Mostrando 2,861 - 2,880 Resultados de 5,617 Para Buscar '"hardware"', tiempo de consulta: 0.12s Limitar resultados
  1. 2861
    Publicado 2018
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: The Basics of Networking with AWS -- Introducing cloud computing -- Regions and Availability Zones -- Security and compliance -- Amazon Elastic Compute Cloud -- Security groups -- An overview of networking services -- Amazon Virtual Private Cloud -- Amazon CloudFront -- Amazon Route 53 -- AWS Direct Connect -- Elastic Load Balancing -- Auto Scaling -- Billing Dashboard -- AWS Total Cost of Ownership (TCO) Calculator -- A sample architecture - compute and networking services -- Summary -- Chapter 2: Amazon VPC -- Creating and configuring the VPC -- Creating a VPC using a wizard -- Scenario 1 - VPC with a single public subnet -- Scenario 2 - VPC with public and private subnets -- Scenario 3 - VPC with public and private subnets and hardware VPN access -- Scenario 4 - VPC with a private subnet only and hardware VPN access -- Creating a VPC without using the wizard -- Creating instances in a VPC -- Summary -- Chapter 3: Elastic Load Balancing -- An overview of ELB -- Creating and configuring an ELB -- Accessing the instance remotely using PuTTY -- Summary -- Chapter 4: Auto Scaling -- An overview of Auto Scaling -- Types of Auto Scaling -- Setting up Auto Scaling in a load balanced application -- Amazon Machine Image -- Launch configuration -- Auto Scaling group -- Summary -- Chapter 5: Amazon Route 53 -- Overview of Amazon Route 53 concepts -- Configuring Amazon Route 53 -- Configuring Route 53 for a web application -- Configuring health checks on Route 53 -- Creating a CNAME resource record set -- Summary -- Chapter 6: AWS Direct Connect -- Introducing AWS Direct Connect -- An overview of AWS Direct Connect components -- Summary -- Chapter 7: Security Best Practices -- The shared responsibility model…”
    Libro electrónico
  2. 2862
    Publicado 2010
    “…New APIs also provide support for applications to communicate with hardware accessories attached to iPhone or iPod touch. …”
    Libro electrónico
  3. 2863
    Publicado 2019
    Tabla de Contenidos: “…Kismet -- WiFite -- John the Ripper -- Hashcat -- Chapter 15 CISv7 Controls and Best Practices -- CIS Basic Controls-The Top Six -- Inventory and Control of Hardware Assets -- Inventory and Control of Software Assets -- Continuous Vulnerability Management -- Controlled Use of Administrative Privileges -- Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers -- Maintenance, Monitoring, and Analysis of Audit Logs -- In Conclusion -- Index -- EULA…”
    Libro electrónico
  4. 2864
    Publicado 2007
    Tabla de Contenidos: “…Foreword by Jan Bosch -- Foreword by Antero Taivalsaari -- Preface -- Acknowledgments -- 1 Introduction -- 1.1 Motivation -- 1.2 Commonly Used Hardware and Software -- 1.3 Development Process -- 1.4 Chapter Overview -- 1.5 Summary -- 1.6 Exercises -- 2 Memory Management -- 2.1 Overview -- 2.2 Strategies for Allocating Variables to Memory -- 2.3 Design Patterns for Limited Memory -- 2.4 Memory Management in Mobile Java -- 2.5 Symbian OS Memory Management -- 2.6 Summary -- 2.7 Exercises -- 3 Applications -- 3.1 What Constitutes an Application? …”
    Libro electrónico
  5. 2865
    Publicado 2011
    Tabla de Contenidos: “…; Hacking Toys; Collaboration; 3/The Arduino Platform; The Arduino Hardware; The Software (IDE); Installing Arduino on Your Computer; Installing Drivers: Macintosh; Installing Drivers: Windows; Port Identification: Macintosh; Port Identification: Windows; 4/Really Getting Started with Arduino; Anatomy of an Interactive Device; Sensors and Actuators; Blinking an LED…”
    Libro electrónico
  6. 2866
    por Hoog, Andrew
    Publicado 2011
    Tabla de Contenidos: “…Front Cover; Android Forensics; Copyright; Dedication; Contents; Acknowledgements; Introduction; Chapter 1; Chapter 2; Chapter 3; Chapter 4; Chapter 5; Chapter 6; Chapter 7; Website; About the Author; About the Technical Editor; Chapter 1 -Android and mobile forensics; Introduction; Android platform; Linux, open source software, and forensics; Android Open Source Project; Internationalization; Android Market; Android forensics; Summary; References; Chapter 2 -Android hardware platforms; Introduction; Overview of core components; Overview of different device types; ROM and boot loaders…”
    Libro electrónico
  7. 2867
    Publicado 2023
    Tabla de Contenidos: “…Tool Demos -- EVA: a Tool for the Compositional Verification of AUTOSAR Models -- WASIM: A Word-level Abstract Symbolic Simulation Framework for Hardware Formal Verification -- Multiparty Session Typing in Java, Deductively -- PyLTA: A Verification Tool for Parameterized Distributed Algorithms -- FuzzBtor2: A Random Generator of Word-Level Model Checking Problems in Btor2 Format -- Eclipse ESCETTM: The Eclipse Supervisory Control Engineering Toolkit -- Combinatorial Optimization/Theorem Proving -- New Core-Guided and Hitting Set Algorithms for Multi-Objective Combinatorial Optimization -- Verified reductions for optimization -- Specifying and Verifying Higher-order Rust Iterators -- Extending a High-Performance Prover to Higher-Order Logic -- Tools (Regular Papers) -- The WhyRel Prototype for Relational Verification of Pointer Programs -- Bridging Hardware and Software Analysis with Btor2C: A Word-Level-Circuit-to-C Converter -- CoPTIC: Constraint Programming Translated Into C -- Acacia-Bonsai: A Modern Implementation of Downset-Based LTL Realizability -- Synthesis -- Computing Adequately Permissive Assumptions for Synthesis -- Verification-guided Programmatic Controller Synthesis -- Taming Large Bounds in Synthesis from Bounded-Liveness Specifications -- Lockstep Composition for Unbalanced Loops -- Synthesis of Distributed Agreement-Based Systems with Effciently Decidable Verification -- LTL Reactive Synthesis with a Few Hints -- Timed Automata Verification and Synthesis via Finite Automata Learning -- Graphs/Probabilistic Systems -- A Truly Symbolic Linear-Time Algorithm for SCC Decomposition -- Transforming quantified Boolean formulas using biclique covers -- Certificates for Probabilistic Pushdown Automata via Optimistic Value Iteration -- Probabilistic Program Verification via Inductive Synthesis of Inductive Invariants -- Runtime Monitoring/Program Analysis -- Industrial-Strength Controlled Concurrency Testing for C# Programs with Coyote -- Context-Sensitive Meta-Constraint Systems for Explainable Program Analysis -- Explainable Online Monitoring of Metric Temporal Logic -- 12th Competition on Software Verification — SV-COMP 2023 -- Competition on Software Verification and Witness Validation: SV-COMP 2023 -- Symbiotic-Witch 2: More Efficient Algorithm and Witness Refutation (Competition Contribution) -- 2LS: Arrays and Loop Unwinding (Competition Contribution) -- Bubaak: Runtime Monitoring of Program Verifiers (Competition Contribution) -- EBF 4.2: Black-Box Cooperative Verification for Concurrent Programs (Competition Contribution) -- Goblint: Autotuning Thread-Modular Abstract Interpretation (Competition Contribution) -- Java Ranger: Supporting String and Array Operations (Competition Contribution) -- Korn–Software Verification with Horn Clauses (Competition Contribution) -- Mopsa-C: Modular Domains and Relational Abstract Interpretation for C Programs (Competition Contribution) -- PIChecker: A POR and Interpolation based Verifier for Concurrent Programs (Competition Contribution) -- Ultimate Automizer and the CommuHash Normal Form (Competition Contribution) -- Ultimate Taipan and Race Detection in Ultimate (Competition Contribution) -- VeriAbsL: Scalable Verification by Abstraction and Strategy Prediction (Competition Contribution) -- VeriFuzz 1.4: Checking for (Non-)termination (Competition Contribution). …”
    Libro electrónico
  8. 2868
    Publicado 2007
    Tabla de Contenidos: “…Introducing Windows Vista -- Installing and upgrading Windows Vista -- first hour -- Using the Windows Vista interface -- Managing files and searching -- Printing -- Sidebar and other supplied accessories -- Windows media player -- Windows imaging tools -- Scanning and faxing -- Producing videos with Windows movie maker -- Sound recorder, DVD maker, and other multimedia tools -- Windows media center -- Getting connected -- Using Internet explorer 7 -- Email and newsgroups with Windows mail -- Troubleshooting your Internet connection -- Hosting Web pages with Internet information services -- Overview of Windows networking -- Creating a Windows network -- Mix and match with old Windows and Macs -- Connecting your network to the Internet -- Using a Windows network -- Troubleshooting your network -- Windows management and maintenance -- Tweaking the GUI -- Managing hard disks -- Troubleshooting and repairing problems -- Keeping Windows and other software up to date -- Installing and replacing hardware -- Editing the registry -- Command-line and automation tools -- Protecting Windows from viruses and spyware -- Protecting your data from loss and theft -- Protecting your network from hackers and snoops -- Protecting yourself from fraud and spam -- Wireless networking -- Hitting the road -- Meetings, conferencing, and collaboration -- Remote desktop -- Tablet PC features…”
    Libro electrónico
  9. 2869
    por Masters, Jon, 1981-
    Publicado 2007
    Tabla de Contenidos: “…The Need for Por tabilityThe Por tability of Linux; Hardware Por tability; Chapter 4: Software Configuration Management; The Need for SCM; Centralized vs. …”
    Libro electrónico
  10. 2870
    Publicado 2012
    Tabla de Contenidos: “…-- Examples of Popular APT Tools and Techniques -- Common APTs Indicators -- Summary -- Part III: Infrastructure Hacking -- Case Study: Read it and WEP -- 7 Remote Connectivity and VoIP Hacking -- Preparing to Dial Up -- Wardialing -- Brute-Force Scripting-The Homegrown Way -- PBX Hacking -- Voicemail Hacking -- Virtual Private Network (VPN) Hacking -- Voice over IP Attacks -- Summary -- 8 Wireless Hacking -- Background -- Equipment -- Discovery and Monitoring -- Denial of Service Attacks -- Encryption Attacks -- Authentication Attacks -- Summary -- 9 Hacking Hardware -- Physical Access: Getting in the Door -- Hacking Devices -- Default Configurations -- Reverse Engineering Hardware -- Summary -- Part IV: Application and Data Hacking -- Case Study -- 10 Web and Database Hacking -- Web Server Hacking -- Web Application Hacking -- Common Web Application Vulnerabilities…”
    Libro electrónico
  11. 2871
    Publicado 2022
    Tabla de Contenidos: “…Part I: Getting Started -- Chapter 1: The Internet of Things, V and V, and Testing -- Chapter 2: IoT Technology in Time and Space -- Chapter 3: Big Picture Lessons Learned in IoT Project Test Planning -- Chapter 4: Factors Driving IoT Testing/V and V Selection and Planning -- Chapter 5: Beginner Keys for Starting IoT Test Planning -- Part II: IoT Planning, Test, Strategy and Architecture - Team Leadership -- Chapter 6: IoT Test Plan: Strategy and Architecture Introductions -- Chapter 7: IoT Test Planning and Strategy for Hardware and Software -- Chapter 8: Planning for the IoT Tester on Environments and Testing Details -- Chapter 9: System Engineering Concepts in IoT Test Planning -- Part III: IoT Test Designs and Security Assessments -- Chapter 10: IoT Test Design: Frameworks, Techniques, Attacks, Patterns, and Tours -- Chapter 11: Classic IoT V and V/Test Concepts, Techniques, and Practices -- Chapter 12: Test Approaches and Quality Assessments for IoT Agile/DevOps -- Chapter 13: IoT Software Security Test Attacks and Designs -- Chapter 14: OWASP IoT Information Pointer, and Logging Events -- Chapter 15: Internal Security Team Penetration Test Process -- Chapter 16: IoT Test Environment Introduction -- Part IV: IoT Architectures, Environments, and Integrated Independent Testing -- Chapter 17: Architectures Critical to Project Success -- Chapter 18: Overview of IoT Software Architectures: Products and Testing Support -- Chapter 19: IoT STA System: Software Integration Lab (SIL) Environments -- Chapter 20: Tools for the Software-System Integration Lab (SIL) -- Chapter 21: Environments for Independent Testing and V and V on Large IoT Systems -- Chapter 22: Self-Organizing Data Analytics (SODA): IoT Data Analytics, AI, and Statistics -- Appendix A: IoT Supporting Interface, Hardware, Platform, and Protocol Standards -- Appendix B: Careers in IoT Testing -- Appendix C: IoT Testing Start-up Checklist…”
    Libro electrónico
  12. 2872
    por Moreno Pérez, Juan Carlos
    Publicado 2014
    Tabla de Contenidos:
    Libro electrónico
  13. 2873
    por Chantzis, Fotios
    Publicado 2021
    Tabla de Contenidos: “…Preface Foreword Part One: The IoT Threat Landscape Chapter 1: The IoT Security World Chapter 2: Threat Modeling Chapter 3: A Security Testing Methodology Part Two: Network Hacking Chapter 4: Network Assessments Chapter 5: Analyzing Network Protocols Chapter 6: Exploiting Zero-configuration Networking Part Three: Hardware Hacking Chapter 7: UART, JTAG, and SWD Exploitation Chapter 8: Hacking SPI and I2C Chapter 9: Firmware Hacking Part Four: Radio Hacking Chapter 10: Abusing RFID Chapter 11: Exploiting Bluetooth Low Energy Chapter 12: Wi-Fi Hacking Chapter 13: Exploiting LPWAN Part Five: Targeting the IoT Ecosystem Chapter 14: Attacking Mobile Applications Chapter 15: Hacking the “Smart” Home Appendix A: Tools for IoT Hacking…”
    Libro electrónico
  14. 2874
    Publicado 2015
    Tabla de Contenidos: “…What you'll need : Tools ; Techniques -- Getting the software : Installing Arduino libraries ; Let's get blinking! -- Hardware : Little, round, different ; FLORA power ; Family of add-ons -- Making stitches : Threading the needle ; Using an embroidery hoop ; The running stitch ; Connecting components ; Tying and sealing knots ; Attaching conductive thread buses with a sewing machine -- Your first FLORA project : Layout and circuit diagram ; Sew the circuit ; Get your code on ; Hand embroidering the design ; Battery -- Intermediate project: sparkle skirt : Layout and circuit diagram ; Sew the circuit ; Code and battery ; Wear it! …”
    Libro electrónico
  15. 2875
    por Kumar, Abhishek. author
    Publicado 2020
    Tabla de Contenidos: “…-- Chapter 2: Graphics in the Game Industry -- Chapter 3: The Workflow of Texturing -- Chapter 4: Texturing Games vs Texturing Movies -- Chapter 5: PBR Texturing vs Traditional Texturing -- Chapter 6: Substance Suite and Substance Painter -- Chapter 7: Hardware Specifications for Your Computer -- Chapter 8: Painter's Graphical User Interface -- Chapter 9: Viewport Navigation in Painter -- Chapter 10: Project Setup: Importing a 3D Model into Painter -- Chapter 11: Baking and the Importance of Mesh Maps -- Chapter 12: Working with Materials, Layers, and Masks -- Chapter 13: Working with Procedural Maps -- Chapter 14: Substance Anchors -- Chapter 15: Rendering with Iray -- Chapter 16: Integration with Marmoset, Maya, and Blender -- Chapter 17: Rendering a Portfolio -- Chapter 18: Integration with Unreal Engine (UE4) -- Chapter 19: Tips and Tricks of Substance Painter…”
    Libro electrónico
  16. 2876
    por Skidmore, Rachael
    Publicado 2023
    Tabla de Contenidos: “…Cover -- Title -- Contents -- Introduction -- Before Baking -- Polymer Clay Brands -- Safety -- Tools -- Jewelry Hardware -- Color Palette -- Color Basics -- How to Pick a Color Palette -- Color Mixing -- Conditioning Clay -- Projects -- The Dua: Colorful Abstract Earrings -- The Nina: Faux Turquoise -- The Marina: Layered Slab -- The Jenasie: Checkered-Print Earrings -- The Jess: Shaved Terrazzo -- The Sam: Rainbow Flowers -- The Alex: Cloudy Rainbows -- The Lara: Mokume-Gane Cane -- The Rae: Marble Cutout Earrings -- The Mackenzie: Retro Circles -- The Saylor: Shell Earrings Inlay -- The Trish: Hammered "Metal" Earrings -- The Di: Bead Hoops -- The MJ: Cutout Retro -- The Maggie: Two-tone Hoops -- The Ruby: Watercolor Method -- Pop-Art Bananas: Painting with Liquid Clay -- The Sara: Gradient Agate Earrings -- Baking &amp -- After Baking -- Scrap Clay -- Attaching Backs -- Sanding -- Texture -- Baking Guide -- Cleaning &amp -- Care -- About the Author -- Dedication -- Copyright…”
    Libro electrónico
  17. 2877
    Publicado 2010
    Tabla de Contenidos: “…Plan Your Mac Network -- Set Up the Network Hardware -- Set Up your Mac OS X Server -- Secure Your Server -- Set Up Open Directory -- Set Up Client Systems -- Create and Control Users and Groups -- Add the iPhone or iPod Touch to Your Network -- Part II: Provide Services and Applications. …”
    Libro electrónico
  18. 2878
    Publicado 2010
    Tabla de Contenidos: “…Stage management -- ch. 14. Hardware, fabrics, adhesives, and other theatrical supplies -- ch. 15. …”
    Libro electrónico
  19. 2879
    Publicado 2012
    Tabla de Contenidos: “…Starting and stopping Windows 8 -- Interacting with Windows 8 -- Learning Windows 8 basics -- Personalizing Windows 8 -- Connecting to the Internet -- Surfing the Web in Windows 8 -- Connecting with the People app -- Using the Mail app and messaging to stay connected -- Using the Calendar app -- Sharing your Windows 8 computer with others -- Sharing files and printers with Homegroup -- Mastering Windows 8 apps -- Working with the Desktop app -- Using Windows Desktop programs -- Organizing files and folders with Windows Explorer -- Storing files on drives, disks, and the cloud -- Setting up hardware the easy way -- Printing, scanning, and faxing in Windows 8 -- Safe and private Internet computing -- Performing routine maintenance -- Troubleshooting and solving problems in Windows 8 -- Keeping current with the Bing apps -- Enjoying your digital photos -- Enjoying movies and videos in Windows 8 -- Listening to music in Windows 8 -- Gametime with Windows 8 and Xbox 360.…”
    Libro electrónico
  20. 2880
    Publicado 2017
    Tabla de Contenidos:
    Libro electrónico