Mostrando 501 - 520 Resultados de 784 Para Buscar '"Spy"', tiempo de consulta: 0.07s Limitar resultados
  1. 501
    Cybersecurity
    Cybersecurity For Dummies
    Publicado 2022
    Tabla de Contenidos: “…Malvertising -- Drive-by downloads -- Stealing passwords -- Exploiting Maintenance Difficulties -- Advanced Attacks -- Opportunistic attacks -- Targeted attacks -- Blended (opportunistic and targeted) attacks -- Some Technical Attack Techniques -- Rootkits -- Brute-force attacks -- Injection attacks -- Cross-site scripting -- SQL injection -- Session hijacking -- Malformed URL attacks -- Buffer overflow attacks -- Chapter 3 The Bad Guys You Must Defend Against -- Bad Guys and Good Guys Are Relative Terms -- Bad Guys Up to No Good -- Script kiddies -- Kids who are not kiddies -- Terrorists and other rogue groups -- Nations and states -- Corporate spies -- Criminals -- Hacktivists -- Terrorists -- Rogue insiders -- Cyberattackers and Their Colored Hats -- How Cybercriminals Monetize Their Actions -- Direct financial fraud -- Indirect financial fraud -- Profiting off illegal trading of securities -- Stealing credit card, debit card, and other payment-related information -- Stealing goods -- Stealing data -- Ransomware -- Cryptominers -- Not All Dangers Come From Attackers: Dealing with Nonmalicious Threats -- Human error -- Humans: The Achilles' heel of cybersecurity -- Social engineering -- External disasters -- Natural disasters -- Pandemics -- Man-made environmental problems -- Cyberwarriors and cyberspies -- The impotent Fair Credit Reporting Act -- Expunged records are no longer really expunged -- Social Security numbers -- Social media platforms -- Google's all-knowing computers -- Mobile device location tracking -- Defending against These Attackers -- Part 2 Improving Your Own Personal Security -- Chapter 4 Evaluating Your Current Cybersecurity Posture -- Don't be Achilles: Identifying Ways You May Be Less than Secure -- Your home computer(s) -- Your mobile devices -- Your Internet of Things (IoT) devices -- Your networking equipment…”
    Libro electrónico
  2. 502
    por Spies, Gerty
    Publicado 1984
    Libro
  3. 503
    por Solans Vallverdu, Juan
    Publicado 1945
    Libro
  4. 504
  5. 505
    “…This Guidance on Developing Safety Performance Indicators (“Guidance on SPI”) was prepared to assist enterprises that wish to implement and/or review Safety Performance Indicator Programmes. …”
    Libro electrónico
  6. 506
    Capítulo
  7. 507
    Publicado 2018
    Tabla de Contenidos: “…-- Installing the global module -- Creating a React application -- Running the Create React App script -- Mocha and Chai -- Jest -- Mocha -- Chai -- Sinon -- Enzyme -- Ejecting the React app -- Configuring to use Mocha and Chai -- A quick kata to check our test setup -- The requirements -- The execution -- Starting the kata -- Summary -- Chapter 4: What to Know Before Getting Started -- Untestable code -- Dependency Injection -- Static -- Singleton -- Global state -- Abstracting third-party software -- Test doubles -- Mocking frameworks -- The SOLID principles -- The Single Responsibility Principle -- The Open/Closed principle -- The Liskov Substitution principle -- The Interface Segregation principle -- The Dependency Inversion principle -- Timely greeting -- Fragile tests -- False positives and false failures -- Abstract DateTime -- Test double types -- Dummies -- Dummy logger -- Example in C# -- Example in JavaScript -- Stubs -- Example in C# -- Example in JavaScript -- Spies -- Example in C# -- Example in JavaScript -- Mocks -- Example in C# -- Example in JavaScript -- Fakes -- Example in C# -- Example in JavaScript -- N-Tiered example -- Presentation layer -- Moq -- Business layer -- Summary…”
    Libro electrónico
  8. 508
    Publicado 2021
    Tabla de Contenidos: “…-- How Sensors Measure -- Analog Sensors -- Digital Sensors -- Examples of Sensors -- Summary -- Chapter 9: The Adafruit Microsoft IoT Pack for Raspberry Pi -- Overview -- Components Included -- Environmental Sensor: BME280 -- Color Sensor: TCS34725 -- 8-Channel 10-Bit ADC with SPI Interface: MCP3008 -- Are There Alternatives? …”
    Libro electrónico
  9. 509
    Publicado 2023
    Tabla de Contenidos: “…. -- How it works... -- See also -- Using spies on an injected service in a unit test -- Getting ready -- How to do it... -- How it works... -- See also -- Mocking child components and directives using the ng-mocks package -- Getting ready -- How to do it... -- How it works... -- See also -- Writing even easier tests with Angular CDK component harnesses -- Getting ready -- How to do it... -- How it works... -- See also -- Unit-testing responses from HTTP calls -- Getting ready -- How to do it... -- How it works... -- See also -- Unit-testing Angular pipes -- Getting ready -- How to do it... -- See also -- Chapters 11: E2E Tests in Angular with Cypress -- Technical requirements -- Writing your first Cypress test -- Getting ready -- How to do it... -- How it works... -- See also -- Validating if a DOM element is visible on the view -- Getting ready -- How to do it... -- How it works... -- See also -- Testing form inputs and submission -- Getting ready -- How to do it... -- How it works... -- See also -- Waiting for XHRs to finish -- Getting ready -- How to do it... -- How it works... -- See also -- Using Cypress bundled packages -- Getting ready -- How to do it... -- How it works... -- See also -- Using Cypress fixtures to provide mock data…”
    Libro electrónico
  10. 510
    Publicado 2018
    Tabla de Contenidos: “…-- Adding our RGB LED to the REPL -- Controlling our LED from the command-line interface -- Summary -- Questions -- Further reading -- Chapter 4: Bringing in Input with Buttons -- Technical requirements -- Using inputs in robotics projects -- Digital versus analog input -- How to handle analog input with the Raspberry Pi -- Analog GPIO expanders -- Using input devices with digital interfaces -- How Johnny-Five handles input -- The structure of a typical Johnny-Five project -- The beginning - including libraries and creating our board object -- The board ready event handler -- Constructing our component objects -- Input event handlers and output device manipulation -- The Johnny-Five button object -- The button object -- Button events -- Wiring up buttons -- Putting a button on a breadboard -- Using a pull-down resistor -- Adding buttons to our RGB LED project -- Wiring everything up -- Using the power and ground side rails -- Wiring up the buttons -- Button 1 - stop and start rainbow -- Refactoring the rainbow cycle -- Button 2 - next color -- Summary -- Questions -- Further reading -- Chapter 5: Using a Light Sensor to Create a Night-Light -- Technical requirements -- Using an analog sensor with the Pi -- Finding the right sensors for your Pi project -- I2C devices -- SPI -- How to determine if your sensor will work with Johnny-Five -- The ambient light sensor -- Wiring up the sensor -- Writing a program to get readings and print them to the command line -- The Johnny-Five sensor events…”
    Libro electrónico
  11. 511
    Publicado 2020
    Tabla de Contenidos: “…-- The Three Pillars of Cybersecurity -- Two Approaches to Security -- Physical Security: Locking Your Doors -- Securing User Accounts -- Obfuscating your usernames -- Using passwords wisely -- Generating passwords For Dummies -- Secure the Administrator account -- Managing User Security -- User accounts -- Built-in accounts -- User rights -- Permissions (who gets what) -- Group therapy -- User profiles -- Logon scripts -- Securing the Human Firewall -- Chapter 20 Hardening Your Network -- Firewalls -- The Many Types of Firewalls -- Packet filtering -- Stateful packet inspection (SPI) -- Circuit-level gateway -- Application gateway -- Next-generation firewall -- Virus Protection -- What is a virus? …”
    Libro electrónico
  12. 512
  13. 513
    por LOZANO, Benigno
    Publicado 1999
    Libro
  14. 514
    por Walsh, James J.
    Publicado 1900
    Libro
  15. 515
    por Valera, Fernando, 1899-1982
    Publicado 1950
    Libro
  16. 516
    Publicado 1962
    Libro
  17. 517
    por Sherman, Dan, 1950-
    Publicado 1982
    Libro
  18. 518
    por Kirchner, Timotheus
    Publicado 1990
    Microfilme
  19. 519
    Publicado 2012
    Libro electrónico
  20. 520
    por Hutton, J. Bernard
    Publicado 1965
    Libro