Mostrando 381 - 400 Resultados de 440 Para Buscar '"USB"', tiempo de consulta: 0.12s Limitar resultados
  1. 381
    Publicado 2024
    Tabla de Contenidos: “…Fine-tuning color with White Balance Shift -- Changing the Color Space -- Taking a Quick Look at Picture Styles -- Increasing or Reducing Clarity -- Chapter 7 Putting It All Together -- Recapping Basic Picture Settings -- Shooting Still Portraits -- Capturing Action -- Photographing Scenic Vistas -- Capturing Dynamic Close-Ups -- Chapter 8 Shooting and Viewing Movies -- Choosing a Movie Shooting Mode -- Reviewing a Few Video Basics -- Recording Movies Using Default Settings -- Recording Your First Vlog (Video Blog) -- Setting the Broadcast Standard -- Understanding the Movie Recording Size Setting -- Selecting Audio Options -- Using Movie Digital Zoom -- Recording Vertical Movies -- Reviewing Other Movie Options -- Considering autofocusing options -- Enabling Movie IS -- Controlling exposure and color -- Checking out a few final features -- Playing Movies -- Part 3 After the Shot -- Chapter 9 Picture Playback -- Adjusting Instant Image Review Timing -- Viewing Pictures in Playback Mode -- Viewing thumbnails (Index mode) -- Jumping through images -- Rotating still pictures -- Zooming in for a closer view -- Customizing the Data Display -- Basic Information display mode -- Shooting Information display mode -- Making sense of histograms -- Interpreting a brightness histogram -- Reading an RGB histogram -- Chapter 10 Working with Picture and Movie Files -- Rating Photos and Movies -- Protecting Photos and Movies -- Deleting Files -- Taking Advantage of Image Search -- Preparing Pictures for Online Sharing -- Sending Files to Your Computer -- Part 4 The Part of Tens -- Chapter 11 Ten More Customization Options -- Customizing Button Functions -- Redesigning the Quick Control Screen -- Changing the Lens Control Ring Function -- Customizing Auto-Power Shutoff Times -- Resetting All Custom Functions -- Choosing a USB Connection App -- Creating Your Own Menu…”
    Libro electrónico
  2. 382
    Publicado 2015
    Tabla de Contenidos: “…Chapter 1 Introductory Concepts -- 1-1 Digital and Analog Quantities -- 1-2 Binary Digits, Logic Levels, and Digital Waveforms -- 1-3 Basic Logic Functions -- 1-4 Combinational and Sequential Logic Functions -- 1-5 Introduction to Programmable Logic -- 1-6 Fixed-Function Logic Devices -- 1-7 Test and Measurement Instruments -- 1-8 Introduction to Troubleshooting -- Chapter 2 Number Systems, Operations, and Codes -- 2-1 Decimal Numbers -- 2-2 Binary Numbers -- 2-3 Decimal-to-Binary Conversion -- 2-4 Binary Arithmetic -- 2-5 Complements of Binary Numbers -- 2-6 Signed Numbers -- 2-7 Arithmetic Operations with Signed Numbers -- 2-8 Hexadecimal Numbers -- 2-9 Octal Numbers -- 2-10 Binary Coded Decimal (BCD) -- 2-11 Digital Codes -- 2-12 Error Codes -- Chapter 3 Logic Gates -- 3-1 The Inverter -- 3-2 The AND Gate -- 3-3 The OR Gate -- 3-4 The NAND Gate -- 3-5 The NOR Gate -- 3-6 The Exclusive-OR and Exclusive-NOR Gates -- 3-7 Programmable Logic -- 3-8 Fixed-Function Logic Gates -- 3-9 Troubleshooting -- Chapter 4 Boolean Algebra and Logic Simplification -- 4-1 Boolean Operations and Expressions -- 4-2 Laws and Rules of Boolean Algebra -- 4-3 DeMorgan's Theorems -- 4-4 Boolean Analysis of Logic Circuits -- 4-5 Logic Simplification Using Boolean Algebra -- 4-6 Standard Forms of Boolean Expressions -- 4-7 Boolean Expressions and Truth Tables -- 4-8 The Karnaugh Map -- 4-9 Karnaugh Map SOP Minimization -- 4-10 Karnaugh Map POS Minimization -- 4-11 The Quine-McCluskey Method -- 4-12 Boolean Expressions with VHDL -- Applied Logic -- Chapter 5 Combinational Logic Analysis -- 5-1 Basic Combinational Logic Circuits -- 5-2 Implementing Combinational Logic -- 5-3 The Universal Property of NAND and NOR Gates -- 5-4 Combinational Logic Using NAND and NOR Gates -- 5-5 Pulse Waveform Operation -- 5-6 Combinational Logic with VHDL -- 5-7 Troubleshooting -- Applied Logic -- Chapter 6 Functions of Combinational Logic -- 6-1 Half and Full Adders -- 6-2 Parallel Binary Adders -- 6-3 Ripple Carry and Look-Ahead Carry Adders -- 6-4 Comparators -- 6-5 Decoders -- 6-6 Encoders -- 6-7 Code Converters -- 6-8 Multiplexers (Data Selectors) -- 6-9 Demultiplexers -- 6-10 Parity Generators/Checkers -- 6-11 Troubleshooting -- Applied Logic -- Chapter 7 Latches, Flip-Flops, and Timers -- 7-1 Latches -- 7-2 Flip-Flops -- 7-3 Flip-Flop Operating Characteristics -- 7-4 Flip-Flop Applications -- 7-5 One-Shots -- 7-6 The Astable Multivibrator -- 7-7 Troubleshooting -- Applied Logic -- Chapter 8 Shift Registers -- 8-1 Shift Register Operations -- 8-2 Types of Shift Register Data I/Os -- 8-3 Bidirectional Shift Registers -- 8-4 Shift Register Counters -- 8-5 Shift Register Applications -- 8-6 Logic Symbols with Dependency Notation -- 8-7 Troubleshooting -- Applied Logic -- Chapter 9 Counters -- 9-1 Finite State Machines -- 9-2 Asynchronous Counters -- 9-3 Synchronous Counters -- 9-4 Up/Down Synchronous Counters -- 9-5 Design of Synchronous Counters -- 9-6 Cascaded Counters -- 9-7 Counter Decoding -- 9-8 Counter Applications -- 9-9 Logic Symbols with Dependency Notation -- 9-10 Troubleshooting -- Applied Logic -- Chapter 10 Programmable Logic -- 10-1 Simple Programmable Logic Devices (SPLDs) -- 10-2 Complex Programmable Logic Devices (CPLDs) -- 10-3 Macrocell Modes -- 10-4 Field-Programmable Gate Arrays (FPGAs) -- 10-5 Programmable Logic Software -- 10-6 Boundary Scan Logic -- 10-7 Troubleshooting -- Applied Logic -- Chapter 11 Data Storage -- 11-1 Semiconductor Memory Basics -- 11-2 The Random-Access Memory (RAM) -- 11-3 The Read-Only Memory (ROM) -- 11-4 Programmable ROMs -- 11-5 The Flash Memory -- 11-6 Memory Expansion -- 11-7 Special Types of Memories -- 11-8 Magnetic and Optical Storage -- 11-9 Memory Hierarchy -- 11-10 Cloud Storage -- 11-11 Troubleshooting -- Chapter 12 Signal Conversion and Processing -- 12-1 Analog-to-Digital Conversion -- 12-2 Methods of Analog-to-Digital Conversion -- 12-3 Methods of Digital-to-Analog Conversion -- 12-4 Digital Signal Processing -- 12-5 The Digital Signal Processor (DSP) -- Chapter 13 Data transmission -- 13-1 Data Transmission Media -- 13-2 Methods and Modes of Data Transmission -- 13-3 Modulation of Analog Signals with Digital Data -- 13-4 Modulation of Digital Signals with Analog Data -- 13-5 Multiplexing and Demultiplexing -- 13-6 Bus Basics -- 13-7 Parallel Buses -- 13-8 The Universal Serial Bus (USB) -- 13-9 Other Serial Buses -- 13-10 Bus Interfacing -- Chapter 14 Data Processing and Control -- 14-1 The Computer System -- 14-2 Practical Computer System Considerations -- 14-3 The Processor: Basic Operation -- 14-4 The Processor: Addressing Modes -- 14-5 The Processor: Special Operations -- 14-6 Operating Systems and Hardware -- 14-7 Programming -- 14-8 Microcontrollers and Embedded Systems -- 14-9 System on Chip (SoC) -- Chapter 15 Integrated Circuit Technologies -- 15-1 Basic Operational Characteristics and Parameters -- 15-2 CMOS Circuits -- 15-3 TTL (Bipolar) Circuits -- 15-4 Practical Considerations in the Use of TTL -- 15-5 Comparison of CMOS and TTL Performance -- 15-6 Emitter-Coupled Logic (ECL) Circuits -- 15-7 PMOS, NMOS, and E2CMOS…”
    Libro electrónico
  3. 383
    Publicado 2020
    Tabla de Contenidos:
    Libro electrónico
  4. 384
    Publicado 2022
    Tabla de Contenidos: “…More Payloads -- Ransomware as a Service -- Typical Ransomware Process and Components -- Infiltrate -- After Initial Execution -- Dial-Home -- Auto-Update -- Check for Location -- Initial Automatic Payloads -- Waiting -- Hacker Checks C&amp -- C -- More Tools Used -- Reconnaissance -- Readying Encryption -- Data Exfiltration -- Encryption -- Extortion Demand -- Negotiations -- Provide Decryption Keys -- Ransomware Goes Conglomerate -- Ransomware Industry Components -- Summary -- Chapter 2 Preventing Ransomware -- Nineteen Minutes to Takeover -- Good General Computer Defense Strategy -- Understanding How Ransomware Attacks -- The Nine Exploit Methods All Hackers and Malware Use -- Top Root-Cause Exploit Methods of All Hackers and Malware -- Top Root-Cause Exploit Methods of Ransomware -- Preventing Ransomware -- Primary Defenses -- Everything Else -- Use Application Control -- Antivirus Prevention -- Secure Configurations -- Privileged Account Management -- Security Boundary Segmentation -- Data Protection -- Block USB Keys -- Implement a Foreign Russian Language -- Beyond Self-Defense -- Geopolitical Solutions -- International Cooperation and Law Enforcement -- Coordinated Technical Defense -- Disrupt Money Supply…”
    Libro electrónico
  5. 385
    Publicado 2013
    Tabla de Contenidos: “…Postmortem Forensics -- Live Forensics -- When Live Forensics Is the Best Option -- Tools for Live Forensics -- Postmortem Forensics -- Postmortem Memory Analysis -- Chapter 8: Capturing Evidence -- Creating Forensic Images of Internal Hard Drives -- FTK Imager with a Hardware Write Blocker -- FTK Imager with a Software Write Blocker -- Creating Forensic Images of External Drives -- FTK Imager with a USB Write Blocker -- FTK Imager with a Software Write Blocker -- Software Write Blocking on Linux Systems -- Creating Forensic Images of Network Shares…”
    Libro electrónico
  6. 386
    por Verham, Dominiek
    Publicado 2024
    Tabla de Contenidos: “…-- Types of cyberattacks -- Phishing attack -- Ransomware -- Distributed denial of service -- Man in the middle attacks -- SQL injections -- Cross-site scripting -- Zero-day exploits -- Social engineering attacks -- Recovering from a cyberattack -- A cyber incident response plan -- Virtual desktops to the rescue -- Summary -- Part 3: Security Controls for W365 and AVD -- Chapter 4: Securing User Sessions -- CA and MFA -- Security defaults -- Per-user MFA -- CA policy -- Configuring RDP device and resource redirections for Windows 365 -- Device and resource redirections with Intune -- Device and resource redirections with group policy -- Configuring RDP properties for Azure Virtual Desktop -- Drive and storage redirection -- Clipboard redirection -- COM port redirection -- Printer redirection -- Smartcard redirection -- USB device redirection -- RDP session limit timeouts -- Summary…”
    Libro electrónico
  7. 387
    por Gödl, Robert
    Publicado 2023
    Tabla de Contenidos: “…Intro -- Impressum -- Einleitung -- Debian GNU/Linux -- Über dieses Buch -- Kapitel 1: Debian GNU/Linux ausprobieren und installieren -- 1.1 Die passende Debian-Version finden -- 1.2 ‌Startfähiges Medium erstellen -- 1.2.1 ISOburn - ‌bootfähige CDs/DVDs brennen -- 1.2.2 Etcher - bootfähige USB-Sticks erstellen -- 1.3 Den Computer vom Startmedium starten -- 1.3.1 BIOS und UEFI - Startkonfiguration anpassen -- 1.4 Debian direkt installieren - die erweiterte Installation -- 1.4.1 Benutzer anlegen -- 1.4.2 Partitionieren der Festplatte -- 1.4.3 Arten der Partitionierung -- 1.4.4 Dateisysteme -- 1.4.5 Installation abschließen -- 1.4.6 Vorauswahl der Software und ‌Desktop-Umgebung -- 1.5 Debian ausprobieren und vom ‌Live-System installieren - einfache Installation -- 1.5.1 Live-System starten -- 1.5.2 Installation vom Live-System -- 1.6 Dualboot mit Windows oder anderen Linux-Distributionen -- Kapitel 2: Debian kennenlernen - die Desktop-Umgebungen -- 2.1 KDE Plasma - die wohl beliebteste Desktop-Umgebung -- 2.1.1 KDE Plasma kennenlernen -- 2.1.2 Der Dateimanager »Dolphin« -- 2.1.3 KDE an die eigenen Bedürfnisse anpassen -- 2.2 GNOME - einfach gehalten -- 2.2.1 GNOME kennenlernen -- 2.2.2 GNOME anpassen -- 2.2.3 Extensions - GNOME erweitern -- 2.3 XFCE - ressourcenschonend -- 2.3.1 XFCE kennenlernen -- 2.3.2 XFCE anpassen -- Kapitel 3: Software unter Debian verwalten -- 3.1 ‌Software ‌unter ‌Debian installieren, deinstallieren und aktualisieren -- 3.1.1 ‌Discover - die grafische ‌Paket-Verwaltung unter KDE Plasma -- 3.1.2 ‌GNOME-Software - die grafische ‌Paket-Verwaltung unter GNOME -- 3.1.3 ‌Synaptic - zusätzliche und spezialisierte Software-Pakete -- 3.1.4 ‌Software über das ‌Terminal verwalten -- 3.2 ‌Debian auf eine neue Version aktualisieren -- 3.3 Aktuellere ‌Software unter Debian nutzen…”
    Libro electrónico
  8. 388
    Publicado 2023
    Tabla de Contenidos: “…9.2.3 Review of Current Solutions -- 9.2.4 Current Treatment -- 9.3 Technology -- 9.3.1 Touchless User Interface -- 9.3.2 IR Sensor Working Principle -- 9.4 IoT Sensors and Board -- 9.4.1 Arduino UNO Board -- 9.4.2 Arduino USB Cable -- 9.4.3 Pulse Rate Sensor -- 9.4.4 IR Sensor -- 9.4.5 Temperature Sensors -- 9.4.6 Proximity Sensors -- 9.4.7 Pressure Sensors -- 9.4.8 LCD Display -- 9.4.9 Relay -- 9.4.10 Power Supply -- 9.4.11 Jumping Wires -- 9.5 Use of IoT in COVID-19 Prevention -- 9.6 Conclusion -- References -- Chapter 10 Role of Satellites in Agriculture -- 10.1 Introduction -- 10.2 Processing Satellite Images -- 10.3 Product Levels of Satellite Remote Sensing Data -- 10.3.1 A Brief Discussion and Review of Analysis Techniques -- 10.3.2 Machine Learning -- 10.3.3 Deep Learning -- 10.4 Future Challenges -- 10.5 Conclusion -- References -- Chapter 11 Search Engine Evaluation Methodology -- 11.1 Introduction -- 11.2 Performance Evaluation Forum -- 11.2.1 Text Retrieval Conference -- 11.2.2 Text Retrieval Conference Tracks -- 11.3 Search Engine Evaluation Parameters -- 11.3.1 Precision -- 11.3.2 Recall -- 11.3.3 Problems with Precision and Recall -- 11.3.4 Discounted Cumulative Gain -- 11.3.5 Normalized DCG -- 11.3.6 Click-Through -- 11.3.7 Eye Tracking -- 11.3.8 Coverage -- 11.3.9 Response Time -- 11.4 Factors Affecting Search Engines -- 11.4.1 Evaluation -- 11.4.2 Query Formulation -- 11.4.3 User Feedback to a Web Page -- 11.4.4 W3 Rules -- 11.4.5 Web Developers' Fake Techniques -- 11.5 Conclusion -- References -- Chapter 12 Synthesis and Analysis of Digital IIR Filters for Denoising ECG Signal on FPGA -- 12.1 Introduction -- 12.2 Literature Survey -- 12.3 Methods and Materials -- 12.3.1 Conversion of MATLAB Code into Verilog HDL -- 12.3.2 Synthesis of Digital Filters on FPGA -- 12.4 Results and Discussion -- 12.4.1 Butterworth Filter…”
    Libro electrónico
  9. 389
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Copyright -- Contributors -- Table of Contents -- Preface -- Part 1: Understanding IoT Fundamentals -- Chapter 1: IoT Essentials, All You Should Know -- The evolving definition of IoT -- Deployed from fixed to mobility -- Mobility from a local area to a wide area -- Presence from city to barren fields -- Throughput from Mb/s to Gb/s -- Battery life from days to years -- Networking from point-to-point and point-to-multipoint to mesh and star topologies -- Intelligence at edge node -- AI and ML -- Addressable markets -- Residential -- Commercial and business -- Neighborhood and campus -- Cities -- Rural areas -- Industries -- How IoT impacts us -- Living comfort and safety improvement -- Operational efficiency improvement -- Environmental protection improvement -- Industrial productivity improvement -- Summary -- Further reading -- Chapter 2: IoT Network, the Neural System of Things -- IoT networks at home -- Home Wi-Fi -- BLE -- Thread -- IoT networks on campuses and in buildings -- Enterprise Wi-Fi -- Thread mesh -- Private LoRaWAN network -- No one-size-fits-all approach -- IoT networks in cities -- Cellular network -- Public LoRaWAN network -- IoT networks in rural areas -- Private LoRaWAN network -- LEO network -- Summary -- Chapter 3: IoT End Devices, the Neuron Cells of an IoT System -- Device types -- Installing indoors versus outdoors -- Powering via external supply versus batteries -- Connected by wire versus wireless -- The need for edge computing -- Hardware architecture -- MCUs -- Roles -- Key features -- Critical components -- Off-the-shelf MCU -- DIY-friendly MCU -- Peripherals and interfaces -- GPIO -- SPI -- I2C -- UART -- USB -- SDIO -- ADCs -- DACs -- PWM outputs -- JTAG -- Timers -- Real-time clock -- Sensors and actuators -- Sensors -- Actuators -- Common pins on sensors -- Understanding sensor specifications…”
    Libro electrónico
  10. 390
    Publicado 2019
    Tabla de Contenidos: “…The Power Supply -- Powering Through the Micro-USB Connector -- Powering Through External Inputs -- Power Output -- 5.2.3. …”
    Libro electrónico
  11. 391
    Publicado 2018
    Tabla de Contenidos: “…Data injection with the hash length extension attack -- Busting the padding oracle with PadBuster -- Interrogating the padding oracle -- Decrypting a CBC block with PadBuster -- Behind the scenes of the oracle padding attack -- Summary -- Questions -- Further reading -- Chapter 6: Advanced Exploitation with Metasploit -- Technical requirements -- How to get it right the first time - generating payloads -- Installing Wine32 and Shellter -- Payload generation goes solo - working with msfvenom -- Creating nested payloads -- Helter Skelter evading antivirus with Shellter -- Modules - the bread and butter of Metasploit -- Building a simple Metasploit auxiliary module -- Efficiency and attack organization with Armitage -- Getting familiar with your Armitage environment -- Enumeration with Armitage -- Exploitation made ridiculously simple with Armitage -- A word about Armitage and the pen tester mentality -- Social engineering attacks with Metasploit payloads -- Creating a Trojan with Shellter -- Preparing a malicious USB drive for Trojan delivery -- Summary -- Questions -- Further reading -- Chapter 7: Stack and Heap Memory Management -- Technical requirements -- An introduction to debugging -- Understanding the stack -- Understanding registers -- Assembly language basics -- Disassemblers, debuggers, and decompilers - oh my! …”
    Libro electrónico
  12. 392
    por Vanderburg, Eric A.
    Publicado 2021
    Tabla de Contenidos: “…Off-Premises Hosting -- Orchestration Platforms -- Multicloud -- Cloud Characteristics and Terms -- Elasticity -- Demand-Driven Service -- Pay-as-You-Grow -- Chargeback -- Ubiquitous Access -- Metering -- Multitenancy -- Cloud Bursting -- Baselines -- Source and Target Hosts -- Existing Systems -- Cloud Elements -- Advanced Cloud Services -- Machine Learning and Artificial Intelligence -- Serverless -- Exercise 1-1: Creating a Basic Serverless Application on AWS Lambda -- Internet of Things -- Chapter Review -- Questions -- Answers -- Chapter 2 Disk Storage Systems -- Disk Types and Configurations -- Rotational Media -- Solid State Drive -- USB Drive -- Tape -- Interface Types -- Access Speed -- Redundant Array of Independent Disks (RAID) -- Write Once, Read Many (WORM) -- Tiering -- Performance Levels of Each Tier -- Policies -- File System Types -- Unix File System -- Extended File System -- File Allocation Table File System -- New Technology File System -- Exercise 2-1: Formatting a Disk with the NTFS Partition in Windows -- Resilient File System -- Virtual Machine File System -- Z File System -- Chapter Review -- Questions -- Answers -- Chapter 3 Storage Networking -- Storage Types and Technologies -- Direct Attached Storage -- Storage Area Network…”
    Libro electrónico
  13. 393
    Publicado 2021
    Tabla de Contenidos: “…Finding Package Files -- Inspecting Package Files -- Installing Package Files -- Removing Package Files -- Using Flatpak Containers -- The Bottom Line -- Chapter 6 Working with the Shell -- Exploring the Shell -- The Shell Prompt -- The Shell Manual -- Working with Commands -- Entering Commands -- Retrieving Past Commands -- Redirecting Commands -- Environment Variables -- Global Environment Variables -- User-Defined Environment Variables -- The Bottom Line -- Chapter 7 Exploring Linux File Management -- Filesystem Navigation -- The Linux Filesystem -- Traversing Directories -- Linux Files -- Determining File Types -- Filenames -- Hidden Files -- File Inodes -- File and Directory Listing -- Basic Listing -- Modifying Listing Information -- The Complete Parameter List -- Directory Handling -- Creating Directories -- Deleting Directories -- File Handling -- Creating Files -- Copying Files -- Linking Files -- Renaming Files -- Deleting Files -- File Features -- Using Wildcards -- Quoting -- Case Sensitivity -- Finding Files -- The which Command -- The locate Command -- The whereis Command -- The find Command -- Archiving Files -- Compressing Files -- Creating Archive Files -- Archiving Scenarios -- The Bottom Line -- Chapter 8 Working with Text Files -- The vim Editor -- Checking Your vim Editor Program -- Using the vim Editor -- The nano Editor -- Working with Data Files -- Sorting -- Searching -- Compressing -- Archiving -- The Bottom Line -- Part 2 Intermediate Admin Functions -- Chapter 9 Managing Hardware -- Device Driver Modules -- Listing Installed Modules -- Installing New Modules -- Removing Modules -- Communicating with Devices -- Device Interfaces -- The /dev Directory -- The /proc Directory -- The /sys Directory -- Working with Devices -- Finding Devices -- Working with PCI Cards -- Working with USB Devices -- Using Hot Pluggable Devices…”
    Libro electrónico
  14. 394
    Publicado 2016
    Tabla de Contenidos: “…-- Getting started -- Standard data types -- Strings and Unicode -- Integers and floats -- Booleans and None -- Structured data types -- Lists -- Dictionaries -- Sets and tuples -- Data type conversions -- Files -- Variables -- Understanding scripting flow logic -- Conditionals -- Loops -- For -- While -- Functions -- Summary -- Chapter 2: Python Fundamentals -- Advanced data types and functions -- Iterators -- Datetime objects -- Libraries -- Installing third-party libraries -- Libraries in this book -- Python packages -- Classes and object-oriented programming -- Try and except -- Raise -- Creating our first script - unix_converter.py -- User input -- Using the raw input method and the system module - user_input.py -- Understanding Argparse - argument_parser.py -- Forensic scripting best practices -- Developing our first forensic script - usb_lookup.py -- Understanding the main() function -- Exploring the getRecord() function -- Interpreting the searchKey() function -- Running our first forensic script -- Troubleshooting -- Challenge -- Summary -- Chapter 3: Parsing Text Files -- Setup API -- Introducing our script -- Overview -- Our first iteration - setupapi_parser.v1.py -- Designing the main() function -- Crafting the parseSetupapi() function -- Developing the printOutput() function -- Running the script -- Our second iteration - setupapi_parser.v2.py -- Improving the main() function -- Tuning the parseSetupapi() function -- Modifying the printOutput() function -- Running the script -- Our final iteration - setupapi_parser.py -- Extending the main() function -- Adding to the parseSetupapi() function…”
    Libro electrónico
  15. 395
    Publicado 2016
    Tabla de Contenidos: “…But Also Obstacles -- Executive Summary -- Further Reading -- Embrace dynamic artifacts -- Can We Minimize the USB Driver Test Suite? -- Yes, Lets Observe Interactions -- Why Did Our Solution Work? …”
    Libro electrónico
  16. 396
    Publicado 2023
    Tabla de Contenidos: “…Log out when you're finished -- Use your own computer or phone -- Lock your computer -- Use a separate, dedicated computer for sensitive tasks -- Use a separate, dedicated browser for sensitive web-based tasks -- Secure your access devices -- Keep your devices up to date -- Don't perform sensitive tasks over public Wi-Fi -- Never use public Wi-Fi in high-risk places -- Access your accounts only in safe locations -- Use appropriate devices -- Set appropriate limits -- Use alerts -- Periodically check access device lists -- Check last login info -- Respond appropriately to any fraud alerts -- Never send sensitive information over an unencrypted connection -- Beware of social engineering attacks -- Establish voice login passwords -- Protect your cellphone number -- Don't click on links in emails or text messages -- Securing Data with Parties You've Interacted With -- Securing Data at Parties You Haven't Interacted With -- Securing Data by Not Connecting Hardware with Unknown Pedigrees -- Chapter 5 Passwords -- Passwords: The Primary Form of Authentication -- Avoiding Simplistic Passwords -- Password Considerations -- Easily guessable personal passwords -- Complicated passwords aren't always better -- Different levels of sensitivity -- Your most sensitive passwords may not be the ones you think -- You can reuse passwords - sometimes -- Consider using a password manager -- Creating Memorable, Strong Passwords -- Knowing When to Change Passwords -- Changing Passwords after a Breach -- Providing Passwords to Humans -- Storing Passwords -- Storing passwords for your heirs -- Storing general passwords -- Transmitting Passwords -- Discovering Alternatives to Passwords -- Biometric authentication -- SMS-based authentication -- App-based one-time passwords -- Hardware token authentication -- USB-based authentication…”
    Libro electrónico
  17. 397
    Publicado 2012
    Tabla de Contenidos: “…BIOS Support: Configuring CMOS and Installing Drivers -- Configuring Controllers -- Autodetection -- Boot Order -- Enabling AHCI -- 802 -- Troubleshooting Hard Drive Installation -- Beyond A+ -- Hybrid Hard Drives -- Chapter Review -- Questions -- Answers -- Chapter 12 Implementing Hard Drives -- Historical/Conceptual -- Hard Drive Partitions -- 802 -- Master Boot Record -- Dynamic Disks -- GUID Partition Table -- Other Partition Types -- When to Partition -- Partition Naming Problems -- Hard Drive Formatting -- File Systems in Windows -- FAT -- FAT32 -- NTFS -- FAT64 -- The Partitioning and Formatting Process -- Bootable Media -- Partitioning and Formatting with the Installation Disc -- Disk Management -- Formatting a Partition -- Maintaining and Troubleshooting Hard Drives -- Maintenance -- Troubleshooting Hard Drive Implementation -- Beyond A+ -- Third-Party Partition Tools -- Chapter Review -- Questions -- Answers -- Chapter 13 Removable Media -- Historical/Conceptual -- Floppy Drives -- Floppy Drive Basics -- 801 -- Installing Floppy Drives -- Flash Memory -- USB Thumb Drives -- Flash Cards -- Optical Drives -- CD-Media -- DVD-Media -- Blu-ray Disc-Media -- Installing Optical Drives -- Troubleshooting Removable Media -- Floppy Drive Maintenance and Troubleshooting -- Troubleshooting Optical Drives and Discs -- Beyond A+ -- Color Books -- BDXL -- Chapter Review -- Questions -- Answers -- Chapter 14 Installing and Upgrading Windows -- 802 -- Preparing for Installation or Upgrade -- Identify Hardware Requirements -- Verify Hardware and Software Compatibility -- Decide What Type of Installation to Perform -- Determine How to Back Up and Restore Existing Data, If Necessary -- Select an Installation Method -- Determine How to Partition the Hard Drive and What File System to Use -- Determine Your Computer's Network Role…”
    Libro electrónico
  18. 398
    Publicado 2004
    Tabla de Contenidos: “…Planning and installation -- 2.1 Overview -- 2.2 Distribution support -- 2.3 Hardware support -- 2.3.1 Integrated xSeries Server support -- 2.3.2 Integrated xSeries Adapter support -- 2.4 Summary of installation procedures -- 2.5 Planning the installation -- 2.5.1 Reviewing the planning documentation -- 2.5.2 Understanding virtual devices -- 2.5.3 Objects created on OS/400 -- 2.6 Installing the hardware -- 2.6.1 Integrated xSeries Server -- 2.6.2 Integrated xSeries Adapter -- 2.7 Completing the pre-installation tasks on OS/400 -- 2.7.1 Installing the required iSeries licensed program for Linux integration -- 2.7.2 Installing the PTFs required for Linux integration support -- 2.7.3 Creating the driver diskette -- 2.7.4 Connecting a USB diskette drive to the Integrated xSeries Server -- 2.7.5 Connecting the integrated server into the Ethernet LAN -- 2.8 Starting the installation from OS/400 -- 2.9 Completing the installation from the Linux console -- 2.9.1 Completing the installation of RHEL 3 -- 2.9.2 Completing the installation of SLES 8 -- 2.10 Completing the post-installation tasks -- 2.10.1 Running the ixssetup.sh script -- 2.10.2 Running the ixsupdt utility -- Chapter 3. …”
    Libro electrónico
  19. 399
    Publicado 2023
    Tabla de Contenidos: “…Wireless Remote Control and Tethering -- Tip 131: Using XApp or the Camera Remote app -- Tip 132: Streaming the live view via HDMI -- Tip 133: Tethered shooting via USB or Wi-Fi -- 2.9. Anything Else? -- Tip 134: Forums, blogs, magazines, and workshops -- Online References…”
    Libro electrónico
  20. 400
    Publicado 2020
    Tabla de Contenidos: “…-- LA NORMA POSIX -- SISTEMAS OPERATIVOS DE RED (NOS) -- REDIRECCIÓN O REXPEDICIÓN -- SOFTWARE DEL SERVIDOR -- SERVICIO DE ARCHIVO -- OPERACIÓN DEL SERVIDOR -- LOS NUEVOS NOS -- CLIENTE SERVIDOR -- CLIENTE SERVIDOR BÁSICO -- UNA SEGUNDA PARTE EN EL TRABAJO -- LAS BUENAS NOTICIAS -- 3 ENTRADA/SALIDA -- EL HARDWARE DE PC -- HARDWARE DE DISPOSITIVOS -- DISTINTOS TIPOS DISPOSITIVOS DE ENTRADA/SALIDA -- DISPOSITIVOS DE BLOQUES -- DISPOSITIVOS DE CARÁCTER -- OTROS DISPOSITIVOS -- EL CONTROLADOR DE DISPOSITIVOS -- INTERFACES PARA DISCOS -- INTERFACES ST-506/412 -- INTERFACES ESDI -- INTERFACES SCSI -- LAS MEJORAS DE SCSI -- INTERFACE IDE -- LAS MEJORAS DE IDE -- LA VELOCIDAD DEL DISCO -- TIEMPO DE ACCESO -- TIEMPO DE LATENCIA -- TIEMPO DE TRANSFERENCIA -- LOS BUSES DE LA PC -- LOCAL BUS -- EL BUS PCI -- OTROS BUSES -- BUS USB -- IEEE 1394 -- ADMINISTRADOR DE DISPOSITIVOS -- SERVICIOS DE DISPOSITIVOS -- MODO DE ENTRADA EDITADO -- DEV PUEDE CUANDO RECIBE -- MODO DE ENTRADA EN BRUTO (RAW INPUT MODE) -- CONTROL DE DISPOSITIVOS (DEVICE CONTROL) -- LA CONSOLA -- FUNCIONES ESPECÍFICAS DE LA CONSOLA -- LOS DISPOSITIVOS PARALELOS -- DESEMPEÑO DE LOS SUBSISTEMAS DE DISPOSITIVOS -- MONTAJE DE UNIDADES E INSTALACIÓN DE PAQUETES EN LINUX -- SERVIDORES DE ARCHIVO (FILE SERVER) -- HARDWARE DEL SERVIDOR -- NECESIDADES DE MEMORIA -- PROCESADOR, RELOJ (CLOCK) Y PUERTOS -- SERVIDORES DE BASES DE DATOS -- LA PARTE FRONTAL (FRONT-END -- VENTAJAS DE LOS SERVIDORES DE BASES DE DATOS -- SISTEMA DE IMPRESION (PRINTING) -- EL SISTEMA DE IMPRESIÓN EN ACCIÓN -- PROBLEMAS EN LA IMPRESIÓN -- UTILITARIOS DE IMPRESIÓN -- PEQUEÑAS SUGERENCIAS -- SERVIDORES MULTIRPOCESADOR…”
    Libro electrónico