Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Information Technology 1,261
- Computer Science (Hardware & Networks) 1,254
- Engineering & Applied Sciences 420
- Computer Science 293
- Operating systems (Computers) 292
- Computer networks 279
- Programming 214
- Application software 182
- Development 173
- Computer security 168
- Security measures 163
- Examinations 162
- Linux 160
- Certification 153
- Computer input-output equipment 142
- Database management 137
- Electronic data processing personnel 124
- Management 120
- Computers 115
- Electrical & Computer Engineering 114
- Electronic data processing 112
- Embedded computer systems 111
- Microcomputers 111
- Microsoft Windows (Computer file) 111
- Data processing 110
- Hardware and Maker 107
- Artificial intelligence 104
- Design and construction 102
- Cloud computing 100
- Client/server computing 98
-
2861Publicado 2018Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: The Basics of Networking with AWS -- Introducing cloud computing -- Regions and Availability Zones -- Security and compliance -- Amazon Elastic Compute Cloud -- Security groups -- An overview of networking services -- Amazon Virtual Private Cloud -- Amazon CloudFront -- Amazon Route 53 -- AWS Direct Connect -- Elastic Load Balancing -- Auto Scaling -- Billing Dashboard -- AWS Total Cost of Ownership (TCO) Calculator -- A sample architecture - compute and networking services -- Summary -- Chapter 2: Amazon VPC -- Creating and configuring the VPC -- Creating a VPC using a wizard -- Scenario 1 - VPC with a single public subnet -- Scenario 2 - VPC with public and private subnets -- Scenario 3 - VPC with public and private subnets and hardware VPN access -- Scenario 4 - VPC with a private subnet only and hardware VPN access -- Creating a VPC without using the wizard -- Creating instances in a VPC -- Summary -- Chapter 3: Elastic Load Balancing -- An overview of ELB -- Creating and configuring an ELB -- Accessing the instance remotely using PuTTY -- Summary -- Chapter 4: Auto Scaling -- An overview of Auto Scaling -- Types of Auto Scaling -- Setting up Auto Scaling in a load balanced application -- Amazon Machine Image -- Launch configuration -- Auto Scaling group -- Summary -- Chapter 5: Amazon Route 53 -- Overview of Amazon Route 53 concepts -- Configuring Amazon Route 53 -- Configuring Route 53 for a web application -- Configuring health checks on Route 53 -- Creating a CNAME resource record set -- Summary -- Chapter 6: AWS Direct Connect -- Introducing AWS Direct Connect -- An overview of AWS Direct Connect components -- Summary -- Chapter 7: Security Best Practices -- The shared responsibility model…”
Libro electrónico -
2862Publicado 2010“…New APIs also provide support for applications to communicate with hardware accessories attached to iPhone or iPod touch. …”
Libro electrónico -
2863Publicado 2019Tabla de Contenidos: “…Kismet -- WiFite -- John the Ripper -- Hashcat -- Chapter 15 CISv7 Controls and Best Practices -- CIS Basic Controls-The Top Six -- Inventory and Control of Hardware Assets -- Inventory and Control of Software Assets -- Continuous Vulnerability Management -- Controlled Use of Administrative Privileges -- Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers -- Maintenance, Monitoring, and Analysis of Audit Logs -- In Conclusion -- Index -- EULA…”
Libro electrónico -
2864Publicado 2007Tabla de Contenidos: “…Foreword by Jan Bosch -- Foreword by Antero Taivalsaari -- Preface -- Acknowledgments -- 1 Introduction -- 1.1 Motivation -- 1.2 Commonly Used Hardware and Software -- 1.3 Development Process -- 1.4 Chapter Overview -- 1.5 Summary -- 1.6 Exercises -- 2 Memory Management -- 2.1 Overview -- 2.2 Strategies for Allocating Variables to Memory -- 2.3 Design Patterns for Limited Memory -- 2.4 Memory Management in Mobile Java -- 2.5 Symbian OS Memory Management -- 2.6 Summary -- 2.7 Exercises -- 3 Applications -- 3.1 What Constitutes an Application? …”
Libro electrónico -
2865Publicado 2011Tabla de Contenidos: “…; Hacking Toys; Collaboration; 3/The Arduino Platform; The Arduino Hardware; The Software (IDE); Installing Arduino on Your Computer; Installing Drivers: Macintosh; Installing Drivers: Windows; Port Identification: Macintosh; Port Identification: Windows; 4/Really Getting Started with Arduino; Anatomy of an Interactive Device; Sensors and Actuators; Blinking an LED…”
Libro electrónico -
2866por Hoog, AndrewTabla de Contenidos: “…Front Cover; Android Forensics; Copyright; Dedication; Contents; Acknowledgements; Introduction; Chapter 1; Chapter 2; Chapter 3; Chapter 4; Chapter 5; Chapter 6; Chapter 7; Website; About the Author; About the Technical Editor; Chapter 1 -Android and mobile forensics; Introduction; Android platform; Linux, open source software, and forensics; Android Open Source Project; Internationalization; Android Market; Android forensics; Summary; References; Chapter 2 -Android hardware platforms; Introduction; Overview of core components; Overview of different device types; ROM and boot loaders…”
Publicado 2011
Libro electrónico -
2867Publicado 2023Tabla de Contenidos: “…Tool Demos -- EVA: a Tool for the Compositional Verification of AUTOSAR Models -- WASIM: A Word-level Abstract Symbolic Simulation Framework for Hardware Formal Verification -- Multiparty Session Typing in Java, Deductively -- PyLTA: A Verification Tool for Parameterized Distributed Algorithms -- FuzzBtor2: A Random Generator of Word-Level Model Checking Problems in Btor2 Format -- Eclipse ESCETTM: The Eclipse Supervisory Control Engineering Toolkit -- Combinatorial Optimization/Theorem Proving -- New Core-Guided and Hitting Set Algorithms for Multi-Objective Combinatorial Optimization -- Verified reductions for optimization -- Specifying and Verifying Higher-order Rust Iterators -- Extending a High-Performance Prover to Higher-Order Logic -- Tools (Regular Papers) -- The WhyRel Prototype for Relational Verification of Pointer Programs -- Bridging Hardware and Software Analysis with Btor2C: A Word-Level-Circuit-to-C Converter -- CoPTIC: Constraint Programming Translated Into C -- Acacia-Bonsai: A Modern Implementation of Downset-Based LTL Realizability -- Synthesis -- Computing Adequately Permissive Assumptions for Synthesis -- Verification-guided Programmatic Controller Synthesis -- Taming Large Bounds in Synthesis from Bounded-Liveness Specifications -- Lockstep Composition for Unbalanced Loops -- Synthesis of Distributed Agreement-Based Systems with Effciently Decidable Verification -- LTL Reactive Synthesis with a Few Hints -- Timed Automata Verification and Synthesis via Finite Automata Learning -- Graphs/Probabilistic Systems -- A Truly Symbolic Linear-Time Algorithm for SCC Decomposition -- Transforming quantified Boolean formulas using biclique covers -- Certificates for Probabilistic Pushdown Automata via Optimistic Value Iteration -- Probabilistic Program Verification via Inductive Synthesis of Inductive Invariants -- Runtime Monitoring/Program Analysis -- Industrial-Strength Controlled Concurrency Testing for C# Programs with Coyote -- Context-Sensitive Meta-Constraint Systems for Explainable Program Analysis -- Explainable Online Monitoring of Metric Temporal Logic -- 12th Competition on Software Verification — SV-COMP 2023 -- Competition on Software Verification and Witness Validation: SV-COMP 2023 -- Symbiotic-Witch 2: More Efficient Algorithm and Witness Refutation (Competition Contribution) -- 2LS: Arrays and Loop Unwinding (Competition Contribution) -- Bubaak: Runtime Monitoring of Program Verifiers (Competition Contribution) -- EBF 4.2: Black-Box Cooperative Verification for Concurrent Programs (Competition Contribution) -- Goblint: Autotuning Thread-Modular Abstract Interpretation (Competition Contribution) -- Java Ranger: Supporting String and Array Operations (Competition Contribution) -- Korn–Software Verification with Horn Clauses (Competition Contribution) -- Mopsa-C: Modular Domains and Relational Abstract Interpretation for C Programs (Competition Contribution) -- PIChecker: A POR and Interpolation based Verifier for Concurrent Programs (Competition Contribution) -- Ultimate Automizer and the CommuHash Normal Form (Competition Contribution) -- Ultimate Taipan and Race Detection in Ultimate (Competition Contribution) -- VeriAbsL: Scalable Verification by Abstraction and Strategy Prediction (Competition Contribution) -- VeriFuzz 1.4: Checking for (Non-)termination (Competition Contribution). …”
Libro electrónico -
2868Publicado 2007Tabla de Contenidos: “…Introducing Windows Vista -- Installing and upgrading Windows Vista -- first hour -- Using the Windows Vista interface -- Managing files and searching -- Printing -- Sidebar and other supplied accessories -- Windows media player -- Windows imaging tools -- Scanning and faxing -- Producing videos with Windows movie maker -- Sound recorder, DVD maker, and other multimedia tools -- Windows media center -- Getting connected -- Using Internet explorer 7 -- Email and newsgroups with Windows mail -- Troubleshooting your Internet connection -- Hosting Web pages with Internet information services -- Overview of Windows networking -- Creating a Windows network -- Mix and match with old Windows and Macs -- Connecting your network to the Internet -- Using a Windows network -- Troubleshooting your network -- Windows management and maintenance -- Tweaking the GUI -- Managing hard disks -- Troubleshooting and repairing problems -- Keeping Windows and other software up to date -- Installing and replacing hardware -- Editing the registry -- Command-line and automation tools -- Protecting Windows from viruses and spyware -- Protecting your data from loss and theft -- Protecting your network from hackers and snoops -- Protecting yourself from fraud and spam -- Wireless networking -- Hitting the road -- Meetings, conferencing, and collaboration -- Remote desktop -- Tablet PC features…”
Libro electrónico -
2869por Masters, Jon, 1981-Tabla de Contenidos: “…The Need for Por tabilityThe Por tability of Linux; Hardware Por tability; Chapter 4: Software Configuration Management; The Need for SCM; Centralized vs. …”
Publicado 2007
Libro electrónico -
2870Publicado 2012Tabla de Contenidos: “…-- Examples of Popular APT Tools and Techniques -- Common APTs Indicators -- Summary -- Part III: Infrastructure Hacking -- Case Study: Read it and WEP -- 7 Remote Connectivity and VoIP Hacking -- Preparing to Dial Up -- Wardialing -- Brute-Force Scripting-The Homegrown Way -- PBX Hacking -- Voicemail Hacking -- Virtual Private Network (VPN) Hacking -- Voice over IP Attacks -- Summary -- 8 Wireless Hacking -- Background -- Equipment -- Discovery and Monitoring -- Denial of Service Attacks -- Encryption Attacks -- Authentication Attacks -- Summary -- 9 Hacking Hardware -- Physical Access: Getting in the Door -- Hacking Devices -- Default Configurations -- Reverse Engineering Hardware -- Summary -- Part IV: Application and Data Hacking -- Case Study -- 10 Web and Database Hacking -- Web Server Hacking -- Web Application Hacking -- Common Web Application Vulnerabilities…”
Libro electrónico -
2871Publicado 2022Tabla de Contenidos: “…Part I: Getting Started -- Chapter 1: The Internet of Things, V and V, and Testing -- Chapter 2: IoT Technology in Time and Space -- Chapter 3: Big Picture Lessons Learned in IoT Project Test Planning -- Chapter 4: Factors Driving IoT Testing/V and V Selection and Planning -- Chapter 5: Beginner Keys for Starting IoT Test Planning -- Part II: IoT Planning, Test, Strategy and Architecture - Team Leadership -- Chapter 6: IoT Test Plan: Strategy and Architecture Introductions -- Chapter 7: IoT Test Planning and Strategy for Hardware and Software -- Chapter 8: Planning for the IoT Tester on Environments and Testing Details -- Chapter 9: System Engineering Concepts in IoT Test Planning -- Part III: IoT Test Designs and Security Assessments -- Chapter 10: IoT Test Design: Frameworks, Techniques, Attacks, Patterns, and Tours -- Chapter 11: Classic IoT V and V/Test Concepts, Techniques, and Practices -- Chapter 12: Test Approaches and Quality Assessments for IoT Agile/DevOps -- Chapter 13: IoT Software Security Test Attacks and Designs -- Chapter 14: OWASP IoT Information Pointer, and Logging Events -- Chapter 15: Internal Security Team Penetration Test Process -- Chapter 16: IoT Test Environment Introduction -- Part IV: IoT Architectures, Environments, and Integrated Independent Testing -- Chapter 17: Architectures Critical to Project Success -- Chapter 18: Overview of IoT Software Architectures: Products and Testing Support -- Chapter 19: IoT STA System: Software Integration Lab (SIL) Environments -- Chapter 20: Tools for the Software-System Integration Lab (SIL) -- Chapter 21: Environments for Independent Testing and V and V on Large IoT Systems -- Chapter 22: Self-Organizing Data Analytics (SODA): IoT Data Analytics, AI, and Statistics -- Appendix A: IoT Supporting Interface, Hardware, Platform, and Protocol Standards -- Appendix B: Careers in IoT Testing -- Appendix C: IoT Testing Start-up Checklist…”
Libro electrónico -
2872por Moreno Pérez, Juan CarlosTabla de Contenidos:
Publicado 2014Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
2873por Chantzis, FotiosTabla de Contenidos: “…Preface Foreword Part One: The IoT Threat Landscape Chapter 1: The IoT Security World Chapter 2: Threat Modeling Chapter 3: A Security Testing Methodology Part Two: Network Hacking Chapter 4: Network Assessments Chapter 5: Analyzing Network Protocols Chapter 6: Exploiting Zero-configuration Networking Part Three: Hardware Hacking Chapter 7: UART, JTAG, and SWD Exploitation Chapter 8: Hacking SPI and I2C Chapter 9: Firmware Hacking Part Four: Radio Hacking Chapter 10: Abusing RFID Chapter 11: Exploiting Bluetooth Low Energy Chapter 12: Wi-Fi Hacking Chapter 13: Exploiting LPWAN Part Five: Targeting the IoT Ecosystem Chapter 14: Attacking Mobile Applications Chapter 15: Hacking the “Smart” Home Appendix A: Tools for IoT Hacking…”
Publicado 2021
Libro electrónico -
2874Getting started with Adafruit FLORA making wearables with an Arduino-compatible electronics platformPublicado 2015Tabla de Contenidos: “…What you'll need : Tools ; Techniques -- Getting the software : Installing Arduino libraries ; Let's get blinking! -- Hardware : Little, round, different ; FLORA power ; Family of add-ons -- Making stitches : Threading the needle ; Using an embroidery hoop ; The running stitch ; Connecting components ; Tying and sealing knots ; Attaching conductive thread buses with a sewing machine -- Your first FLORA project : Layout and circuit diagram ; Sew the circuit ; Get your code on ; Hand embroidering the design ; Battery -- Intermediate project: sparkle skirt : Layout and circuit diagram ; Sew the circuit ; Code and battery ; Wear it! …”
Libro electrónico -
2875por Kumar, Abhishek. authorTabla de Contenidos: “…-- Chapter 2: Graphics in the Game Industry -- Chapter 3: The Workflow of Texturing -- Chapter 4: Texturing Games vs Texturing Movies -- Chapter 5: PBR Texturing vs Traditional Texturing -- Chapter 6: Substance Suite and Substance Painter -- Chapter 7: Hardware Specifications for Your Computer -- Chapter 8: Painter's Graphical User Interface -- Chapter 9: Viewport Navigation in Painter -- Chapter 10: Project Setup: Importing a 3D Model into Painter -- Chapter 11: Baking and the Importance of Mesh Maps -- Chapter 12: Working with Materials, Layers, and Masks -- Chapter 13: Working with Procedural Maps -- Chapter 14: Substance Anchors -- Chapter 15: Rendering with Iray -- Chapter 16: Integration with Marmoset, Maya, and Blender -- Chapter 17: Rendering a Portfolio -- Chapter 18: Integration with Unreal Engine (UE4) -- Chapter 19: Tips and Tricks of Substance Painter…”
Publicado 2020
Libro electrónico -
2876por Skidmore, RachaelTabla de Contenidos: “…Cover -- Title -- Contents -- Introduction -- Before Baking -- Polymer Clay Brands -- Safety -- Tools -- Jewelry Hardware -- Color Palette -- Color Basics -- How to Pick a Color Palette -- Color Mixing -- Conditioning Clay -- Projects -- The Dua: Colorful Abstract Earrings -- The Nina: Faux Turquoise -- The Marina: Layered Slab -- The Jenasie: Checkered-Print Earrings -- The Jess: Shaved Terrazzo -- The Sam: Rainbow Flowers -- The Alex: Cloudy Rainbows -- The Lara: Mokume-Gane Cane -- The Rae: Marble Cutout Earrings -- The Mackenzie: Retro Circles -- The Saylor: Shell Earrings Inlay -- The Trish: Hammered "Metal" Earrings -- The Di: Bead Hoops -- The MJ: Cutout Retro -- The Maggie: Two-tone Hoops -- The Ruby: Watercolor Method -- Pop-Art Bananas: Painting with Liquid Clay -- The Sara: Gradient Agate Earrings -- Baking & -- After Baking -- Scrap Clay -- Attaching Backs -- Sanding -- Texture -- Baking Guide -- Cleaning & -- Care -- About the Author -- Dedication -- Copyright…”
Publicado 2023
Libro electrónico -
2877Publicado 2010Tabla de Contenidos: “…Plan Your Mac Network -- Set Up the Network Hardware -- Set Up your Mac OS X Server -- Secure Your Server -- Set Up Open Directory -- Set Up Client Systems -- Create and Control Users and Groups -- Add the iPhone or iPod Touch to Your Network -- Part II: Provide Services and Applications. …”
Libro electrónico -
2878Publicado 2010Tabla de Contenidos: “…Stage management -- ch. 14. Hardware, fabrics, adhesives, and other theatrical supplies -- ch. 15. …”
Libro electrónico -
2879Publicado 2012Tabla de Contenidos: “…Starting and stopping Windows 8 -- Interacting with Windows 8 -- Learning Windows 8 basics -- Personalizing Windows 8 -- Connecting to the Internet -- Surfing the Web in Windows 8 -- Connecting with the People app -- Using the Mail app and messaging to stay connected -- Using the Calendar app -- Sharing your Windows 8 computer with others -- Sharing files and printers with Homegroup -- Mastering Windows 8 apps -- Working with the Desktop app -- Using Windows Desktop programs -- Organizing files and folders with Windows Explorer -- Storing files on drives, disks, and the cloud -- Setting up hardware the easy way -- Printing, scanning, and faxing in Windows 8 -- Safe and private Internet computing -- Performing routine maintenance -- Troubleshooting and solving problems in Windows 8 -- Keeping current with the Bing apps -- Enjoying your digital photos -- Enjoying movies and videos in Windows 8 -- Listening to music in Windows 8 -- Gametime with Windows 8 and Xbox 360.…”
Libro electrónico -
2880