Networking & Cloud Computing
azw3, epub, pdf |eng | 2015-07-15 | Author:Piyush Verma
OS fingerprinting attempts OS fingerprinting is the technique where an attacker tries to identify the operating system running on the target machine(s). An attacker can perform either passive or active ...
( Category:
Network Security
April 4,2019 )
epub |eng | 2018-07-24 | Author:Mark Van Rijmenam,Philippa Ryan & Philippa Ryan
5.12 Conclusion Corruption corrodes public trust, undermines the rule of law, and ultimately delegitimises the state [182]. Rules and regulations are circumvented by bribes, public budget control is undermined by ...
( Category:
Network Administration
April 1,2019 )
epub, pdf |eng | 2014-01-13 | Author:Ed Wilson [Ed Wilson]
Note Keep in mind that you want to convert the contents of the passwordHash.txt file to a secure string and not the path to the passwordHash.txt file. The first time ...
( Category:
Enterprise Applications
April 1,2019 )
epub, pdf |eng | 2009-11-12 | Author:Dan Zarrella [Dan Zarrella]
Figure 6-11. StumbleUpon has more mainstream appeal than Digg. StumbleUpon Perhaps the most mainstream social bookmarking site, StumbleUpon also differs from the standard voting site interface. Rather than a front ...
( Category:
E-Commerce
April 1,2019 )
epub |eng | 2013-05-28 | Author:Brian Svidergol & Robbie Allen
Using a command-line interface The following command creates an AD integrated reverse zone: > dnscmd <DNSServerName> /zoneadd <ZoneName> /DsPrimary Using PowerShell The following PowerShell command will create an Active Directory−integrated ...
( Category:
Networks
April 1,2019 )
epub |eng | 2010-03-04 | Author:Iljitsch van Beijnum [Iljitsch van Beijnum]
Smurf directed broadcast amplification “Smurf” attacks use misconfigured intermediate networks to multiply traffic, allowing attackers to easily muster up large amounts of traffic without the need to hack any systems. ...
( Category:
Networks, Protocols & APIs
April 1,2019 )
epub, azw3 |eng | 2015-06-14 | Author:Craig Sebenik & Thomas Hatch
[vagrant@master ~]$ cat /srv/salt/file/base/jinja/simple_var.sls {% set simple_var = 'a simple variable' %} jinja_var: cmd.run: - name: echo "Simple var is {{ simple_var }}" Then we can run that and see ...
( Category:
Linux & UNIX Administration
April 1,2019 )
mobi, epub |eng | 2009-07-15 | Author:Harry Reynolds and Doug Marschke
Enter the Routed VLAN Interface While lollipop routing has a certain aesthetic appeal, it was not long before a sharp engineer realized that by adding some primitive Layer 3 functionality ...
( Category:
Networks, Protocols & APIs
April 1,2019 )
mobi, epub |eng | 2015-03-16 | Author:Chris Barbour
Variable Qualifiecation Local variables should be unqualified, global variables should be fully qualified, and fully qualified out-of-scope variable references should be avoided if possible. Fully qualifying variable names accomplishes two ...
( Category:
Linux & UNIX Administration
April 1,2019 )
mobi, epub |eng | | Author:Jo Rhett
Logger By default Hiera logs warning and debug messages to STDOUT. You can change this using the :logger configuration value. Valid values are Console: emit warnings and debug on STDERR ...
( Category:
Tools
April 1,2019 )
mobi, epub |eng | 2011-07-25 | Author:Tiago Macedo & Fred Oliveira
Discussion For this recipe, we’ll assume that you have a recent installation of Node.js, as well as npm in order to install the necessary node libraries to support the chat ...
( Category:
Network Administration
April 1,2019 )
mobi |eng | 2015-06-14 | Author:Craig Sebenik and Thomas Hatch
[vagrant@master ~]$ cat /srv/salt/file/base/jinja/list_item.sls {% set list1 = ['one', 'two', 'three'] %} jinja_list_item: cmd.run: - name: echo "List item 2 is {{ list1[2] }}" [vagrant@master ~]$ sudo salt master.example state.show_sls ...
( Category:
Linux & UNIX Administration
April 1,2019 )
mobi, epub |eng | 2015-06-16 | Author:Dawn Griffiths and David Griffiths
Note We’re using a blank fragment for all of our fragments as we’re going to replace all the code Android Studio generates for us. Here’s the code for TopFragment.java: Add ...
( Category:
Internet, Groupware, & Telecommunications
April 1,2019 )
mobi, epub |eng | 2010-08-15 | Author:Rob Cameron, Brad Woodberg, Patricio Giecco, Timothy Eberhard, and James Quinn
Drop-Packet Drop-Packet will drop an individual offending packet, but not the rest of the session. Typically, you want to use the Drop-Connection action when malicious activity is detected on a ...
( Category:
Network Security
April 1,2019 )
mobi |eng | 2015-01-27 | Author:Holden Karau & Andy Konwinski & Patrick Wendell & Matei Zaharia
Apart from these, you will most likely be accessing data from Amazon S3, which you can do using the s3n:// URI scheme in Spark. Refer to “Amazon S3” for details. ...
( Category:
Software Development
April 1,2019 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9814)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7811)
Grails in Action by Glen Smith Peter Ledbrook(7722)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6875)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6871)
Running Windows Containers on AWS by Marcio Morales(6403)
Kotlin in Action by Dmitry Jemerov(5092)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5089)
Combating Crime on the Dark Web by Nearchos Nearchou(4664)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4655)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4438)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4355)
The Age of Surveillance Capitalism by Shoshana Zuboff(3989)
Python for Security and Networking - Third Edition by José Manuel Ortega(3907)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3573)
Learn Wireshark by Lisa Bock(3567)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3530)
Mastering Python for Networking and Security by José Manuel Ortega(3378)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3359)
Blockchain Basics by Daniel Drescher(3330)
