Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Operating systems (Computers) 58
- Linux 44
- Security measures 31
- Computer networks 30
- Computer security 25
- Engineering & Applied Sciences 25
- Programming 25
- Microsoft Windows (Computer file) 21
- Raspberry Pi (Computer) 19
- Computer Science 18
- Microcomputers 17
- Computer crimes 15
- Digital techniques 15
- Computer input-output equipment 14
- Android (Electronic resource) 13
- Embedded computer systems 13
- Examinations 13
- Application software 12
- Certification 11
- Investigation 11
- Photography 11
- Design and construction 10
- Electronic data processing personnel 10
- Hardware and Maker 10
- Arduino (Programmable controller) 9
- Maintenance and repair 9
- Microcontrollers 9
- Penetration testing (Computer security) 9
- Development 8
- Mac OS 8
-
341Publicado 2016Tabla de Contenidos: “…-- Summary -- Support -- Chapter 2 Raspberry Pi Software -- Linux on the Raspberry Pi -- Linux Distributions for the RPi -- Create a Linux SD Card Image for the RPi -- Connecting to a Network -- Regular Ethernet -- Ethernet Crossover Cable -- Communicating with the RPi -- Serial Connection with the USB-to-TTL 3.3V Cable -- Connecting through Secure Shell (SSH) -- Transferring Files Using PuTTY/psftp over SSH -- Controlling the Raspberry Pi -- Basic Linux Commands -- Basic File Editing -- What Time Is It? …”
Libro electrónico -
342Publicado 2012Tabla de Contenidos: “…Multiple Video Adapters for One Monitor -- Display Types -- Display Settings -- Exercise 5-3: Check Out the Color Quality Setting in Windows 7 -- Installing and Configuring Peripheral Devices -- Installing Displays -- Selecting Input Devices -- Multimedia -- Biometric Devices -- KVM Switches -- Installing USB Devices -- Two-Minute Drill -- Self Test -- Self Test Answers -- 6. …”
Libro electrónico -
343Publicado 2012Tabla de Contenidos: “…An Introduction to BASH -- Job Control -- Environment Variables -- Printing Environment Variables -- Setting Environment Variables -- Unsetting Environment Variables -- Pipes -- Redirection -- Command-Line Shortcuts -- Filename Expansion -- Environment Variables as Parameters -- Multiple Commands -- Backticks -- Documentation Tools -- The man Command -- The texinfo System -- Files, File Types, File Ownership, and File Permissions -- Normal Files -- Directories -- Hard Links -- Symbolic Links -- Block Devices -- Character Devices -- Named Pipes -- Listing Files: ls -- Change Ownership: chown -- Change Group: chgrp -- Change Mode: chmod -- File Management and Manipulation -- Copy Files: cp -- Move Files: mv -- Link Files: ln -- Find a File: find -- File Compression: gzip -- bzip2 -- Create a Directory: mkdir -- Remove a Directory: rmdir -- Show Present Working Directory: pwd -- Tape Archive: tar -- Concatenate Files: cat -- Display a File One Screen at a Time: more -- Disk Utilization: du -- Show the Directory Location of a File: which -- Locate a Command: whereis -- Disk Free: df -- Synchronize Disks: sync -- Moving a User and Its Home Directory -- List Processes: ps -- Show an Interactive List of Processes: top -- Send a Signal to a Process: kill -- Signals -- Security Issues -- Examples Using the kill Command -- Miscellaneous Tools -- Show System Name: uname -- Who Is Logged In: who -- A Variation on who: w -- Switch User: su -- Editors -- vi -- emacs -- joe -- pico -- Summary -- Chapter 6: Booting and Shutting Down -- Boot Loaders -- GRUB Legacy -- Stage 1 -- Stage 2 -- Conventions Used in GRUB -- Installing GRUB -- Backing Up the MBR -- Installing GRUB Legacy from the GRUB Shell -- USB GRUB Legacy Boot Disk -- Installing GRUB Legacy on the MBR Using a USB GRUB Legacy Disk -- Configuring GRUB Legacy -- Adding a New Kernel to Boot with GRUB Legacy…”
Libro electrónico -
344Publicado 2017Tabla de Contenidos: “…. -- Method 1 - Using SCP to copy the ACI image from the APIC -- Method 2 - Using SCP to copy the ACI image from another SCP server -- Method 3 - Using a USB drive to copy the ACI image -- Upgrading the image -- How to do it... -- Logging in -- How to do it... -- Reverting to NX-OS mode -- ACI fabric overlay -- An introduction to the GUI -- System menu -- Tenants menu -- Fabric menu -- VM Networking -- L4-L7 Services -- Admin -- Operations -- Chapter 2: Configuring Policies and Tenants -- Introduction -- Creating fabric policies -- How to do it... -- How it works... -- Creating access policies -- How to do it... -- How it works... -- There's more... -- Creating tenants -- How to do it... -- How it works... -- Configuring bridge domains -- How to do it... -- How it works... -- Configuring contexts -- How to do it... -- How it works... -- There's more... -- Creating application network profiles -- How to do it... -- Creating endpoint groups -- How to do it... -- How it works... -- Using contracts between tenants -- How to do it... -- How it works... -- Creating filters -- How to do it... -- Creating contracts within tenants -- How to do it... -- Creating management contracts -- How to do it... -- How it works... -- Chapter 3: Hypervisor Integration (and Other Third Parties) -- Introduction -- Installing device packages -- How to do it... -- How it works... -- There's more…”
Libro electrónico -
345por Chambers, Mark L.Tabla de Contenidos: “…-- Whoa! Where's my familiar USB port? -- Adding a DVD drive -- Location, Location, Location! …”
Publicado 2024
Libro electrónico -
346Ubuntu 22.04 Schnelleinstieg Der einfache Einstieg in die Linux-Welt. Inkl. Ubuntu 22.04 LTS auf DVDpor Gödl, RobertTabla de Contenidos: “…-- 1.2 Ubuntu -- 1.2.1 Die Vorteile von Ubuntu -- Kapitel 2: Ubuntu ausprobieren und installieren -- 2.1 Ubuntu herunterladen -- 2.2 Startmedium erstellen -- 2.2.1 ISOburn - bootfähige DVDs brennen -- 2.2.2 Etcher - bootfähige USB-Sticks erstellen -- 2.3 Den Computer vom Startmedium starten -- 2.4 Ubuntu ausprobieren -- 2.5 Ubuntu installieren -- 2.5.1 Partitionierung der Festplatte -- 2.5.2 Benutzer anlegen und Installation abschließen -- Kapitel 3: Der Desktop -- 3.1 Ubuntu GNOME kennenlernen -- 3.1.1 Das GNOME-Anwendungsmenü -- 3.1.2 Virtuelle Arbeitsflächen -- 3.1.3 Das Benutzermenü -- 3.1.4 Kalender und Benachrichtigungen -- 3.1.5 Das Dock -- 3.1.6 Wichtige Tastenkombinationen -- 3.2 GNOME anpassen -- 3.2.1 Ins Internet mit Ubuntu-GNOME -- 3.2.2 Desktop-Einstellungen -- 3.2.3 Eigene Icons im Dock -- 3.2.4 Mehr Desktop-Einstellungen -- 3.2.5 GNOME Extensions - Erweiterungen -- 3.2.6 Mehr Themes für Ubuntu -- 3.3 Kleine Tipps rund um Ubuntu mit GNOME -- 3.3.1 Clipboard Indicator - bessere Zwischenablage für Ubuntu -- 3.3.2 GSConnect - Ubuntu mit dem Smartphone verbinden -- 3.3.3 Laufwerke - externe Datenträger formatieren und SMART-Werte auslesen -- 3.3.4 Alacarte - eigene Einträge im Anwendungsmenü -- 3.3.5 Der Schnellstarter - der Ausführen-Dialog -- 3.4 Weitere Desktop-Umgebungen -- 3.4.1 KDE Plasma - klassisch und anpassbar -- 3.4.2 XFCE - schlank und schnell -- 3.4.3 Cinnamon - einfach und beliebt bei Windows-Umsteigern -- 3.4.4 Mate - schlank, für GNOME-2-Nutzer…”
Publicado 2022
Libro electrónico -
347por Parasram, Shiva V. N.Tabla de Contenidos: “…Configuring our WINE installation -- Testing our WINE installation -- Summary -- Part 2: Digital Forensics and Incident Response Fundamentals and Best Practices -- Chapter 6: Understanding File Systems and Storage -- History and types of storage media -- IBM and the history of storage media -- Removable storage media -- Magnetic tape drives -- Floppy disks -- Optical storage media -- Blu-ray Disc -- Flash storage media -- USB ash drives -- Flash memory cards -- Hard disk drives -- Integrated Drive Electronics HDDs -- Serial Advanced Technology Attachment HDDs -- Solid-state drives -- File systems and operating systems -- Microsoft Windows -- Macintosh (macOS) -- Linux -- Data types and states -- Metadata -- Slack space -- Volatile and non-volatile data and the order of volatility -- The importance of RAM, the paging file, and cache in DFIR -- Summary -- Chapter 7: Incident Response, Data Acquisitions, and DFIR Frameworks -- Evidence acquisition procedures -- Incident response and first responders -- Evidence collection and documentation -- Physical acquisition tools -- Live versus post-mortem acquisition -- Order of volatility -- Powered-on versus powered-off device acquisition -- The CoC -- The importance of write blockers -- Data imaging and maintaining evidence integrity -- Message Digest (MD5) hash -- Secure Hashing Algorithm (SHA) -- Data acquisition best practices and DFIR frameworks -- DFIR frameworks -- Summary -- Part 3: Kali Linux Digital Forensics and Incident Response Tools -- Chapter 8: Evidence Acquisition Tools -- Using the fdisk command for partition recognition -- Device identification using the fdisk command -- Creating strong hashes for evidence integrity -- Drive acquisition using DC3DD -- Verifying the hash output of image files -- Erasing a drive using DC3DD -- Drive acquisition using DD -- Drive acquisition using Guymager…”
Publicado 2023
Libro electrónico -
348Publicado 2021Tabla de Contenidos: “…Exporting Gerber Files -- PCB Manufacturers -- Summary -- Chapter 6: Robot Engineering Requirements: Controlling Motion -- Hardware Explained: The H-Bridge -- Chapter Project: Creating the First Prototype -- Controlling Motors with Serial Commands -- Requirements Gathering -- Outlining the Software Requirements -- Creating an H-Bridge PCB -- Designing a Robot Chassis -- Assembly -- Writing the Software -- Debugging the Arduino Software -- Troubleshooting the Hardware -- Finished Prototype -- Summary -- Exercise -- Chapter 7: Final Project PCB -- Creating Schematic Sheets -- Final Project: NatBot -- Requirements Gathering (PCB) -- Outlining the Hardware Requirements -- Creating the NatBot PCB -- Hardware Explained: The NatBot PCB -- DC Motor -- Micro DC Motors -- Servo -- Micro Servos -- Accelerometer -- ADXL362 -- Charging Circuit -- MCP73831T -- Buck/Boost Regulator -- 8V Boost Regulator 6V Boost Regulator -- Bluetooth -- RN-42 -- Ultrasonic Sensor -- Parallax Ping Ultrasonic Sensor -- Temperature Sensor -- TMP36 -- OLED Display -- OLED -- GPS -- UART GPS -- Headers -- PCB Bill of Materials (BOM) -- Finished Prototype -- Summary -- Chapter 8: Final Project 3D Model -- Final Project: NatBot -- Requirements Gathering (3D Model) -- Outlining the 3D Model Requirements -- Fusion 360 Functions Explained -- Features of the NatBot 3D Model Explained -- NatBot Chassis -- Battery Holder -- Motor Assembly Mounts -- Ultrasonic Sensor Mount -- LCD Mount -- Micro USB Panel Mount -- PCB Mounting -- NatBot Ultrasonic Sensor Mount -- NatBot LCD Mount -- NatBot GPS Mount -- NatBot Front and Rear Wheelbase -- NatBot Wheels -- 3D Printing the NatBot -- Fit Check and Assembly -- Summary -- Chapter 9: Final Project Software -- Final Project: NatBot -- Requirements Gathering (Firmware) -- Outlining the Software Requirements…”
Libro electrónico -
349Publicado 2015Tabla de Contenidos: “…3.4.6 Parallel Ports: /dev/lp0, /dev/lp13.4.7 Audio Devices: /dev/snd/*, /dev/dsp, /dev/audio, and More; 3.4.8 Creating Device Files; 3.5 udev; 3.5.1 devtmpfs; 3.5.2 udevd Operation and Configuration ; 3.5.3 udevadm; 3.5.4 Monitoring Devices; 3.6 In-Depth: SCSI and the Linux Kernel; 3.6.1 USB Storage and SCSI; 3.6.2 SCSI and ATA; 3.6.3 Generic SCSI Devices; 3.6.4 Multiple Access Methods for a Single Device; Chapter 4: Disks and Filesystems; 4.1 Partitioning Disk Devices; 4.1.1 Viewing a Partition Table; 4.1.2 Changing Partition Tables; 4.1.3 Disk and Partition Geometry…”
Libro electrónico -
350por Yaghmour, KarimTabla de Contenidos: “…Parallel Port; 3.2.8. SCSI; 3.2.9. USB; 3.2.10. IEEE1394 (FireWire); 3.2.11. GPIB; 3.2.12. …”
Publicado 2003
Libro electrónico -
351por McGuire, SamTabla de Contenidos: “…1.8.2 Need-based solution1.8.3 Unavailable instrument; 1.8.4 Instrument preservation; 1.9 Summary; 2 Making connections; 2.1 Signal chain; 2.2 Capturing the sound source; 2.3 Using microphones; 2.3.1 Power; 2.3.2 High pass filter; 2.3.3 Pad; 2.3.4 Polar patterns; 2.4 Using a line input/instrument input; 2.5 Using microphone preamplifiers; 2.6 Using analog-to-digital converters; 2.7 Using audio interfaces; 2.7.1 Expansion cards; 2.7.2 USB and FireWire; 2.7.3 Miscellaneous connections; 2.7.4 Monitoring; 2.8 Using an alternative to audio interfaces; 2.9 Hooking it all together; 2.10 Cable types…”
Publicado 2008
Libro electrónico -
352por Córcoles Córcoles, SheilaTabla de Contenidos: “…-- 1.1.3 ARQUITECTURA DE UN MICROCONTROLADOR -- 1.2 LA PLACA ARDUINO -- 1.2.1 ALIMENTACIÓN -- 1.2.2 PUERTO USB -- 1.2.4 ENTRADAS ANALÓGICAS -- 1.2.5 SALIDAS ANALÓGICAS -- 1.2.6 PINES DE ALIMENTACIÓN -- 1.2.7 PINES CON DOBLE FUNCIÓN -- 1.2.8 OTROS PINES -- 1.2.9 MICROCONTROLADORES -- 1.2.10 BOTÓN RESET -- 1.2.11 RELOJ -- 1.3 EL MICROCONTROLADOR DE ARDUINO -- 1.3.1 AVR -- 1.3.2 MEMORIA -- 1.3.3 FIRMWARE -- 1.3.4 COMUNICACIÓN CON COMPONENTES ELECTRÓNICOS -- 1.4 PLACAS ARDUINO EXISTENTES -- 1.4.1 PLACAS ARDUINO BÁSICAS -- 1.4.2 PLACAS ARDUINO AVANZADAS -- 1.4.3 PLACAS DE ARDUINO PARA INTERNET DE (...) -- 1.4.4 PLACAS ARDUINO PARA WEARABLES -- 1.5 SHIELDS DE ARDUINO -- 1.5.1 MKR2UNO ADAPTER -- 1.5.2 MOTOR SHIELD -- 1.5.3 USB HOST SHIELD -- 1.5.4 PROTO SHIELD -- 1.5.5 MKR PROTO SHIELD -- 1.5.6 4 RELAYS SHIELD -- 1.5.7 MEGA PROTO SHIELD -- 1.5.8 MKR RELAY PROTO SHIELD -- 1.5.9 YÚN SHIELD -- 1.5.10 WIRELESS SD SHIELD -- 1.5.11 WIRELESS PROTO SHIELD -- 1.5.12 WIFI SHIELD -- 1.5.13 ETHERNET SHIELD -- 1.5.14 GSM SHIELD -- CAPÍTULO 2. …”
Publicado 2018
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
353Tabla de Contenidos: “…Dynamic Linearity -- Summary -- References -- Chapter 3: Key Sensor Technology Components: Hardware and Software Overview -- Smart Sensors -- Sensor Systems -- Sensor Platforms -- The Arduino I/O Board -- Shimmer -- Smartphones and Tablets -- Microcontrollers for Smart Sensors -- CPUs -- Registers -- Memory -- Timers and Counters -- Debugging Interfaces -- Common Microcontrollers -- Interfaces and Embedded Communications -- Embedded Digital Interfaces and Protocols -- Serial Peripheral Interface (SPI) -- The I 2 C Bus -- Analog Interfacing -- Sensor Communications -- Standard Wired Interfaces -- RS-232 -- Virtual Serial Ports -- RS-485 -- Universal Serial Bus (USB) -- Short- and Medium-Range Standards for Wireless Communications -- Proprietary Wireless Protocols -- Power Management and Energy Harvesting -- Power Management -- Energy Harvesting -- Microcontroller Software and Debugging -- IDEs -- Development Languages -- Testing Code -- Summary -- References -- Chapter 4: Sensor Network Topolog ies and Design Considerations -- Sensor Network Components -- Sensor Nodes -- Aggregators, Base Stations, and Gateways -- Machine-to-Machine Devices -- Proprietary M2M solutions -- Smartphones -- Traditional M2M Platforms -- Sensor Network Topologies -- Sensor Network Applications -- Personal Area Networks -- Ambient/Pervasive Home Sensor Networks -- Wide Area Networks -- Sensor Network Features and Challenges -- Security -- Key Security Goals -- Attacks on Sensor Networks -- Security Approaches -- Biometrics -- Challenges for Sensor Networks -- Summary -- References -- Chapter 5: Processing and Adding Vibrancy to Sensor Data -- Data Literacy -- The Internet of Things -- Sensors and the Cloud -- Data Quality -- Addressing Data Quality Issues -- Outlier Detection -- Automated Data Cleaning -- Plausibility Testing -- Fusing Sensor Data -- Data Mining…”
Libro electrónico -
354Publicado 2021Tabla de Contenidos: “…-- Whoa! Where's my familiar USB port? -- Sharing a CD or DVD drive -- Location, Location, Location! …”
Libro electrónico -
355por Pogue, David, 1963-Tabla de Contenidos: “…Printing -- Controlling Printouts -- Fancy Printer Tricks -- Printer Troubleshooting -- Fonts -- Faxing -- Scanning Documents -- Hardware & -- Drivers -- External Gadgets -- Device Stage -- Installing Cards in Expansion Slots -- Troubleshooting Newly Installed Gear -- Driver Signing -- The Device Manager -- Part Six: PC Health -- Maintenance, Speed Tweaks & -- Troubleshooting -- The Action Center -- Disk Cleanup -- Disk Defragmenter -- Hard Drive Checkups -- Disk Management -- Task Scheduler -- Three Speed Tricks -- Windows Update -- Reset and Refresh -- Windows Recovery Environment (WinRE) -- Troubleshooting Tools -- Startup Items Revealed -- Backups & -- File History -- System Images -- System Restore -- File History -- The USB Recovery Drive -- The Disk Chapter -- Storage Spaces -- Dynamic Disks -- Compressing Files and Folders -- Encrypting Files and Folders -- BitLocker Drive Encryption -- Part Seven: The Windows Network -- Accounts (and Logging On) -- Local Accounts vs. …”
Publicado 2013
Libro electrónico -
356Publicado 2023Tabla de Contenidos: “…-- 1.2 Linux Mint -- 1.2.1 Die Vorteile von Linux Mint -- Kapitel 2: Linux Mint ausprobieren und installieren -- 2.1 Linux Mint herunterladen -- 2.2 Startmedium erstellen -- 2.2.1 ISOburn - bootfähige DVDs brennen -- 2.2.2 Etcher - bootfähige USB-Sticks erstellen -- 2.3 Den Computer vom Startmedium starten -- 2.4 Linux Mint ausprobieren -- 2.5 Linux Mint installieren -- 2.5.1 Partitionierung der Festplatte -- 2.5.2 Benutzer anlegen und Installation abschließen -- Kapitel 3: Die grafische Oberfläche (der Desktop) -- 3.1 Cinnamon - den Desktop kennenlernen -- 3.1.1 Erweiterte Desktop-Einstellungen unter Cinnamon -- 3.1.2 Nemo - der Dateimanager -- 3.1.3 Virtuelle Arbeitsflächen unter Cinnamon -- 3.2 Mate - der ressourcenschonende Desktop -- 3.2.1 Erweiterte Desktop-Einstellungen unter Mate -- 3.2.2 Caja - der Dateimanager unter Mate -- 3.2.3 Virtuelle Arbeitsflächen unter Mate -- 3.3 XFCE - ressourcenschonend und schnell -- 3.3.1 Erweiterte Desktop-Einstellungen unter XFCE -- 3.3.2 Thunar - der Dateimanager unter XFCE -- 3.3.3 Virtuelle Arbeitsflächen unter XFCE -- Kapitel 4: Das System Linux Mint -- 4.1 Die Verzeichnis-Hierarchie - wo ist was zu finden? …”
Libro electrónico -
357Publicado 2018Tabla de Contenidos: “…Basic post-exploitation commands -- The help menu -- The background command -- Reading from a channel -- File operation commands -- Desktop commands -- Screenshots and camera enumeration -- Advanced post-exploitation with Metasploit -- Obtaining system privileges -- Changing access, modification, and creation time with timestomp -- Additional post-exploitation modules -- Gathering wireless SSIDs with Metasploit -- Gathering Wi-Fi passwords with Metasploit -- Getting the applications list -- Gathering Skype passwords -- Gathering USB history -- Searching files with Metasploit -- Wiping logs from the target with the clearev command -- Advanced extended features of Metasploit -- Using pushm and popm commands -- Speeding up development using the reload, edit, and reload_all commands -- Making use of resource scripts -- Using AutoRunScript in Metasploit -- Using the multiscript module in AutoRunScript option -- Privilege escalation using Metasploit -- Finding passwords in clear text using mimikatz -- Sniffing traffic with Metasploit -- Host file injection with Metasploit -- Phishing Windows login passwords -- Summary and exercises -- Chapter 9: Evasion with Metasploit -- Evading Meterpreter using C wrappers and custom encoders -- Writing a custom Meterpreter encoder/decoder in C -- Evading intrusion detection systems with Metasploit -- Using random cases for fun and profit -- Using fake relatives to fool IDS systems -- Bypassing Windows firewall blocked ports -- Using the reverse Meterpreter on all ports -- Summary and exercises -- Chapter 10: Metasploit for Secret Agents -- Maintaining anonymity in Meterpreter sessions -- Maintaining access using vulnerabilities in common software -- DLL search order hijacking -- Using code caves for hiding backdoors -- Harvesting files from target systems -- Using venom for obfuscation…”
Libro electrónico -
358Publicado 2018Tabla de Contenidos: “…Hardening server security -- Check for open ports or services -- System firewall configuration -- System update -- Disable USB -- Hard disk encryption -- BIOS protection -- Check the installed packages -- Password policies -- Secure and encrypt remote access -- Implement activity logging -- Document the host information -- Authentication NTLM versus Kerberos -- Password policies -- Server-level permissions -- Server antivirus and malware protection -- Local security policies -- Summary -- Questions -- Further reading -- Chapter 4: Cloud Security Design -- Cloud offerings -- IaaS -- PaaS -- SaaS -- Public versus private -- Public IaaS versus private IaaS -- Public PaaS versus private PaaS -- Public SaaS versus private SaaS -- Shared technology and shared danger -- Security approach for cloud computing -- Traditional enterprise network model -- Hybrid data center and cloud network -- Network security devices for IaaS -- Firewall Virtual Appliance -- Virtual TAP vTAP -- Virtual Router -- Virtual web application firewalls -- DDoS attack protection -- Data loss prevention -- Exploited system vulnerabilities -- Summary -- Questions -- Further reading -- Chapter 5: Application Security Design -- GDPR -- Getting consent -- Access to data -- Encryption -- SQL Injection -- Prevention of SQL Injection attack on web applications -- Employing comprehensive data sanitization -- Deploying a Web Application Firewall -- Limit database privileges -- Finding vulnerabilities -- WAFs -- WAF protection against common web attacks -- Blacklisting and whitelisting -- What is blacklisting? …”
Libro electrónico -
359por Martín Martín-Pozuelo, José MaríaTabla de Contenidos: “….); 4.1 PUERTOS; 4.1.1 PARALELO; 4.1.2 SERIE; 4.1.3 USB…”
Publicado 2014
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
360Publicado 2016Tabla de Contenidos: “…-- From Your Perspective -- FORENSIC ANALYSIS OF THE ONION ROUTER -- TRACKING CRIMINALS USING TOR -- USED IN COMBINATION OF OTHER TOOLS AND METHODS -- TAILS -- RELATED TOR TOOLS AND APPLICATIONS -- Hidden Services -- SUMMARY -- REFERENCES -- 3 - Triaging Mobile Evidence -- LOGICAL DATA -- PHYSICAL DATA -- EXAMPLES OF LOGICAL AND PHYSICAL DATA -- WIRELESS CARRIERS -- MOBILE NETWORK OPERATORS -- MOBILE VIRTUAL NETWORK OPERATOR -- DETERMINING TARGET NUMBER -- FONEFINDER.NET -- NUMBER PORTABILITY ADMINISTRATION CENTER -- SEARCH.ORG -- SUBSCRIBER IDENTITY MODULE -- INTERNAL HARDWARE OF A SIM -- THE SIM FILE SYSTEM -- SIM SIZES AND EVOLUTION -- TYPICAL EVIDENCE -- SIM SECURITY-PIN AND PUK -- TRIAGING DEVICES -- DEVICES POWERED "ON" -- DEVICES LOCATED "OFF" -- MANUAL EXAMS -- TOOLS AVAILABLE -- Cellebrite USB Camera -- Fernico ZRT -- Project-A-Phone -- Eclipse Kit 3 -- SOFTWARE SOLUTIONS -- ScreenHunter -- Snagit -- Other Options -- CHAPTER SUMMARY POINTS -- REFERENCES FOR MANUAL TOOLS…”
Libro electrónico