|
|
|
|
|
Chained Exploits: Advanced Hacking Attacks from Start to FinishThe complete guide to today’s hard-to-defend chained attacks: performing them and preventing them
Nowadays, it’s rare for malicious hackers to rely on just one exploit or tool; instead, they use “chained” exploits that integrate multiple forms of attack to achieve... | | Fiber Optic Sensors, Second Edition (Optical Science and Engineering)
In recent years, fiber optic sensors have developed from the laboratory
research and development stage to practical applications. The market for
fiber optic sensor technology may be divided into two broad categories
of sensors: intrinsic and extrinsic. Intrinsic sensors are used in medicine,
defense, and aerospace applications,... | | CompTIA RFID+ Study Guide: Exam RF0-101This comprehensive study guide thoroughly covers the CompTIA RFID+ exam, the only certification offered for radio frequency identification (RFID), the technology that is rapidly gaining popularity and is expected to completely replace bar codes. Your study will focus on interrogation zone basics, testing and troubleshooting, standards and... |
|
|
|
|
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |