137 resultater (0,32863 sekunder)

Mærke

Butik

Pris (EUR)

Nulstil filter

Produkter
Fra
Butikker

Make: Bluetooth - Sandeep Mistry - Bog - O'Reilly Media - Plusbog.dk

Bluetooth 5.0 Modem Design for IoT Devices - Khaled Salah Mohamed - Bog - Springer Nature Switzerland AG - Plusbog.dk

Build Your Own Teams of Robots with LEGO Mindstorms NXT and Bluetooth - Bob Kramer - Bog - McGraw-Hill Education - Europe - Plusbog.dk

Build Your Own Teams of Robots with LEGO Mindstorms NXT and Bluetooth - Bob Kramer - Bog - McGraw-Hill Education - Europe - Plusbog.dk

Publisher''s Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. CREATE YOUR OWN SYNCHRONIZED ROBOT ARMY! PLAN, DESIGN, ASSEMBLE, AND PROGRAM ROBOT SQUADS THAT COMMUNICATE and cooperate with each other to accomplish together what they can’t do individually. Build Your Own Teams of Robots with LEGO MINDSTORMS NXT and Bluetooth shows you how to construct a team capability matrix (TCM) and use the Bluetooth Robotic-Oriented Network (BRON) so your robot teams can share sensors, actuators, end effectors, motor power, and programs. Find out how the Bluetooth communications protocol works and how to program Bluetooth in NXT-G, NXC, LabVIEW, and Java. Learn how to send and receive Bluetoothmessages, data, and commands among robots, between a robot and a computer, and between an Android smart phone and a robot. Through teamwork, your robots will be able to accomplish amazing feats! THE STEP-BY-STEP ROBOT TEAM PROJECTS IN THE BOOK INCLUDE:* Crime Scene Investigation Robot Team * Robot Convoy * Rubik''s Cube Solver LEARN HOW TO: - Coordinate multiple robots to work together as a team to perform tasks - Combine two or more microcontrollers to make a single, multicontroller/multi-agent robot - Take advantage of sensor and actuator capabilities in a team environment - Establish goals and teamwork strategies for your robots - Control your robot teams with NXT-G Bluetooth bricks and LabVIEW for NXT Bluetooth VI - Activate your team using a smart phone - Give your team of robots Java power with leJOS - Use Java on the Linux and Darwin operating systems Watch video demonstrations of the projects and download code and examples in multiple languages (NXT-G, Java, LabVIEW, and NXC) from the book''s companion websiteat www.robotteams.org. Downloads are also available at mhprofessional.com/robotteams.

DKK 344.00
1

Preventing Bluetooth and Wireless Attacks in IoMT Healthcare Systems - John Chirillo - Bog - John Wiley & Sons Inc - Plusbog.dk

Preventing Bluetooth and Wireless Attacks in IoMT Healthcare Systems - John Chirillo - Bog - John Wiley & Sons Inc - Plusbog.dk

A timely technical guide to securing network-connected medical devices In Preventing Bluetooth and Wireless Attacks in IoMT Healthcare Systems, Principal Security Architect for Connection, John Chirillo, delivers a robust and up-to-date discussion of securing network-connected medical devices. The author walks you through available attack vectors, detection and prevention strategies, probable future trends, emerging threats, and legal, regulatory, and ethical considerations that will frequently arise for practitioners working in the area. Following an introduction to the field of Internet of Medical Things devices and their recent evolution, the book provides a detailed and technical series of discussions—including common real-world scenarios, examples, and case studies—on how to prevent both common and unusual attacks against these devices. Inside the book: Techniques for using recently created tools, including new encryption methods and artificial intelligence, to safeguard healthcare technologyExplorations of how the rise of quantum computing, 5G, and other new or emerging technology might impact medical device securityExaminations of sophisticated techniques used by bad actors to exploit vulnerabilities on Bluetooth and other wireless networks Perfect for cybersecurity professionals, IT specialists in healthcare environments, and IT, cybersecurity, or medical researchers with an interest in protecting sensitive personal data and critical medical infrastructure, Preventing Bluetooth and Wireless Attacks in IoMT Healthcare Systems is a timely and comprehensive guide to securing medical devices.

DKK 427.00
1

5G/5G-Advanced, Wi-Fi 6/7, and Bluetooth 5/6 - Douglas H Morais - Bog - Springer International Publishing AG - Plusbog.dk

Programming the Intel Edison: Getting Started with Processing and Python - Donald Norris - Bog - McGraw-Hill Education - Plusbog.dk

Hacking Exposed Wireless, Third Edition - Joshua Wright - Bog - McGraw-Hill Education - Europe - Plusbog.dk

Hacking Exposed Wireless, Third Edition - Joshua Wright - Bog - McGraw-Hill Education - Europe - Plusbog.dk

Publisher''s Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Exploit and defend against the latest wireless network attacks Learn to exploit weaknesses in wireless network environments using the innovative techniques in this thoroughly updated guide. Inside, you’ll find concise technical overviews, the latest attack methods, and ready-to-deploy countermeasures. Find out how to leverage wireless eavesdropping, break encryption systems, deliver remote exploits, and manipulate 802.11 clients, and learn how attackers impersonate cellular networks. Hacking Exposed Wireless, Third Edition features expert coverage of ever-expanding threats that affect leading-edge technologies, including Bluetooth Low Energy, Software Defined Radio (SDR), ZigBee, and Z-Wave. - Assemble a wireless attack toolkit and master the hacker’s weapons - Effectively scan and enumerate WiFi networks and client devices - Leverage advanced wireless attack tools, including Wifite, Scapy, Pyrit, Metasploit, KillerBee, and the Aircrack-ng suite - Develop and launch client-side attacks using Ettercap and the WiFi Pineapple - Hack cellular networks with Airprobe, Kraken, Pytacle, and YateBTS - Exploit holes in WPA and WPA2 personal and enterprise security schemes - Leverage rogue hotspots to deliver remote access software through fraudulent software updates - Eavesdrop on Bluetooth Classic and Bluetooth Low Energy traffic - Capture and evaluate proprietary wireless technology with Software Defined Radio tools - Explore vulnerabilities in ZigBee and Z-Wave-connected smart homes and offices - Attack remote wireless networks using compromised Windows systems and built-in tools

DKK 503.00
1