Search Results - "smart homes"
Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 2
- Afghan War, 2001- 1
- Amputees 1
- Architecture, Domestic 1
- Computer networks 1
- Design and construction 1
- Designs and plans 1
- Dwellings 1
- Ecological houses 1
- Electric power systems 1
- Electrical engineering 1
- Embedded Internet devices 1
- Energy conservation 1
- Hacking 1
- Heating and ventilation 1
- Internet of things 1
- Semantic Web 1
- Veterans 1
- Wireless LANs 1
- Wireless communication systems 1
- security measures 1
- xx 1
-
1
200 budget-smart home plans affordable homes from 902 to 2540 square feet
Published 1992“…Two hundred budget-smart home plans…”
Book -
2
-
3
-
4
-
5
-
6
-
7
-
8
-
9
Hacking exposed wireless wireless security secrets & solutions
Published 2015Table of Contents: “…Introduction -- Part I: Hacking 802.11 Wireless Technology -- Case Study: Twelve Volt Hero -- 1 Introduction to 802.11 Hacking -- 2 Scanning and Enumerating 802.11 Networks -- 3 Attacking 802.11 Wireless Networks -- 4 Attacking WPA-Protected 802.11 Networks -- 5 Attacking 802.11 Wireless Clients -- 6 Taking It All the Way: Bridging the Air-Gap from Windows 8 -- Part II: Bluetooth -- Case Study: You Can Still Hack What You Can't See -- 7 Bluetooth Classic Scanning and Reconnaissance -- 8 Bluetooth Low Energy Scanning and Reconnaissance -- 9 Bluetooth Eavesdropping -- 10 Attacking and Exploiting Bluetooth -- Part III: More Ubiquitous Wireless -- Case Study: Failure Is Not an Option -- 11 Software-Defined Radios -- 12 Hacking Cellular Networks -- 13 Hacking ZigBee -- 14 Hacking Z-Wave Smart Homes…”
Book -
10
Applied approach to privacy and security for the internet of things
Published 2020Table of Contents: “…Collision avoidance methodology in internet of things & wireless ad hoc network / Arundhati Arjaria, Priyanka Dixit -- Information security management system : a case study of employee management / Manoj Srivastav -- Anomaly detection in IoT frameworks using machine learning / Phidahunlang Chyne, Parag Chatterjee, Sugata Sanyal, Debdatta Kandar -- Real-time, cross-platform detection of spectre and meltdown attack variants / Xinxing Zhao, Chandra Veerappan, Peter Loh -- Trust models in IoT / Shiladitya Sengupta -- Vulnerabilities of smart home / Suchandra Datta -- Security and privacy vulnerabilities in automated driving / Suchandra Datta -- Key vulnerabilities in IoT systems / Shiladitya Sengupta -- IoT forensic : principles, processes and activities / Eoghan Casey, Hannes Spichiger, Elénore Ryser, Francesco Servida, David-Olivier Jaquet-Chiffelle -- IoT controlled railway gate system with ML object detection approach : applied approach for secured IOT system / Megha Kamble…”
Book -
11
-
12
Rebuilding Sergeant Peck how I put body and soul back together after Afghanistan
Published 2019Table of Contents: “…Chapter 1 Just the two of us -- Chapter 2 Just a sperm donor -- Chapter 3 My angry adolescence -- Chapter 4 Young buck discovers the marines -- Chapter 5 Becoming a marine -- Chapter 6 Refining my skills -- Chapter 7 In Country: the first blast -- Chapter 8 I don't know why i love you -- Chapter 9 Finally, a marine again -- Chapter 10 Becoming a squad leader -- Chapter 11 Back in the game -- Chapter 12 Waking up without arms and legs -- Chapter 13 Becoming independent: no nursing home for me -- Chapter 14 Bethesda bound: my recovery continues -- Chapter 15 Making tracks with trackchairs -- Chapter 16 Navigating my new smart home -- Chapter 17 All Roads lead to boston -- Chapter 18 Finding my penguin -- Chapter 19 My bilateral arm transplant: the run-up -- Chapter 20 Transplant itself: rearming a marine -- Chapter 21 Long, hard road out of boston -- Chapter 22 Sergeant John Peck, new and improved -- Chapter 23 Paying it forward.…”
Book


