Networking & Cloud Computing
mobi |eng | 2011-09-09 | Author:Ramachandran, Vivek [Ramachandran, Vivek]
In the next exercise, we will look at how to crack a WPA PSK wireless network. The exact same steps will be involved in cracking a WPA2-PSK network using CCMP(AES) ...
( Category:
Networking & Cloud Computing
November 6,2017 )
azw3 |eng | 2017-09-28 | Author:Apodaca, Richard [Apodaca, Richard]
A Final or Active BIP's status can changed to Obsolete or Replaced when it becomes irrelevant. In September 2012, the creation of the Bitcoin Foundation was announced.76 Its first six-member ...
( Category:
Networking & Cloud Computing
November 6,2017 )
azw3 |eng | 2017-04-21 | Author:Shah, Dhruv & Girdhar, Ishan [Shah, Dhruv]
Similarly, you will need to include all the API keys here in recon-ng if you want to gather information from these sources. In the next recipe, we will learn how ...
( Category:
Operating Systems
November 6,2017 )
azw3, epub |eng | 2016-03-30 | Author:Gallagher, Scott [Gallagher, Scott]
Container images/runtime This part of the guide contains both the information for securing the container images as well as the container runtime. The first part contains images, cover base images, ...
( Category:
Operating Systems
November 6,2017 )
azw3 |eng | 2017-09-12 | Author:Schultz, Corey P. & Perciaccante, Bob [Schultz, Corey P.]
( Category:
Operating Systems
November 6,2017 )
epub |eng | | Author:Mohammed M. Alani
5.6.1 Point-to-Point Connection of Two Sites Using Physical Interfaces 1.On the serial interface, change the encapsulation type to Frame-relay: Router(config)# interface serial interface - number Router(config-if)# encapsulation Frame-relay where interface ...
( Category:
Engineering
November 6,2017 )
epub, azw3 |eng | 2015-09-07 | Author:Turkovic, Ivan [Turkovic, Ivan]
Every application needs to load the cordova.js file first, if you want to use PhoneGap's plugin API; it also provides events when it is ready to use them. Next we ...
( Category:
Web Development & Design
November 5,2017 )
epub |eng | | Author:Mike Halsey & Joli Ballew
User Error Returning to what we said earlier about a PC that’s never used never having a problem, you’d be amazed just how much users who shouldn’t, or who perhaps ...
( Category:
Hardware & DIY
November 5,2017 )
azw3 |eng | 2017-09-08 | Author:Collins, Michael [Collins, Michael]
1 And I prefer to keep my Windows and Linux boxes physically wired. 2 Note that the prefix is the equivalent to a subnet’s netmask. 3 That doesn’t mean you ...
( Category:
Databases & Big Data
November 2,2017 )
azw3 |eng | 2017-08-10 | Author:Edward G. Amoroso & Matthew E. Amoroso
Figure 14-3. Three-Step TCP Handshake Between Client Browser and Website This so-called TCP/IP handshake provides the base communication on which most network security methods operate. The most common security method, ...
( Category:
Security & Encryption
November 2,2017 )
azw3 |eng | 2017-08-18 | Author:Lachance, Daniel & Clarke, Glen E. [Lachance, Daniel]
A QUICK ANSWER KEY 1. D 2. C 3. B 4. A 5. C 6. B, C 7. C, D, E 8. C 9. D 10. C 11. A 12. ...
( Category:
Security & Encryption
November 2,2017 )
azw3 |eng | 2017-10-15 | Author:Collins, Robert [Collins, Robert]
( Category:
Networking & Cloud Computing
November 2,2017 )
epub, mobi, pdf |eng | 2012-09-13 | Author:Cole Stryker [Stryker, Cole]
Do Not Track Since Jonathan Mayer was an undergrad, he’s split his time between public policy and computer security. One of his projects is the maintenance of DoNotTrack.Us, a Web ...
( Category:
Internet & Social Media
October 27,2017 )
mobi, azw3, epub |eng | 2014-08-19 | Author:William Smith
A property list (PList) file is a special XML file used by iOS applications to store data for the application, which will change frequently. This file stores the data outside ...
( Category:
Networking & Cloud Computing
October 27,2017 )
azw3, epub |eng | 2016-04-19 | Author:Denton, James [Denton, James]
VXLAN networks Virtual eXtensible Local Area Network (VXLAN), is an overlay network technology that helps address scalability issues seen with VLANs. Where the maximum number of VLAN networks is 4,096 ...
( Category:
Networking & Cloud Computing
October 25,2017 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9813)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7810)
Grails in Action by Glen Smith Peter Ledbrook(7719)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6855)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6853)
Running Windows Containers on AWS by Marcio Morales(6379)
Kotlin in Action by Dmitry Jemerov(5092)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5077)
Combating Crime on the Dark Web by Nearchos Nearchou(4652)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4632)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4438)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4341)
The Age of Surveillance Capitalism by Shoshana Zuboff(3983)
Python for Security and Networking - Third Edition by José Manuel Ortega(3901)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3562)
Learn Wireshark by Lisa Bock(3544)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3530)
Mastering Python for Networking and Security by José Manuel Ortega(3376)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3356)
Blockchain Basics by Daniel Drescher(3327)
