Networking & Cloud Computing
epub, mobi |eng | 2017-04-21 | Author:Aaron Newcomb
Uptime You can also get this single line of information by running the command uptime. Now let’s look at the Tasks line (see Figure 6-17). Figure 6-17. Breakdown of the ...
( Category:
Operating Systems
March 16,2018 )
epub, pdf |eng | 2017-03-27 | Author:Jessey Bullock & Jeff T. Parker
Exercises Perform two captures, one in promiscuous mode and one not in promiscuous mode. Find any packets only in the trace captured in promiscuous mode. What packet details made you ...
( Category:
Security & Encryption
March 16,2018 )
epub, pdf |eng | | Author:Lucas Kello
Defense Fragmentation A second manifestation of systems change involves the provision of national security: governments are not the supreme, and in some cases not even the primary, defenders against cyber ...
( Category:
Security & Encryption
March 16,2018 )
epub, pdf |eng | | Author:Kevin Daimi
Parameter Description α Probability of infection ν Recovery rate k Number of neighbor devices Relative density of susceptible k-nodes Relative density of infectious k-nodes Probability of connection with an infectious ...
( Category:
Networking & Cloud Computing
March 16,2018 )
epub |eng | 2016-09-07 | Author:David D. Coleman
RadSec The RADIUS protocol depends on the unreliable transport protocol UDP using port 1812 and has some potential security weaknesses. RADIUS is based on the MD5 algorithm, which has been ...
( Category:
Networking & Cloud Computing
March 16,2018 )
epub |eng | 2018-01-22 | Author:Dhiraj Murthy
Tweeting Information from #Syria and #Egypt to the World? In the case of the “Arab Spring,” weak ties played an important role both because of cost and a need to ...
( Category:
Social Sciences
March 16,2018 )
epub, pdf |eng | 2016-11-14 | Author:Sean-Philip Oriyano
List of Findings In the List of Findings area, all levels of findings are documented in a tabular form to provide quick information about security vulnerabilities in the targeted system. ...
( Category:
Internet & Social Media
March 16,2018 )
epub, mobi, pdf |eng | 2017-10-26 | Author:Mike Julian
Synthetic Monitoring If you’ve ever run curl on a website to ensure it was working, you’ve performed a synthetic test. There are tools out there that take it much further, ...
( Category:
Programming
March 16,2018 )
epub |eng | 2017-05-12 | Author:Kimberly Ann McCabe [McCabe, Kimberly Ann]
What Do Stalkers Do? Multiple actions and activities by perpetrators have been identified in cases of cyberstalking. Those factors include posting false information on websites or in chatrooms to damage ...
( Category:
Social Sciences
March 16,2018 )
epub, pdf |eng | | Author:Ric Messier
Geolocation When Voice over IP (VoIP) services became commonplace, there was a challenge. Federal regulations require telecommunications providers to be able to support enhanced 911 (E-911) services to phone subscribers. ...
( Category:
Networking & Cloud Computing
March 16,2018 )
epub |eng | 2017-04-07 | Author:Lee Brotherston
8 characters at upper- and lowercase equals 52^8. Still not the best, will crack in < 6 hours. 8 characters at uppercase, lowercase, and numbers equals 62^8. A little better, ...
( Category:
Networking & Cloud Computing
March 16,2018 )
mobi, pdf |eng | 2015-01-26 | Author:Holden Karau, Andy Konwinski, Patrick Wendell, and Matei Zaharia
Storage on the cluster Spark EC2 clusters come configured with two installations of the Hadoop filesystem that you can use for scratch space. This can be handy to save datasets ...
( Category:
Software
March 16,2018 )
epub |eng | | Author:Chung-Wei Lin & Alberto Sangiovanni-Vincentelli
5.4 Experimental Results A test case in previous work was obtained [59]. The test case supports advanced distributed functions with end-to-end computations collecting data from 360 sensors to the actuators, ...
( Category:
Engineering
March 16,2018 )
epub |eng | | Author:Wasson, Haidee; Grieveson, Lee;
PUBLICIZING MILITARY-INDUSTRIAL TRAINING One of the most salient features of the wartime military film was its shifting, sometimes incompatible itineraries, which reflected the military’s belief that cinema could be useful ...
( Category:
Networking & Cloud Computing
March 16,2018 )
epub |eng | 2017-03-16 | Author:Susan Landau
5 Investigations in the Age of Encryption In 1992, the FBI’s Advanced Telephony Unit issued a dire warning: law enforcement was on the verge of losing its ability to listen ...
( Category:
Politics & Government
March 16,2018 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9813)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7810)
Grails in Action by Glen Smith Peter Ledbrook(7720)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6866)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6862)
Running Windows Containers on AWS by Marcio Morales(6393)
Kotlin in Action by Dmitry Jemerov(5092)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5083)
Combating Crime on the Dark Web by Nearchos Nearchou(4660)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4644)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4438)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4348)
The Age of Surveillance Capitalism by Shoshana Zuboff(3985)
Python for Security and Networking - Third Edition by José Manuel Ortega(3904)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3568)
Learn Wireshark by Lisa Bock(3556)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3530)
Mastering Python for Networking and Security by José Manuel Ortega(3377)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3359)
Blockchain Basics by Daniel Drescher(3329)
