Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer networks 101
- Engineering & Applied Sciences 91
- Electrical & Computer Engineering 58
- Design and construction 57
- Security measures 56
- Application software 55
- Programming 53
- Development 52
- Telecommunications 48
- Examinations 47
- Certification 45
- Operating systems (Computers) 39
- Electronic data processing personnel 38
- Computer security 32
- Computer Science 31
- Management 29
- Wireless communication systems 28
- Robots 27
- Data processing 26
- Microcomputers 26
- Microsoft Windows (Computer file) 26
- Technology: general issues 26
- History of engineering & technology 25
- Raspberry Pi (Computer) 23
- Electronics 22
- Linux 21
- Maintenance and repair 21
- Arduino (Programmable controller) 20
- Computing Technology Industry Association 20
- mechanical properties 19
-
1401Publicado 2022“…What you will learn Exploit networks using wired/wireless networks, cloud infrastructure, and web services Learn embedded peripheral device, radio frequency, and IoT hacking techniques Master the art of bypassing traditional antivirus and endpoint detection and response (EDR) tools Test for data system exploits using Metasploit, PowerShell Empire, and CrackMapExec Perform cloud security vulnerability assessment and exploitation of security misconfiguration Take your physical security testing to the next level with RFID/Bluetooth hacking and learn how to clone identity cards Who this book is for This fourth edition is for security analysts, pentesters, ethical hackers, red team operators, and security consultants wanting to learn and optimize infrastructure/application/cloud security using advanced Kali Linux features. …”
Libro electrónico -
1402Publicado 2018“…Sie erfahren, wie man Peripheriegeräte wie das Kameramodul anschließt und den 1-Wire- sowie den SPI-Bus zur Datenkommunikation nutzt. …”
Libro electrónico -
1403Publicado 2018“…." -- KEVIN KELLY , creator of Cool Tools and Wired Senior Maverick "Gareth has essentially created a magic book for makers." -- DONALD BELL , Maker Project Labs " Tips and Tales from the Workshop is sure to inspire anyone to get making with newfound ease and satisfaction. …”
Libro electrónico -
1404Publicado 2018“…You will explore network hacking, where you will see how to test the security of wired and wireless networks. You'll also learn how to crack the password for any Wi-Fi network (whether it uses WEP, WPA, or WPA2) and spy on the connected devices. …”
Libro electrónico -
1405Publicado 2019“…Omar has been quoted by numerous media outlets, such as TheRegister, Wired, ZDNet, ThreatPost, TechCrunch, Fortune Magazine, Ars Technica, and more. …”
-
1406Publicado 2017“…Coverage includes Planning and building networks Building a network map with standard software tools Exploring, installing, and configuring network hardware Preparing and configuring a switch Connecting and organizing cabling Connecting computers, smartphones, tablets, and servers to your network Setting up basic security Installing Windows Server step by step, including Active Directory, DNS, and virtualization Configuring Windows clients to access a Windows Server domain Providing reliable and efficient backup/recovery services Configuring network services for macOS, iOS, Android, Linux, and FreeBSD operating systems Analyzing network traffic with WireShark Monitoring networks with logs, baselines, and captures Troubleshooting common problems Learning key concepts for success with the CompTIA Network+ exam’s tough performance-based questions About the Instructor David L. …”
-
1407Publicado 2020“…This unique product gives you the knowledge and skills you need to configure, troubleshoot, secure, and automate enterprise wired and wireless networks. It combines video instruction with live CLI configuration and troubleshooting demonstrations and provides you with hands-on lab activities using the Cisco Modeling Labs, enabling you to learn both the concepts and the hands-on application.The videos and exercises contained in this product provide more than 20 hours of instruction. …”
-
1408Publicado 2013“…Review the new security challenges associated with borderless networks, ubiquitous mobility, and consumerized IT Understand the building blocks of an Identity Services Engine (ISE) solution Design an ISE-Enabled network, plan/distribute ISE functions, and prepare for rollout Build context-aware security policies Configure device profiling, endpoint posture assessments, and guest services Implement secure guest lifecycle management, from WebAuth to sponsored guest access Configure ISE, network access devices, and supplicants, step-by-step Walk through a phased deployment that ensures zero downtime Apply best practices to avoid the pitfalls of BYOD secure access Simplify administration with self-service onboarding and registration Deploy Security Group Access, Cisco’s tagging enforcement solution Add Layer 2 encryption to secure traffic flows Use Network Edge Access Topology to extend secure access beyond the wiring closet Monitor, maintain, and troubleshoot ISE and your entire Secure Unified Access system…”
Libro electrónico -
1409Publicado 2014“…--Chris Anderson, CEO, 3D Robotics, and former Editor-in-Chief, Wired "He (Henry Ford) probably would have started in TechShop." …”
Libro electrónico -
1410Publicado 2012“…—Mike Bellafiore, author of One Good Trade “Masterful explanation of not only why emotionless trading is a myth, but how we can take advantage of our natural wiring to gain an edge.” —Derek Hernquist, Chief Investment Officer, Integrative Capital, LLC “Shull details ways to learn how you ‘feel’ before you ‘act’ so that y..…”
Grabación de sonido -
1411Publicado 2014“…--Chris Anderson, CEO, 3D Robotics, and former Editor-in-Chief, Wired "He (Henry Ford) probably would have started in TechShop." …”
Grabación de sonido -
1412por Cerulo, Karen A.“…Never Saw It Coming explains why it is so hard to do so: adaptive behavior hard-wired into human cognition is complemented and reinforced by cultural practices, which are in turn institutionalized in the rules and structures of formal organizations. …”
Publicado 2006
Libro electrónico -
1413Publicado 2015“…--Understand modern network topologies, protocols, and infrastructure --Implement networks based on specific requirements --Install and configure DNS and DHCP --Monitor and analyze network traffic --Understand IPv6 and IPv4 addressing, routing, and switching --Perform basic router/switch installation and configuration --Explain network device functions in cloud environments --Efficiently implement and troubleshoot WANs --Install, configure, secure, and troubleshoot wireless networks --Apply patches/updates, and support change/configuration management --Describe unified communication technologies --Segment and optimize networks --Identify risks/threats, enforce policies and physical security, configure firewalls, and control access --Understand essential network forensics concepts --Troubleshoot routers, switches, wiring, connectivity, and security Companion CD The companion CD contains a digital edition of the Cram Sheet and the powerful Pearson IT Certification Practice Test engine, complete with hundreds of exam-realistic questions and two complete practice exams. …”
Libro electrónico -
1414Publicado 2016“…This research topic is proposed to explore the role of cytokines, and more in particular chemokines, in the modulation of neuronal activity as a fundamental step for the correct brain wiring, function and susceptibility to environment. …”
Libro electrónico -
1415Publicado 2021“…This study guide helps you master all the topics on the CompTIA PenTest+ PT0-002 exam, including Planning and Scoping a Penetration Testing Assessment Information Gathering and Vulnerability Identification Social Engineering Attacks and Physical Security Vulnerabilities Exploiting Wired and Wireless Networks Exploiting Application-Based Vulnerabilities Cloud, Mobile, and IoT Security Performing Post-Exploitation Techniques Reporting and Communication Tools and Code Analysis…”
Libro electrónico -
1416Publicado 2021“…AI-based technologies and applications in the semiconductor manufacturing industry address use cases related to AI-based failure modes and effects analysis assistants, neural networks for predicting critical 3D dimensions in MEMS inertial sensors, machine vision systems developed in the wafer inspection production line, semiconductor wafer fault classifications, automatic inspection of scanning electron microscope cross-section images for technology verification, anomaly detection on wire bond process trace data, and optical inspection. …”
Libro electrónico -
1417Publicado 2019“…Among many other things, this book teaches you: What hardware and software you need to use Siri How to change Siri's language and voice Ways to personalize Siri by telling it about yourself, your contacts, and more The numerous ways to activate Siri (by touch or by voice) How to use Siri with AirPods, wired earbuds, or third-party headphones What to do if the wrong device answers your "Hey Siri" request How to ask Siri about sports, math and conversions, time, food, movies, people, stocks, the weather, jokes, and random facts Tips for asking Siri follow-up questions How to control music (on any device, with or without an Apple Music subscription) Techniques for using Siri to get directions, set reminders and appointments, send messages and email, and take notes Ways to use Siri to search for files on your Mac What Siri can and can't do for you on an Apple TV or HomePod How to make and use Siri Shortcuts on an iOS device or Apple Watch Everything you need to know about your privacy where Siri is involved Plus bonus videos! …”
Libro electrónico -
1418Publicado 2016“…What You Will Learn Install and configure the Raspbian Jessie operating system for maximum mischief Detect an intruder with motion detection or a laser trip wire and set off an alarm Listen in to conversations from a distance over Bluetooth Distort your voice in weird and wonderful ways Track the Pi's whereabouts using GPS Connect your Pi to the mobile Internet using a 3G dongle and make yourself anonymous on the net Display secret messages and codes to fellow agents on a LED display In Detail This book is for all mischievous Raspberry Pi owners who'd like to see their computer transform into a neat spy gadget to be used in a series of practical pranks and projects. …”
Libro electrónico -
1419Publicado 2023“…What you will learn Design user interfaces using no-code/low code programming languages Prototype electronic controllers for audio alarms swiftly Wire an M5Stack Core 2 to an Arduino Uno or equivalent to build a touch control relay controller Prototype Bluetooth IoT controllers efficiently Build and code Wi-Fi sniffers and scanner gadgets Prototype wearable devices with ease Create ESP32 applications using system block diagram design Build a DC motor controller operated by a M5Stack Core unit Who this book is for This book is for practicing embedded systems and IoT developers, electronics and automation technicians, STEM technical educators, students, and hobbyists looking to learn about the ESP32 microcontroller and M5Stack technologies. …”
Libro electrónico -
1420por Hucaby, Dave“…The official study guide helps you master all the topics on the CCNA Wireless 640-722 exam, including the following: n RF signals, modulation, and standards n Antennas n WLAN topologies, configuration, and troubleshooting n Wireless APs n CUWN architecture n Controller configuration, discovery, and maintenance n Roaming n Client configuration n RRM n Wireless security n Guest networks n WCS network management n Interference Companion CD The CD contains 170 unique practice exam questions for the CCNA Wire..…”
Publicado 2014
Libro electrónico