Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 31
- Espionaje 27
- Espías 24
- Computer security 23
- Programming 21
- Novela inglesa 20
- Security measures 20
- Development 19
- Guerra mundial, 1939-1945 19
- History 19
- Application software 17
- Computer networks 16
- Embedded computer systems 13
- Engineering & Applied Sciences 13
- Arduino (Programmable controller) 12
- Computer programming 12
- JavaScript (Computer program language) 12
- Literatura alemana 12
- Servicios de inteligencia 12
- Servicios secretos 12
- Computer input-output equipment 11
- Raspberry Pi (Computer) 11
- Computer software 10
- Internet 10
- Política y gobierno 10
- Python (Computer program language) 10
- Design and construction 9
- Programmable controllers 9
- Relaciones 9
- Computer Science 8
-
501CybersecurityCybersecurity For DummiesPublicado 2022Tabla de Contenidos: “…Malvertising -- Drive-by downloads -- Stealing passwords -- Exploiting Maintenance Difficulties -- Advanced Attacks -- Opportunistic attacks -- Targeted attacks -- Blended (opportunistic and targeted) attacks -- Some Technical Attack Techniques -- Rootkits -- Brute-force attacks -- Injection attacks -- Cross-site scripting -- SQL injection -- Session hijacking -- Malformed URL attacks -- Buffer overflow attacks -- Chapter 3 The Bad Guys You Must Defend Against -- Bad Guys and Good Guys Are Relative Terms -- Bad Guys Up to No Good -- Script kiddies -- Kids who are not kiddies -- Terrorists and other rogue groups -- Nations and states -- Corporate spies -- Criminals -- Hacktivists -- Terrorists -- Rogue insiders -- Cyberattackers and Their Colored Hats -- How Cybercriminals Monetize Their Actions -- Direct financial fraud -- Indirect financial fraud -- Profiting off illegal trading of securities -- Stealing credit card, debit card, and other payment-related information -- Stealing goods -- Stealing data -- Ransomware -- Cryptominers -- Not All Dangers Come From Attackers: Dealing with Nonmalicious Threats -- Human error -- Humans: The Achilles' heel of cybersecurity -- Social engineering -- External disasters -- Natural disasters -- Pandemics -- Man-made environmental problems -- Cyberwarriors and cyberspies -- The impotent Fair Credit Reporting Act -- Expunged records are no longer really expunged -- Social Security numbers -- Social media platforms -- Google's all-knowing computers -- Mobile device location tracking -- Defending against These Attackers -- Part 2 Improving Your Own Personal Security -- Chapter 4 Evaluating Your Current Cybersecurity Posture -- Don't be Achilles: Identifying Ways You May Be Less than Secure -- Your home computer(s) -- Your mobile devices -- Your Internet of Things (IoT) devices -- Your networking equipment…”
Libro electrónico -
502
-
503
-
504
-
505por Organisation for Economic Co-operation and Development.“…This Guidance on Developing Safety Performance Indicators (“Guidance on SPI”) was prepared to assist enterprises that wish to implement and/or review Safety Performance Indicator Programmes. …”
Publicado 2014
Libro electrónico -
506
-
507Publicado 2018Tabla de Contenidos: “…-- Installing the global module -- Creating a React application -- Running the Create React App script -- Mocha and Chai -- Jest -- Mocha -- Chai -- Sinon -- Enzyme -- Ejecting the React app -- Configuring to use Mocha and Chai -- A quick kata to check our test setup -- The requirements -- The execution -- Starting the kata -- Summary -- Chapter 4: What to Know Before Getting Started -- Untestable code -- Dependency Injection -- Static -- Singleton -- Global state -- Abstracting third-party software -- Test doubles -- Mocking frameworks -- The SOLID principles -- The Single Responsibility Principle -- The Open/Closed principle -- The Liskov Substitution principle -- The Interface Segregation principle -- The Dependency Inversion principle -- Timely greeting -- Fragile tests -- False positives and false failures -- Abstract DateTime -- Test double types -- Dummies -- Dummy logger -- Example in C# -- Example in JavaScript -- Stubs -- Example in C# -- Example in JavaScript -- Spies -- Example in C# -- Example in JavaScript -- Mocks -- Example in C# -- Example in JavaScript -- Fakes -- Example in C# -- Example in JavaScript -- N-Tiered example -- Presentation layer -- Moq -- Business layer -- Summary…”
Libro electrónico -
508Publicado 2021Tabla de Contenidos: “…-- How Sensors Measure -- Analog Sensors -- Digital Sensors -- Examples of Sensors -- Summary -- Chapter 9: The Adafruit Microsoft IoT Pack for Raspberry Pi -- Overview -- Components Included -- Environmental Sensor: BME280 -- Color Sensor: TCS34725 -- 8-Channel 10-Bit ADC with SPI Interface: MCP3008 -- Are There Alternatives? …”
Libro electrónico -
509Publicado 2023Tabla de Contenidos: “…. -- How it works... -- See also -- Using spies on an injected service in a unit test -- Getting ready -- How to do it... -- How it works... -- See also -- Mocking child components and directives using the ng-mocks package -- Getting ready -- How to do it... -- How it works... -- See also -- Writing even easier tests with Angular CDK component harnesses -- Getting ready -- How to do it... -- How it works... -- See also -- Unit-testing responses from HTTP calls -- Getting ready -- How to do it... -- How it works... -- See also -- Unit-testing Angular pipes -- Getting ready -- How to do it... -- See also -- Chapters 11: E2E Tests in Angular with Cypress -- Technical requirements -- Writing your first Cypress test -- Getting ready -- How to do it... -- How it works... -- See also -- Validating if a DOM element is visible on the view -- Getting ready -- How to do it... -- How it works... -- See also -- Testing form inputs and submission -- Getting ready -- How to do it... -- How it works... -- See also -- Waiting for XHRs to finish -- Getting ready -- How to do it... -- How it works... -- See also -- Using Cypress bundled packages -- Getting ready -- How to do it... -- How it works... -- See also -- Using Cypress fixtures to provide mock data…”
Libro electrónico -
510Publicado 2018Tabla de Contenidos: “…-- Adding our RGB LED to the REPL -- Controlling our LED from the command-line interface -- Summary -- Questions -- Further reading -- Chapter 4: Bringing in Input with Buttons -- Technical requirements -- Using inputs in robotics projects -- Digital versus analog input -- How to handle analog input with the Raspberry Pi -- Analog GPIO expanders -- Using input devices with digital interfaces -- How Johnny-Five handles input -- The structure of a typical Johnny-Five project -- The beginning - including libraries and creating our board object -- The board ready event handler -- Constructing our component objects -- Input event handlers and output device manipulation -- The Johnny-Five button object -- The button object -- Button events -- Wiring up buttons -- Putting a button on a breadboard -- Using a pull-down resistor -- Adding buttons to our RGB LED project -- Wiring everything up -- Using the power and ground side rails -- Wiring up the buttons -- Button 1 - stop and start rainbow -- Refactoring the rainbow cycle -- Button 2 - next color -- Summary -- Questions -- Further reading -- Chapter 5: Using a Light Sensor to Create a Night-Light -- Technical requirements -- Using an analog sensor with the Pi -- Finding the right sensors for your Pi project -- I2C devices -- SPI -- How to determine if your sensor will work with Johnny-Five -- The ambient light sensor -- Wiring up the sensor -- Writing a program to get readings and print them to the command line -- The Johnny-Five sensor events…”
Libro electrónico -
511Publicado 2020Tabla de Contenidos: “…-- The Three Pillars of Cybersecurity -- Two Approaches to Security -- Physical Security: Locking Your Doors -- Securing User Accounts -- Obfuscating your usernames -- Using passwords wisely -- Generating passwords For Dummies -- Secure the Administrator account -- Managing User Security -- User accounts -- Built-in accounts -- User rights -- Permissions (who gets what) -- Group therapy -- User profiles -- Logon scripts -- Securing the Human Firewall -- Chapter 20 Hardening Your Network -- Firewalls -- The Many Types of Firewalls -- Packet filtering -- Stateful packet inspection (SPI) -- Circuit-level gateway -- Application gateway -- Next-generation firewall -- Virus Protection -- What is a virus? …”
Libro electrónico -
512
-
513
-
514
-
515
-
516
-
517
-
518
-
519Publicado 2012Libro electrónico
-
520