Networking & Cloud Computing
epub |eng | 2018-08-31 | Author:Ken Cochrane
Evidently, the DNS entry netalias has two IP addresses, 172.18.0.3 and 172.18.0.2, as its A record. Applications, such as nginx, usually cache the IP addresses, and so DNS-based load-balancing solutions ...
( Category:
Hardware & DIY
October 17,2018 )
epub, pdf |eng | | Author:Margaret E. Kosal
3.2 Data Analysis & Intelligence Agencies Gathering intelligence is only one side of intelligence assessments; analyses play an equally important role in the lead-up to a decision by a state. ...
( Category:
Politics & Government
October 17,2018 )
epub |eng | 2012-10-16 | Author:Steve Olsher
The Wrong Way To Use QR Codes Riel’s strategy for QR codes is simple: If a customer takes the time to scan your code, give her what she wants. Too ...
( Category:
Industries
October 17,2018 )
epub |eng | 2018-09-12 | Author:James Denton
( Category:
Networking & Cloud Computing
October 17,2018 )
epub |eng | 2018-08-31 | Author:Syed Chand Shah
We cannot customize the user's permission set because the profile of the user is System Admin. We have had a permission set for the Lightning Experience report builder, where we ...
( Category:
Networking & Cloud Computing
October 17,2018 )
epub, mobi |eng | 2018-08-30 | Author:Sagar Rahalkar
Active information gathering with SPARTA SPARTA is an excellent active information gathering tool. It is part of the default Kali setup. The following screenshot shows the home screen of SPARTA. ...
( Category:
Networking & Cloud Computing
October 17,2018 )
epub |eng | 2018-10-16 | Author:Joshua Saxe & Hillary Sanders
Figure 7-2: Suspiciousness scores output by the hypothetical MalDetect system for individual software binaries Suspiciousness scores are informative, but in order to calculate MalDetect’s true positive rate and false positive ...
( Category:
Security & Encryption
October 17,2018 )
epub, pdf |eng | 2018-05-30 | Author:Mohit
Network Attacks and Prevention In previous chapters, you learned about network scanning and network sniffing. In this chapter, you will see different types of network attacks and how to prevent ...
( Category:
Programming Languages
October 16,2018 )
epub |eng | 2018-05-24 | Author:Josh Diakun
( Category:
Computer Science
October 16,2018 )
epub, pdf |eng | 2018-05-25 | Author:Nipun Jaswal
We turned on DEP by selecting Turn on DEP for all programs and services except those I select. Let's restart our system and retry exploiting the same vulnerability, as follows: ...
( Category:
Networking & Cloud Computing
October 16,2018 )
epub |eng | 2018-05-31 | Author:Ben Silverman
The future of OpenStack troubleshooting and Artificial Intelligence-driven operations As systems and workloads become increasingly abstracted, the velocity, frequency, and variety of data continues to multiply at exponential rates. At ...
( Category:
Networking & Cloud Computing
October 16,2018 )
epub |eng | 2018-05-30 | Author:Hideto Saito
How it works... Although Jobs and CronJob are the special utilities of Pods, the Kubernetes system has different management systems between them and Pods. For Job, its selector cannot point ...
( Category:
Operating Systems
October 16,2018 )
epub |eng | | Author:Nat Welch
Automation Automating releasing and testing is a common task. Both tend to have a lot of steps, so creating a consistent place and way to run tests and releases can ...
( Category:
Networking & Cloud Computing
October 16,2018 )
epub, pdf |eng | 2018-07-11 | Author:Kevin Beaver
MAC spoofing A common defense for wireless networks is MAC address controls. These controls involve configuring your APs to allow only wireless clients with known MAC addresses to connect to ...
( Category:
Internet & Social Media
October 16,2018 )
epub, mobi |eng | 2018-10-15 | Author:John P. Carlin
The first destructive cyberattack to hit the US mainland targeted a place almost as unexpected as a fancy Georgetown Italian restaurant: the Sands Casino company, a name for decades all ...
( Category:
Internet & Social Media
October 16,2018 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9814)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7811)
Grails in Action by Glen Smith Peter Ledbrook(7722)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6884)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6876)
Running Windows Containers on AWS by Marcio Morales(6408)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5096)
Kotlin in Action by Dmitry Jemerov(5094)
Combating Crime on the Dark Web by Nearchos Nearchou(4668)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4664)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4438)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4359)
The Age of Surveillance Capitalism by Shoshana Zuboff(3990)
Python for Security and Networking - Third Edition by José Manuel Ortega(3910)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3577)
Learn Wireshark by Lisa Bock(3575)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3531)
Mastering Python for Networking and Security by José Manuel Ortega(3378)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3359)
Blockchain Basics by Daniel Drescher(3331)
