Mostrando 1,941 - 1,960 Resultados de 2,748 Para Buscar '"Terminator"', tiempo de consulta: 0.12s Limitar resultados
  1. 1941
    Publicado 2024
    Tabla de Contenidos: “…. -- GPT-powered Kali Linux terminals -- Getting ready -- How to do it... -- How it works... -- There's more... -- Chapter 7: Threat Monitoring and Detection -- Technical requirements -- Threat Intelligence Analysis -- Getting ready -- How to do it... -- How it works... -- There's more... -- Real-Time Log Analysis -- Getting ready -- How to do it... -- How it works... -- There's more... -- Detecting APTs using ChatGPT for Windows Systems -- Getting ready -- How to do it... -- How it works... -- There's more... -- Building Custom Threat Detection Rules -- Getting ready -- How to do it... -- How it works... -- There's more... -- Network Traffic Analysis and Anomaly Detection with PCAP Analyzer -- Getting ready -- How to do it... -- How it works... -- There's more... -- Chapter 8: Incident Response -- Technical requirements -- ChatGPT-assisted incident analysis and triage -- Getting ready -- How to do it... -- How it works... -- There's more... -- Generating incident response playbooks…”
    Libro electrónico
  2. 1942
    por Institute of Medicine (U.S.).
    Publicado 1994
    Tabla de Contenidos: “…Military and the Herbicide Program in Vietnam -- MILITARY AND DEMOGRAPHIC CHARACTERISTICS OF VIETNAM VETERANS -- Estimates of the Number of Military Personnel Serving in Vietnam -- Federal Estimates -- Other Survey Estimates -- Military and Demographic Characteristics -- Studies of Women Veterans -- THE MILITARY USE OF HERBICIDES IN VIETNAM -- Operation Ranch Hand -- Herbicide Formulations -- Military Herbicides -- Level of Toxic Contaminants -- Termination of the Program -- Disposal of Surplus Herbicides -- Ground Spraying of Herbicides -- The HERBS and Services HERBS Tapes -- Geographical Distribution of Herbicide Sprays -- SUMMARY -- REFERENCES -- 4 Toxicology -- OVERVIEW -- Chemistry -- Exposure and Metabolism -- Carcinogenicity: TCDD -- Mechanism of Action -- Carcinogenicity: Herbicides -- Mechanism of Action -- Immunotoxicity: TCDD -- Mechanism of Action -- Immunotoxicity: Herbicides -- Reproductive and Developmental Toxicity: TCDD -- Mechanism of Action -- Reproductive and Developmental Toxicity: Herbicides -- Other Toxicity: TCDD -- Other Toxicity: Herbicides -- TOXICITY PROFILE OF TETRACHLORODIBENZO-P-DIOXIN -- Introduction -- Exposure and Pharmacokinetics -- Bioavailability Following Various Routes of Exposure -- Distribution -- Metabolism -- Excretion -- Mechanism of Action -- Introduction -- Ah Receptor -- Non-Ah-Mediated Toxicity -- Health Outcomes in Animal Studies -- Carcinogenicity -- Immunotoxicity -- Hepatotoxicity -- Reproductive and Developmental Toxicity -- Reproductive Toxicity -- Neurotoxicity -- Metabolic Toxicity…”
    Libro electrónico
  3. 1943
    Publicado 2015
    Tabla de Contenidos: “…. -- ...and Craving Success -- The Loneliness Within -- Derailing: Losing Sight of Your True North -- Imposters -- Richard Grasso's Fall from Grace -- Rationalizers -- The Collapse of Mike Baker -- Glory Seekers -- Lance Armstrong's Ruthless Quest for Glory -- Loners -- Richard Fuld Leads Lehman into Bankruptcy -- Shooting Stars -- A Tale of Two Tech Entrepreneurs -- Heroes of Their Own Journeys -- Exercise: Why Leaders Lose Their Way -- Chapter 3: Crucibles -- Daniel Vasella's Long Journey -- Crucibles of Leadership -- Oprah Winfrey: Reframing Her Story at 36 -- Pedro Algorta: Turning Wounds into Pearls -- Taylor Carol: Terminal Cancer Survivor -- Post-Traumatic Growth -- Philip McCrea: Learning from Failure -- Mike Sweeney: Dealing with Personal Illness…”
    Libro electrónico
  4. 1944
    Publicado 2015
    Tabla de Contenidos: “…Security Monitoring -- Policy Whitelisting -- Application Whitelisting -- Common Misperceptions About Industrial Network Security -- Assumptions Made in This Book -- Summary -- Chapter 3 - Industrial Cyber Security History and Trends -- Information in this Chapter -- Importance of Securing Industrial Networks -- The Evolution of the Cyber Threat -- APTs and Weaponized Malware -- Night Dragon -- Stuxnet -- Advanced Persistent Threats and Cyber Warfare -- Still to Come -- Defending Against Modern Cyber Threats -- The Insider -- Hacktivism, Cyber Crime, Cyber Terrorism, and Cyber War -- Summary -- Chapter 4 - Introduction to Industrial Control Systems and Operations -- Information in this Chapter -- System Assets -- Programmable Logic Controller -- Ladder Diagrams -- Sequential Function Charts -- Remote Terminal Unit -- Intelligent Electronic Device -- Human-Machine Interface -- Supervisory Workstations -- Data Historian -- Business Information Consoles and Dashboards -- Other Assets -- System Operations -- Control Loops -- Control Processes -- Feedback Loops -- Production Information Management -- Business Information Management -- Process Management -- Safety Instrumented Systems -- The Smart Grid -- Network Architectures -- Summary -- Chapter 5 - Industrial Network Design and Architecture -- Information in this Chapter -- Introduction to Industrial Networking -- Common Topologies -- Network Segmentation -- Higher Layer Segmentation -- Physical vs. …”
    Libro electrónico
  5. 1945
    Publicado 2019
    Tabla de Contenidos: “…Default Deny -- TCP Wrappers -- Packet Filtering -- Blacklistd(8) -- Public-Key Encryption -- Global Security Settings -- Preparing for Intrusions with mtree(1) -- Monitoring System Security -- Package Security -- If You're Hacked -- 20 SMALL SYSTEM SERVICES -- Secure Shell -- Email -- Network Time -- Name Service Switching -- inetd -- DHCP -- Printing and Print Servers -- TFTP -- Scheduling Tasks -- 21 SYSTEM PERFORMANCE AND MONITORING -- Computer Resources -- Checking the Network -- General Bottleneck Analysis with vmstat(8) -- Disk I/O -- CPU, Memory, and I/O with top(1) -- Following Processes -- Paging and Swapping -- Performance Tuning -- Status Mail -- Logging with syslogd -- Log File Management -- FreeBSD and SNMP -- 22 JAILS -- Jail Basics -- Jail Host Server Setup -- Jail Setup -- Managing Jails -- More Jail Options -- Jailing Ancient FreeBSD -- Last Jail Notes -- 23 THE FRINGE OF FREEBSD -- Terminals -- Managing Cloudy FreeBSD -- Diskless FreeBSD -- Diskless Farm Configuration -- Finalizing Setup -- Storage Encryption -- 24 PROBLEM REPORTS AND PANICS -- Bug Reports -- System Panics -- Recognizing Panics -- Responding to a Panic -- AFTERWORD -- The FreeBSD Community -- Why Do We Do It? …”
    Libro electrónico
  6. 1946
    por Ogden, Bill
    Publicado 2003
    Tabla de Contenidos: “…Operational details -- 1.1 Using Red Hat 9.0 -- 1.1.1 Linux service -- 1.2 64-bit operation -- 1.3 Terminal Solicitor connection from Linux desktop -- 1.4 CD recording under Linux -- 1.5 ThinkPad Docking Station -- 1.6 S/390 identification -- 1.7 Using a second disk in the Ultrabay -- 1.7.1 Disk layout (AD system with two hard disks) -- 1.8 Cloning ThinkPad hard disks -- 1.9 Multiple FLEX-ES instances -- 1.10 Display PSW and registers -- 1.11 Verify CKD disk -- 1.12 Restarting the MVS console -- 1.13 More about x3270 parameters -- 1.14 Booting from the Ultrabay -- Chapter 2. …”
    Libro electrónico
  7. 1947
    por Room, Stewart
    Publicado 2021
    Tabla de Contenidos: “…INTRODUCTION TO EPRIVACY -- Regulating the electronic communications sector -- The relationship between data protection and ePrivacy -- The actors and protected parties -- Confidentiality of communications -- Exceptions to confidentiality -- Consent for storing or accessing information in terminal equipment -- Consent, transparency and the use of cookie notices and consent tools -- Types of cookies -- Cookies, behavioural advertising and real-time bidding -- Cookies and legal risk -- Direct marketing -- The position under PECR -- Postal direct marketing -- Opt-out, as a matter of law -- Financial penalties for direct marketing contraventions -- Processing of traffic data, location data and value added services -- Security and personal data breach notification -- Personal data breaches -- Expanded rules for breach notifications -- Interplay with the breach notification rules in the GDPR…”
    Libro electrónico
  8. 1948
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Acknowledgments -- About the Authors -- About the Technical Editors -- Contents at a Glance -- Contents -- Introduction -- Overview of the CISSP Exam -- The Elements of This Study Guide -- Interactive Online Learning Environment and Test Bank -- Study Guide Exam Objectives -- Objective Map -- How to Contact the Publisher -- Assessment Test -- Answers to Assessment Test -- Chapter 1 Security Governance Through Principles and Policies -- Security 101 -- Understand and Apply Security Concepts -- Confidentiality -- Integrity -- Availability -- DAD, Overprotection, Authenticity, Nonrepudiation, and AAA Services -- Protection Mechanisms -- Security Boundaries -- Evaluate and Apply Security Governance Principles -- Third-Party Governance -- Documentation Review -- Manage the Security Function -- Alignment of Security Function to Business Strategy, Goals, Mission, and Objectives -- Organizational Processes -- Organizational Roles and Responsibilities -- Security Control Frameworks -- Due Diligence and Due Care -- Security Policy, Standards, Procedures, and Guidelines -- Security Policies -- Security Standards, Baselines, and Guidelines -- Security Procedures -- Threat Modeling -- Identifying Threats -- Determining and Diagramming Potential Attacks -- Performing Reduction Analysis -- Prioritization and Response -- Supply Chain Risk Management -- Summary -- Study Essentials -- Written Lab -- Review Questions -- Chapter 2 Personnel Security and Risk Management Concepts -- Personnel Security Policies and Procedures -- Job Descriptions and Responsibilities -- Candidate Screening and Hiring -- Onboarding: Employment Agreements and Policy-Driven Requirements -- Employee Oversight -- Offboarding, Transfers, and Termination Processes -- Vendor, Consultant, and Contractor Agreements and Controls…”
    Libro electrónico
  9. 1949
    Publicado 2012
    Tabla de Contenidos: “…Safdar -- 16.1 Introduction 443 -- 16.2 Cognitive Radio: A Definition 443 -- 16.3 Spectrum Sensing in CRNs 448 -- 16.4 Spectrum Assignment / Medium Access Control in CRNs 452 -- 16.5 Security in Cognitive Radio Networks 461 -- 16.6 Applications of CRNs 468 -- 16.7 Summary 470 -- 17 Antenna Design for Small Devices 473 / Tim Brown -- 17.1 Antenna Fundamentals 474 -- 17.2 Figures of Merit and their Impact on the Propagation Channel 477 -- 17.3 Challenges in Mobile Terminal Antenna Design 484 -- 17.4 Multiple-Antenna Minaturization Techniques 485 -- 17.5 Multiple Antennas with Multiple Bands 489 -- 17.6 Multiple Users and Antenna Effects 491 -- 17.7 Small Cell Antennas 492 -- 17.8 Summary 492 -- 18 Statistical Characterization of Antennas in BANs 495 / Carla Oliveira, Michal Mackowiak and Luis M. …”
    Libro electrónico
  10. 1950
    Publicado 2019
    Tabla de Contenidos: “…Connecting the user interface with networking -- Subscriptions explained -- Terminating subscriptions -- RxJava 2 concepts and subscription management -- Advanced Rx chains example: Flickr search client -- Setting up the Flickr client project -- Overview of the search chain -- Step 1: A simple hardcoded search -- Making it click -- Coffee break -- Implementing the reactive chain -- How switchMap works -- Getting thumbnail information -- Step 1: Expand the list into an observable -- Step 2: Apply operations to each item individually -- Step 3: Collect results -- The complete solution -- Adding a username from another API -- Summary -- Chapter 5. …”
    Libro electrónico
  11. 1951
    Publicado 2020
    Tabla de Contenidos: “…5.3.1 Parser und Parser-Ergebnisse -- 5.3.2 Kombinationsoperatoren -- 5.3.3 Parser für Boolesche Ausdrücke -- 5.4 Domänen-spezifische Sprachen -- 5.4.1 Fallbeispiel Zustandsmaschinen -- 5.5 Zusammenfassung -- 6 Funktoren, Monoide und Monaden -- 6.1 Funktoren -- 6.1.1 Funktor Optional -- 6.1.2 Gesetze und Eigenschaften -- 6.2 Monoide und Reduktion -- 6.2.1 Monoide -- 6.2.2 Reduktion -- 6.2.3 Monoide in Java -- 6.2.4 Reduzierbare Strukturen -- 6.2.5 Anwendungsbeispiele zur Reduktion mit Monoiden -- 6.3 Monaden -- 6.3.1 Monade Optional -- 6.3.2 Monade Parser -- 6.3.3 Gesetze -- 6.3.4 Bedeutung von Monaden -- 6.3.5 MonadPlus: Monade mit monoider Kombination -- 6.4 Zusammenfassung -- 7 Streams -- 7.1 Grundlagen von Streams -- 7.1.1 Ein erstes Beispiel -- 7.1.2 Externe vs. interne Iteration -- 7.1.3 Bedarfsauswertung -- 7.2 Klassen von Streams -- 7.3 Stream-Operationen -- 7.3.1 Erzeuger-Operationen -- 7.3.2 Zwischenoperationen -- 7.3.3 Terminal-Operationen -- 7.4 Collectors -- 7.4.1 Interface Collector -- 7.4.2 Vordefinierte Collectors -- 7.4.3 Downstream Collectors -- 7.4.4 Eine eigene Collector-Implementierung -- 7.5 Anwendungsbeispiele -- 7.5.1 Ergebnisauswertung mit Streams -- 7.5.2 Wortindex zu einem Text -- 7.6 Hinweise -- 7.6.1 Einmal-Iteration -- 7.6.2 Begrenzung von unendlichen Streams -- 7.6.3 Zustandslose und zustandsbehaftete Operationen -- 7.6.4 Reihenfolge von Operationen -- 7.6.5 Kombinationen von Operationen -- 7.7 Interne Implementierung -- 7.7.1 Beispiel -- 7.8 Zusammenfassung -- 8 Parallele Streams -- 8.1 Erzeugen von parallelen Streams -- 8.2 Parallele Ausführung -- 8.2.1 Spliterators -- 8.2.2 Ausführung durch Fork/Join-Pool -- 8.2.3 Konfiguration des Fork/Join-Thread-Pools -- 8.3 Bedingungen bei paralleler Ausführung -- 8.3.1 Parallele Ausführung und Seiteneffekte -- 8.3.2 Parallele Ausführung und zustandsbehaftete Berechnungen…”
    Libro electrónico
  12. 1952
    Publicado 2018
    Tabla de Contenidos: “…-- Theoretical Foundations: Desperately Seeking Ethics In Leadership -- The Moral Manager: Navigating Ethical Leadership -- The Moral Person: Exploring The Character of Business Leaders -- Ethical Leadership In The Age of Corporate Social Responsibility -- 26 Theoretical Issues In Management Ethics -- Major Management Theories -- Major Ethics Theories -- Selected Theoretical Issues In Management Ethics -- 27 The Ethics of Managers and Employees -- Ethical Awareness, Judgment, Motivation, and Action -- Managing Ethical Conduct Through Ethics and Compliance Programs -- Ethical Culture -- 28 Employee Ethics and Rights -- Freedom of Contract: Lochner'S Shadow -- Starting and Terminating The Employment Relationship -- Compensation -- The Nature of Work: Meaningful Work and Workplace Democracy -- Privacy -- Whistleblowing -- 29 Exploitation and Labor -- How Are Laborers Wronged? …”
    Libro electrónico
  13. 1953
    Publicado 2022
    Tabla de Contenidos: “…Structure and Functions of Cells of the Nervous System -- Cells of the Nervous System -- The Nervous System: An Overview -- Neurons -- Supporting Cells -- The Blood-Brain Barrier -- Communication Within a Neuron -- Neural Communication: An Overview -- Electrical Potentials of Axons -- The Membrane Potential -- The Action Potential -- Conduction of the Action Potential -- Communication Between Neurons -- Structure of Synapses -- Release of Neurotransmitters -- Activation of Receptors -- Postsynaptic Potentials -- Effects of Postsynaptic Potentials: Neural Integration -- Termination of Postsynaptic Potentials -- Autoreceptors -- Other Types of Synapses -- Nonsynaptic Chemical Communication -- Chapter 3. …”
    Libro electrónico
  14. 1954
    Publicado 2011
    Tabla de Contenidos: “…Higher Brain Centers for Intelligent Motor Control in Insects -- Introduction -- Learning and Memory in the Central Complex for Approaching Objects -- Experimental Evidence -- The Central Complex Model -- Intelligent Motor Control beyond the Current Model -- An Integrator for the Orientation in Gradients -- Motor Learning -- A Representation of Body Size in the Brain -- Termination of Inappropriate Behavior -- Conclusion -- References -- An Insect-Inspired, Decentralized Memory for Robot Navigation -- Introduction -- The Model -- Results -- Discussion -- References -- Models of Visually Guided Routes in Ants: Embodiment Simplifies Route Acquisition -- Introduction -- Background -- Overview of Our Approach -- Detailed Methods -- Results -- Summary -- References -- Intelligent Visual Systems -- Robust Object Tracking for Resource-Limited Hardware Systems -- Introduction -- Overview of Tracking System -- Dominant Color-Spatial Based Object Representation -- Dominant Color Mode Extraction -- Spatial Layout of the Dominant Color -- Similarity Measure for Matching -- Cross Bin-Ratio Based Color Similarity Measure -- Spatial Similarity Measure -- Swarm Intelligence Based Searching Method -- Annealed Particle Swarm Optimization -- Integral Image of Model Parameters -- Experimental Results -- Different Object Representations -- Different Similarity Measure -- Different Searching Methods -- Conclusion -- References -- Adaptive Rank Transform for Stereo Matching -- Introduction -- Adaptive Rank Transform -- The Motivation Behind Adaptive Rank Transform -- Adaptive Rank Window -- New Transform Rules -- Comparison between Adaptive and Original Rank Transform -- Obtaining the Match Window from Multiple Rank Windows -- Experiments -- Conclusion -- References -- Real Time Vision Based Multi-person Tracking for Mobile Robotics and Intelligent Vehicles -- Introduction…”
    Libro electrónico
  15. 1955
    Publicado 1990
    Tabla de Contenidos: “…-- CLOSING PANDORA'S BOX -- References -- Chemical Time Bombs: Environmental Causes of Neurodegenerative Diseases -- ESTABLISHING CRITERIA FOR CHEMICAL NEUROTOXICITY -- CLASSIFYING CHEMICALLY INDUCED HUMAN NEUROTOXIC DISORDERS -- THE MATURE NERVOUS SYSTEM AS CHEMICAL TARGET -- DEVELOPING NERVOUS SYSTEM AS CHEMICAL TARGET -- Scientific Basis for Neurobehavioral Toxicity Testing -- CONCLUSION -- Reference -- PART IV BEHAVIORAL ASPECTS OF NEUROTOXICITY: REGIONAL ISSUES -- Neurobehavioral Toxicity Testing in China -- INTRODUCTION -- OVERVIEW OF RESEARCH ACTIVITIES -- Carbon Disulfide -- Lead -- Simulated Video Display Terminal (VDT) Operation -- Static Magnetic Fields (SMF) -- NATIONAL AND INTERNATIONAL COOPERATION -- Mood States -- Performance Tests -- EXPECTED DIRECTIONS: BARRIERS AND RECOMMENDATIONS -- Developments in the Near Future -- Developing and Validating Test Methods -- Generating New Measuring Instruments -- Building a Computerized Evaluation System -- Limitations and Barriers -- Variation of Test Sensitivity from Study to Study -- Bias of Learning Effect -- Controlling Confounding Factors -- Interpreting Results Obtained from Neurobehavioral Tests -- Comments and Recommendations -- Training and Education -- Exploring the Possibility of Combining Quantitative Biochemical Markers and Neurobehavioral Testing -- Development, Validation, and Characterization of Methods -- SUMMARY -- Status of Research and Development of Neurobehavioral Toxicity Tests in China -- Expected Directions in the Development of Behavioral Tests of Neurotoxicity -- Problems and Recommendations -- References…”
    Libro electrónico
  16. 1956
    por Conesa Ferrer, Juan Antonio
    Publicado 2002
    Tabla de Contenidos: “…Concepto de velocidad terminal de partícula -- 1.9. Regímenes de fluidizacion -- 2. …”
    Libro electrónico
  17. 1957
    por Gutiérrez Carmona, Jairo
    Publicado 2022
    Tabla de Contenidos: “…Tasa de descuento o costo de capital - wacc -- 11.2.4. Valor terminal - vt -- 11.3. Cálculo del valor de mercado de la empresa -- CAPÍTULO 12 -- EVALUACIÓNDE PROYECTOS -- 12.1. …”
    Libro electrónico
  18. 1958
    Publicado 2018
    Tabla de Contenidos: “…-- The Dark Triad -- Other Personality Attributes Relevant to OB -- Core Self-Evaluation (CSE) -- Self-Monitoring -- Proactive Personality -- Personality and Situations -- Situation Strength Theory -- Trait Activation Theory -- Values -- Watch It-Honest Tea: Ethics-Company Mission and Values -- Terminal versus Instrumental Values -- Generational Values -- Linking an Individual's Personality and Values to the Workplace…”
    Libro electrónico
  19. 1959
    Publicado 2004
    Tabla de Contenidos: “…Hardening a Linux installation -- 3.1 Linux system logging -- 3.1.1 Configuring syslogd -- 3.1.2 Using a central log server -- 3.2 Pluggable Authentication Modules -- 3.2.1 PAM configuration files -- 3.2.2 Limiting superuser login to secure terminals -- 3.2.3 Restricting user login -- 3.2.4 Mandatory access control -- 3.2.5 Linux Security Module (LSM) -- 3.3 Delegating superuser authority with sudo -- 3.3.1 Configuring sudo -- 3.3.2 Using the sudo command -- 3.3.3 Command logging with sudo…”
    Libro electrónico
  20. 1960
    Publicado 2022
    Tabla de Contenidos: “…Using the Mobile APP Bluetooth Terminal -- Changing the PIN on the HC-06 -- Using AT Commands -- Using Tera Term to Change the PIN -- Using PuTTY to Program the HC-06 -- Programming the HC-06 with AT Command from the PIC Micro -- Analysis of Listing 8-2 -- The HC-SR501 PIR Motion Sensor -- Analysis of Listing 8-3 -- Summary -- Chapter 9: Communication -- Getting the PIC to Communicate with Other Devices -- The SPI Mode -- The Buffer Full (BF) Flag in the SSPSTAT Register -- Synchronizing the Sequence -- SSPSTAT Register -- The SSPCON1 Register -- Using the SPI to Read from the TC72 -- Operating Modes for the TC72 -- The Registers of the TC72 -- The Algorithm for Using the TC72 -- Displaying the Temperature Reading -- Binary Numbers -- Adding Binary Numbers -- Analysis of Listing 9-1 -- Reading the Temperature from the TC72 -- Examples of the 2's Complement Process -- Using the Sprintf Function -- Analysis of Listing 9-2 -- Comparing the Two Approaches -- Using the PIC18f4525 as the Slave -- Analysis of Listing 9-3 -- Analysis of Listing 9-4 -- Summary -- Chapter 10: Using the I2C Protocol -- I2C Communication Protocol -- EEPROM -- 24LC256 EEPROM -- Writing to the EEPROM -- Reading from the EEPROM -- TC74 Temperature Sensor -- Reading the Temperature -- Using I2C with 24LC256 and TC74 -- Analysis of Listing 10-1 -- That Little Thought -- Summary -- Chapter 11: Using the UART -- UART at a Glance -- Interrupts and How They Work -- Analysis of Listing 11-1 -- The Baud Rate -- Using Tera Term -- Using Handshaking -- Analysis of Listing 11-2 -- Two PICs Communicate via the UART -- Analysis of Listing 11-3 -- Summary -- Chapter 12: Real-Time Clock and Interrupts -- The RTC Program -- Analysis of Listing 12-1 -- The DS1307 RTC Module -- Setting Up and Reading from the DS1307 -- The I2C Protocol -- Writing to the Slave -- The Start Bit…”
    Libro electrónico