Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 31
- Espionaje 27
- Espías 24
- Computer security 23
- Programming 21
- Novela inglesa 20
- Security measures 20
- Development 19
- Guerra mundial, 1939-1945 19
- History 19
- Application software 17
- Computer networks 16
- Embedded computer systems 13
- Engineering & Applied Sciences 13
- Arduino (Programmable controller) 12
- Computer programming 12
- JavaScript (Computer program language) 12
- Literatura alemana 12
- Servicios de inteligencia 12
- Servicios secretos 12
- Computer input-output equipment 11
- Raspberry Pi (Computer) 11
- Computer software 10
- Internet 10
- Política y gobierno 10
- Python (Computer program language) 10
- Design and construction 9
- Programmable controllers 9
- Relaciones 9
- Computer Science 8
-
721
-
722Publicado 2018“…Discover how to: •Configure your Arduino IDE and develop your own sketches •Boost performance and speed by writing time-efficient sketches •Optimize power consumption and memory usage •Interface with different types of serial busses, including I2C, 1-Wire, SPI, and TTL Serial •Use Arduino with USB and UART •Incorporate Ethernet, Bluetooth, and DSP •Program Arduino for the Internet •Manage your sketches using One Process •Accomplish more than one task at a time―without multi-threading •Create your own code library and share it with other hobbyists…”
Libro electrónico -
723por Seneviratne, Pradeeka. author“…You'll also see how to work with communication protocols, such as Serial, I2C, and SPI and how to use variables, loops, logic, arrays, math and functions to easily solve problems. …”
Publicado 2019
Libro electrónico -
724Publicado 2021“…You'll learn how to access Arduino I/O such as analog and digital I/O, serial communication, SPI and I2C. The book also covers how to access sensor devices on Arduino Nano 33 BLE Sense, how to interact with other external devices over BLE, and build embedded Artificial Intelligence applications. …”
Libro electrónico -
725Publicado 2020“…Despite its reputation as a language only of spies and hackers, cryptography plays a critical role in our everyday lives. …”
Libro electrónico -
726
-
727Publicado 2022“…What you will learn Enable the jOOQ Code Generator in any combination of Java and Kotlin, Maven and Gradle Generate jOOQ artifacts directly from database schema, or without touching the real database Use jOOQ DSL to write and execute a wide range of queries for different databases Understand jOOQ type-safe queries, CRUD operations, converters, bindings, and mappers Implement advanced SQL concepts such as stored procedures, derived tables, CTEs, window functions, and database views Implement jOOQ multi-tenancy, tuning, jOOQ SPI, logging, and testing Who this book is for This book is for Java developers who write applications that interact with databases via SQL. …”
Libro electrónico -
728Publicado 2012“…Contributors include: Eddy Grootes, Riet Schenkeveld-van der Dussen, Mieke B. Smits-Veldt, Marijke Spies, Judith Pollmann, Bettina Noak, Louis Peter Grijp, Guillaume van Gemert, Jürgen Pieters, Nina Geerdink, Madeleine Kasten, Marco Prandoni, Peter Eversmann, Mieke Bal, Maaike Bleeker, Bennett Carpenter, James A. …”
Libro electrónico -
729Publicado 2014“…Part 1 describes her growing up during the Great Depression and the Second World War, her short-lived sojourn in the Department of External Affairs in Canberra, where she was friends with some of the spies who worked for Moscow, and her academic career over the subsequent six decades, the last three of which were at The Australian National University. …”
Libro electrónico -
730
-
731Publicado 1966Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Biblioteca de la Universidad de Navarra)Libro
-
732Publicado 2019“…Practical tutorials and exercises throughout will reinforce and test your skills as you learn how to: •Cover your tracks by changing your network information and manipulating the rsyslog logging utility •Write a tool to scan for network connections, and connect and listen to wireless networks •Keep your internet activity stealthy using Tor, proxy servers, VPNs, and encrypted email •Write a bash script to scan open ports for potential targets •Use and abuse services like MySQL, Apache web server, and OpenSSH •Build your own hacking tools, such as a remote video spy camera and a password cracker Hacking is complex, and there is no single way in. …”
Libro electrónico -
733Publicado 2023“…Throughout subsequent chapters, you’ll learn how to use a range of programs that use PIC modules such as the SPI, I2C, UART communication modules, the ADC module, the Capture, Compare, and Pulse Width Modulation module, and the RTCC, Real Time Clock and Calendar Module. …”
Libro electrónico -
734Publicado 2021“…., data, intellectual property, privacy); formats and genres (books, databases, maps, newspapers, scrolls, social media); people (archivists, diplomats and spies, readers, secretaries, teachers); practices (censorship, forecasting, learning, surveilling, translating); processes (digitization, quantification, storage and search); systems (bureaucracy, platforms, telecommunications); technologies (algorithms, cameras, computers), and much more. …”
Libro -
735Publicado 2023“…He discusses how the Ottoman wars of conquest gave rise to the imperial rivalry with the Habsburgs, and brings vividly to life the intrigues of sultans, kings, popes, and spies. Ágoston examines the subtler methods of Ottoman conquest, such as dynastic marriages and the incorporation of conquered peoples into the Ottoman administration, and argues that while the Ottoman Empire was shaped by Turkish, Iranian, and Islamic influences, it was also an integral part of Europe and was, in many ways, a European empire.Rich in narrative detail, The Last Muslim Conquest looks at Ottoman military capabilities, frontier management, law, diplomacy, and intelligence, offering new perspectives on the gradual shift in power between the Ottomans and their European rivals and reframing the old story of Ottoman decline." -- Contracubierta…”
Libro electrónico -
736Publicado 2016“…"The first book in CWA Gold Dagger Award-winning British espionage series starring a team of MI5 agents united by one common bond: They've screwed up royally and will do anything to redeem themselves.London, England: Slough House is where the washed-up MI5 spies go to while away what's left of their failed careers. …”
Libro -
737
-
738Publicado 2014“…It also implemented new investigative and assessment procedures, including office spies, to weed out organizational inefficiencies. …”
Libro electrónico -
739Publicado 2012“…Persecutory Type: delusions that the person (or someone to whom the person is close) is being conspired against, cheated, spied upon, followed, poisoned or drugged, maliciously maligned, harassed, or obstructed in the pursuit of long-term goals…”
Vídeo online -
740Publicado 2012“…., a drug of abuse, a medication) or a general medical condition.Persecutory Type: delusions that the person (or someone to whom the person is close) is being conspired against, cheated, spied upon, followed, poisoned or drugged, maliciously maligned, harassed, or obstructed in the pursuit of long-term goals…”
Vídeo online