the first lines of code - Hello World -- Installing the board -- Blinking the onboard LED -- Summary -- Chapter 2: Leveraging Various Sensors for Data Acquisition -- Technical requirements -- Learning about input and output pins -- UART -- SPI -- I2C -- Discovering sensors -- Motion sensors -- Acoustic sensors -- Environmental sensors -- Vision sensors -- Biometric sensors -- Force -- Rotation -- Summary -- Further reading -- Chapter 3: Prototyping with Shields -- Technical requirements -- What is a shield? …”
Libro electrónico -
489Tabla de Contenidos: “…Dynamic Linearity -- Summary -- References -- Chapter 3: Key Sensor Technology Components: Hardware and Software Overview -- Smart Sensors -- Sensor Systems -- Sensor Platforms -- The Arduino I/O Board -- Shimmer -- Smartphones and Tablets -- Microcontrollers for Smart Sensors -- CPUs -- Registers -- Memory -- Timers and Counters -- Debugging Interfaces -- Common Microcontrollers -- Interfaces and Embedded Communications -- Embedded Digital Interfaces and Protocols -- Serial Peripheral Interface (SPI) -- The I 2 C Bus -- Analog Interfacing -- Sensor Communications -- Standard Wired Interfaces -- RS-232 -- Virtual Serial Ports -- RS-485 -- Universal Serial Bus (USB) -- Short- and Medium-Range Standards for Wireless Communications -- Proprietary Wireless Protocols -- Power Management and Energy Harvesting -- Power Management -- Energy Harvesting -- Microcontroller Software and Debugging -- IDEs -- Development Languages -- Testing Code -- Summary -- References -- Chapter 4: Sensor Network Topolog ies and Design Considerations -- Sensor Network Components -- Sensor Nodes -- Aggregators, Base Stations, and Gateways -- Machine-to-Machine Devices -- Proprietary M2M solutions -- Smartphones -- Traditional M2M Platforms -- Sensor Network Topologies -- Sensor Network Applications -- Personal Area Networks -- Ambient/Pervasive Home Sensor Networks -- Wide Area Networks -- Sensor Network Features and Challenges -- Security -- Key Security Goals -- Attacks on Sensor Networks -- Security Approaches -- Biometrics -- Challenges for Sensor Networks -- Summary -- References -- Chapter 5: Processing and Adding Vibrancy to Sensor Data -- Data Literacy -- The Internet of Things -- Sensors and the Cloud -- Data Quality -- Addressing Data Quality Issues -- Outlier Detection -- Automated Data Cleaning -- Plausibility Testing -- Fusing Sensor Data -- Data Mining…”
Libro electrónico -
490Publicado 2024Tabla de Contenidos: “…Cover -- Copyright -- Contributors -- Table of Contents -- Preface -- Part 1: Understanding IoT Fundamentals -- Chapter 1: IoT Essentials, All You Should Know -- The evolving definition of IoT -- Deployed from fixed to mobility -- Mobility from a local area to a wide area -- Presence from city to barren fields -- Throughput from Mb/s to Gb/s -- Battery life from days to years -- Networking from point-to-point and point-to-multipoint to mesh and star topologies -- Intelligence at edge node -- AI and ML -- Addressable markets -- Residential -- Commercial and business -- Neighborhood and campus -- Cities -- Rural areas -- Industries -- How IoT impacts us -- Living comfort and safety improvement -- Operational efficiency improvement -- Environmental protection improvement -- Industrial productivity improvement -- Summary -- Further reading -- Chapter 2: IoT Network, the Neural System of Things -- IoT networks at home -- Home Wi-Fi -- BLE -- Thread -- IoT networks on campuses and in buildings -- Enterprise Wi-Fi -- Thread mesh -- Private LoRaWAN network -- No one-size-fits-all approach -- IoT networks in cities -- Cellular network -- Public LoRaWAN network -- IoT networks in rural areas -- Private LoRaWAN network -- LEO network -- Summary -- Chapter 3: IoT End Devices, the Neuron Cells of an IoT System -- Device types -- Installing indoors versus outdoors -- Powering via external supply versus batteries -- Connected by wire versus wireless -- The need for edge computing -- Hardware architecture -- MCUs -- Roles -- Key features -- Critical components -- Off-the-shelf MCU -- DIY-friendly MCU -- Peripherals and interfaces -- GPIO -- SPI -- I2C -- UART -- USB -- SDIO -- ADCs -- DACs -- PWM outputs -- JTAG -- Timers -- Real-time clock -- Sensors and actuators -- Sensors -- Actuators -- Common pins on sensors -- Understanding sensor specifications…”
Libro electrónico -
491por Kroah-Hartman, GregTabla de Contenidos: “…DISCONTIGMEM _MANUAL -- SPARSEMEM_ MANUAL -- SECCOMP -- KEXEC -- HOTPLUG_CPU -- PM -- SOFTWARE_ SUSPEND -- ACPI -- CPU_FREQ -- CPU_FREQ_ DEFAULT_GOV_ PERFORMANCE -- CPU_FREQ_ DEFAULT_GOV_ USERSPACE -- CPU_FREQ_ GOV_ PERFORMANCE -- CPU_FREQ_ GOV_ POWERSAVE -- CPU_FREQ_ GOV_ USERSPACE -- CPU_FREQ_ GOV_ ONDEMAND -- CPU_FREQ_ GOV_ CONSERVATIVE -- PCI -- PCCARD -- PCMCIA -- CARDBUS -- HOTPLUG_PCI -- NET -- UNIX -- INET -- IP_ADVANCED_ ROUTER -- NETFILTER -- NET_SCHED -- IRDA -- IRLAN -- IRNET -- IRCOMM -- IRDA_ULTRA -- BT -- IEEE80211 -- MTD -- PARPORT -- PNP -- ISAPNP -- PNPBIOS -- IDE -- BLK_DEV_IDE -- BLK_DEV_ IDEDISK -- BLK_DEV_ IDECD -- BLK_DEV_ IDEFLOPPY -- SCSI -- BLK_DEV_SD -- CHR_DEV_ST -- BLK_DEV_SR -- CHR_DEV_SG -- CHR_DEV_SCH -- SCSI_MULTI_ LUN -- SCSI_SATA -- MD -- BLK_DEV_MD -- BLK_DEV_DM -- IEEE1394 -- I2O -- NETDEVICES -- NET_ETHERNET -- NET_RADIO -- PPP -- PPPOE -- ISDN -- PHONE -- INPUT -- VT -- VT_CONSOLE -- SERIAL_8250 -- AGP -- DRM -- I2C -- SPI -- HWMON -- VIDEO_DEV -- DVB -- FB -- VGA_CONSOLE -- LOGO -- SOUND -- SND -- SND_USB_ AUDIO -- USB -- USB_EHCI_HCD -- USB_OHCI_HCD -- USB_UHCI_HCD -- USB_STORAGE -- USB_SERIAL -- USB_GADGET -- MMC -- INFINIBAND -- EDAC -- EXT2_FS -- EXT3_FS -- REISERFS_FS -- JFS_FS -- XFS_FS -- OCFS2_FS -- INOTIFY -- QUOTA -- AUTOFS_FS -- FUSE_FS -- SMB_FS -- CIFS -- PROFILING -- OPROFILE -- KPROBES -- PRINTK_TIME -- MAGIC_SYSRQ -- DEBUG_KERNEL -- DEBUG_FS -- SECURITY -- SECURITY_ SELINUX -- IV -- Helpful Utilities -- patch and diff -- New Kernel Versions -- Managing Your Patches with quilt -- git -- ketchup -- Bibliography -- Books -- General Linux Books -- Linux Kernel Books -- Tool Locations -- Index…”
Publicado 2007
Libro electrónico -
492Publicado 2021Tabla de Contenidos: “…Writing tests -- 3 Testing techniques -- 3.1 Organizing test suites -- 3.1.1 Breaking down tests -- 3.1.2 Parallelism -- 3.1.3 Global hooks -- 3.1.4 Atomicity -- 3.2 Writing good assertions -- 3.2.1 Assertions and error handling -- 3.2.2 Loose assertions -- 3.2.3 Using custom matchers -- 3.2.4 Circular assertions -- 3.3 Test doubles: Mocks, stubs, and spies -- 3.3.1 Mocking imports -- 3.4 Choosing what to test -- 3.4.1 Don't test third-party software -- 3.4.2 To mock, or not to mock: That's the question -- 3.4.3 When in doubt, choose integration tests -- 3.5 Code coverage -- 3.5.1 Automated coverage reports -- 3.5.2 Coverage types -- 3.5.3 What coverage is good for and what it isn't -- Summary -- 4 Testing backend applications -- 4.1 Structuring a testing environment -- 4.1.1 End-to-end testing -- 4.1.2 Integration testing -- 4.1.3 Unit testing -- 4.2 Testing HTTP endpoints -- 4.2.1 Testing middleware…”
Libro electrónico -
493Publicado 2024Tabla de Contenidos: “…-- Knowledge of TQM Tools -- Tools of TQM -- Check Sheets -- Scatter Diagrams -- Cause-and-Effect Diagrams -- Pareto Charts -- Flowcharts -- Histograms -- Statistical Process Control (SPC) -- The Role of Inspection -- When and Where to Inspect -- OM in Action: Inspecting the Boeing 787 -- Source Inspection -- Service Industry Inspection -- OM in Action: Safe Patients, Smart Hospitals -- Inspection of Attributes versus Variables -- TQM in Services -- OM in Action: Richey International's Spies -- Summary -- Key Terms -- Ethical Dilemma -- Discussion Questions -- Solved Problems -- Problems -- Case Studies…”
Libro electrónico -
494Publicado 2023Tabla de Contenidos: “…-- Knowledge of TQM Tools -- Tools of TQM -- Check Sheets -- Scatter Diagrams -- Cause-and-Effect Diagrams -- Pareto Charts -- Flowcharts -- Histograms -- Statistical Process Control (SPC) -- The Role of Inspection -- When and Where to Inspect -- OM in Action: Inspecting the Boeing 787 -- Source Inspection -- Service Industry Inspection -- OM in Action: Safe Patients, Smart Hospitals -- Inspection of Attributes versus Variables -- TQM in Services -- OM in Action: Richey International's Spies -- Summary -- Key Terms -- Ethical Dilemma -- Discussion Questions -- Solved Problems -- Problems -- Case Studies…”
Libro electrónico -
495Publicado 2017Tabla de Contenidos: “…-- Service-Oriented Architectures -- 4-Tiers and microservices -- Deploying microservices -- Microservices with Seneca -- Serverless applications -- AWS Lambda -- Scaling with Claudia and API Gateway -- Installing claudia and deploying a service -- Containerized microservices -- Getting started with Docker -- Creating a Dockerfile -- Running containers -- Orchestrating Containers with Kubernetes -- Creating a basic Kubernetes cluster -- Declaring Pod deployments -- Summary -- Chapter 10: Testing Your Application -- Why testing is important -- Unit tests -- Functional tests -- Integration tests -- Native Node testing and debugging tools -- Writing to the console -- Formatting console output -- The util.format(format, [arg, arg...]) method -- The util.inspect(object, [options]) method -- The Node debugger -- The assert module -- Sandboxing -- Distinguishing between local scope and execution context -- Using compiled contexts -- Testing with Mocha, Chai, and Sinon -- Mocha -- Chai -- Sinon -- Spies…”
Libro electrónico -
496Publicado 2012Tabla de Contenidos: “…Cover -- Contents -- Introduction: Homeland Security: A Concern and a Role for Everyone -- Part 1 How We Got Here from There: The Emergence of Contemporary Homeland Security -- Chapter 1 Homeland Security: The American Tradition -- Chapter Overview -- Chapter Learning Objectives -- A Colonial Legacy: Securing Communities and Coastlines -- The Young Republic: Dangers from Within -- The New Great Power Faces Foreign Threats -- World War I: From Sabotage to Pandemics -- World War II: Safeguarding Freedom's Arsenal -- The Cold War: Foreign Spies, Domestic Radicals, and Disaster Response -- The Threat of Shadow War -- Out of the Cold: Emerging Threats to America's Homeland -- Chapter Summary -- Chapter Quiz -- Notes -- Chapter 2 The Road to 9/11: Contemporary Terrorism and the Meaning of the September 11 Attacks -- Chapter Overview -- Chapter Learning Objectives -- Terrorist Trends Anticipating 9/11 -- The Emergence of al-Qaida -- A Day That Changed the World -- Lessons for Disaster Preparedness and Response -- New Fears: Weapons of Mass Destruction and Disruption -- Chapter Summary -- Chapter Quiz -- Notes -- Chapter 3 The Birth of Contemporary Homeland Security: The National Response to 9/11 and Its Aftermath -- Chapter Overview -- Chapter Learning Objectives -- The Response to Contemporary Terrorism -- International Cooperation -- Defensive Efforts -- Katrina and What Followed -- Back to the Border -- Homeland Security's Evolving Enterprise -- Twilight of the Long War? …”
Libro electrónico -
497
-
498Publicado 2017Tabla de Contenidos: “…Other components and peripherals -- Memory -- Timers and watchdogs -- Communication interfaces: I2C, UART, and SPI -- Debug -- References -- 5 Power management -- Introduction -- ACPI Power States -- ACPI Global Power States -- ACPI Sleep States -- ACPI Device Power States -- Power Management in Sensors, Smartphones, and Tablets -- Android Wakelock Architecture -- Windows Connected Standby -- Benefits and value -- What does connected standby do? …”
Libro electrónico -
499Publicado 2023Tabla de Contenidos: “…Drive-by downloads -- Stealing passwords -- Exploiting Maintenance Difficulties -- Advanced Attacks -- Opportunistic attacks -- Targeted attacks -- Blended (opportunistic and targeted) attacks -- Some Technical Attack Techniques -- Rootkits -- Brute-force attacks -- Injection attacks -- Cross-site scripting -- SQL injection -- Session hijacking -- Malformed URL attacks -- Buffer overflow attacks -- Chapter 3 The Bad Guys You Must Defend Against -- Bad Guys and Good Guys Are Relative Terms -- Bad Guys Up to No Good -- Script kiddies -- Kids who are not kiddies -- Terrorists and other rogue groups -- Nations and states -- Corporate spies -- Criminals -- Hacktivists -- Terrorists -- Rogue insiders -- Cyberattackers and Their Colored Hats -- How Cybercriminals Monetize Their Actions -- Direct financial fraud -- Indirect financial fraud -- Profiting off illegal trading of securities -- Stealing credit card, debit card, and other payment-related information -- Stealing goods -- Stealing data -- Ransomware -- Cryptominers -- Not All Dangers Come From Attackers: Dealing with Nonmalicious Threats -- Human error -- Humans: The Achilles' heel of cybersecurity -- Social engineering -- External disasters -- Natural disasters -- Pandemics -- Environmental problems caused by humans -- Cyberwarriors and cyberspies -- The impotent Fair Credit Reporting Act -- Expunged records are no longer really expunged -- Social Security numbers -- Social media platforms -- Google's all-knowing computers -- Mobile device location tracking -- Defending against These Attackers -- 2 Personal Cybersecurity -- Chapter 1 Evaluating Your Current Cybersecurity Posture -- Don't be Achilles: Identifying Ways You May Be Less than Secure -- Your home computer(s) -- Your mobile devices -- Your Internet of Things (IoT) devices -- Your networking equipment -- Your work environment…”
Libro electrónico -
500Publicado 2017Tabla de Contenidos: “…. -- Identifying buses and interfaces -- UART identification -- SPI and I2C identification -- JTAG identification -- There's more... -- Serial interfacing for embedded devices -- Getting ready -- How to do it... -- See also -- NAND glitching -- Getting ready -- How to do it... -- See also -- JTAG debugging and exploitation -- Getting ready -- How to do it... -- See also -- Chapter 7: Radio Hacking -- Introduction -- Getting familiar with SDR -- Key terminologies in radio -- Hands-on with SDR tools -- Getting ready -- How to do it... -- Analyzing FM -- RTL-SDR for GSM analysis -- Working with GNU Radio -- There's more... -- Understanding and exploiting ZigBee -- Getting ready -- How to do it... -- There's more... -- Gaining insight into Z-Wave -- How to do it... -- Understanding and exploiting BLE -- Getting ready -- How to do it... -- There's more... -- Chapter 8: Firmware Security Best Practices -- Introduction -- Preventing memory-corruption vulnerabilities -- Getting ready -- How to do it... -- See also -- Preventing injection attacks -- How to do it... -- See also -- Securing firmware updates -- How to do it... -- Securing sensitive information -- How to do it... -- See also -- Hardening embedded frameworks -- Getting ready -- How to do it... -- Securing third-party code and components -- Getting ready -- How to do it... -- Chapter 9: Mobile Security Best Practices -- Introduction -- Storing data securely -- Getting ready -- How to do it... -- See also -- Implementing authentication controls…”
Libro electrónico