Networking & Cloud Computing
azw3 |eng | 2017-07-06 | Author:Mohammed Isam Mohammed Abdel-Magid [Mohammed Abdel-Magid, Mohammed Isam]
5.2.6.2 Self-Cleansing Velocities Self-cleansing velocity is referred to as that velocity sufficient to prevent deposition of suspended matter. The velocity needed to carry sediment in a pipe flowing full is ...
( Category:
Engineering
January 18,2018 )
epub |eng | 2017-12-19 | Author:Danyel Fisher
Scatterplot Figure 5-16. Scatterplot. Two continuous variables. Additional continuous, ordinal, or categorical variables can be added for size, color, and shape. This shows the relation between curb weight and MPG ...
( Category:
Databases & Big Data
January 18,2018 )
azw3 |eng | 2017-07-24 | Author:Johansen, Gerard [Johansen, Gerard]
Command-line tools There are several command-line tools that can be utilized during the analysis of network packet captures. During more in-depth or lengthy incident response engagements, analysts may gather several ...
( Category:
Security & Encryption
January 18,2018 )
azw3, pdf, epub |eng | 2017-07-24 | Author:Gerard Johansen [Johansen, Gerard]
Command-line tools There are several command-line tools that can be utilized during the analysis of network packet captures. During more in-depth or lengthy incident response engagements, analysts may gather several ...
( Category:
Security & Encryption
January 18,2018 )
epub, mobi, azw3 |eng | 2018-01-18 | Author:James Forshaw
Figure 7-5: ECB encryption of a bitmap image Cipher Block Chaining Another common mode of operation is Cipher Block Chaining (CBC), which is more complex than ECB and avoids its ...
( Category:
Internet & Social Media
January 18,2018 )
azw3 |eng | 2017-08-24 | Author:Satyajit Das & Jhalak Modi [Das, Satyajit]
Setting up a private DNS with a VPC Route 53 is a very highly available DNS server in AWS. It can work for both external routing as well as internal ...
( Category:
Networking & Cloud Computing
January 17,2018 )
azw3 |eng | 2017-08-24 | Author:Das, Satyajit & Modi, Jhalak [Das, Satyajit]
( Category:
Networking & Cloud Computing
January 17,2018 )
azw3 |eng | 2017-07-31 | Author:Noble, Steven [Noble, Steven]
( Category:
Networking & Cloud Computing
January 17,2018 )
epub |eng | 2015-11-12 | Author:Russ White & Jeff (Evgeny) Tantsura [White, Russ]
The Four-Layer Model One of the reasons why engineers have so much difficulty fitting the IP transport stack into the seven-layer model is that it was developed with a different ...
( Category:
Networking & Cloud Computing
January 17,2018 )
epub |eng | 2015-12-21 | Author:Antonio Sanchez Monge & Krzysztof Szarkowicz
Further to the left, it is a classic SP network. At the bottom of Figure 11-2, notice the User Packet/Frame box. Indeed, it can be an L3 packet or an ...
( Category:
Networking & Cloud Computing
January 17,2018 )
azw3 |eng | 2017-07-31 | Author:Steven Noble [Noble, Steven]
For this exercise, we will use the Indigo Virtual Switch (IVS), which is a software-based high-performance OpenFlow switch that utilizes Open vSwitch (OVS). If you do not have access to ...
( Category:
Networking & Cloud Computing
January 17,2018 )
azw3 |eng | 2017-09-27 | Author:Chappell, Adam [Chappell, Adam]
Using tables and views In this recipe, we’ll make use of a PyEZ framework feature that greatly eases the complexity of calling RPCs and parsing XML result sets with XPath ...
( Category:
Programming
January 17,2018 )
azw3 |eng | 2017-10-01 | Author:Karina Astudillo [Astudillo, Karina]
To sum up, if we plan to execute an extensive key attack on one or more WPA/WPA2 wireless networks whose respective handshakes we have captured, a database should be generated ...
( Category:
Internet & Social Media
January 17,2018 )
epub, azw3 |eng | 2016-05-02 | Author:Andreas Kolokithas [Kolokithas, Andreas]
Figure 5-35: Creation of monitor interface using airmon-ng STEP 2: The second step is to launch the beacon flooding attack against the listening wireless clients. Before proceeding with this step ...
( Category:
Internet & Social Media
January 14,2018 )
epub, azw3 |eng | 2013-06-12 | Author:Baldwin, Breck
Servos Operate But Motor Does Not This is a fairly common problem that has several possible causes: 1. The cutoff voltage has been reached for the ESC, and the motor ...
( Category:
Miscellaneous
January 14,2018 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9813)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7810)
Grails in Action by Glen Smith Peter Ledbrook(7719)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6860)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6857)
Running Windows Containers on AWS by Marcio Morales(6384)
Kotlin in Action by Dmitry Jemerov(5092)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5079)
Combating Crime on the Dark Web by Nearchos Nearchou(4654)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4636)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4438)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4343)
The Age of Surveillance Capitalism by Shoshana Zuboff(3983)
Python for Security and Networking - Third Edition by José Manuel Ortega(3901)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3565)
Learn Wireshark by Lisa Bock(3546)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3530)
Mastering Python for Networking and Security by José Manuel Ortega(3376)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3356)
Blockchain Basics by Daniel Drescher(3329)
