Networking & Cloud Computing
epub, pdf |eng | 2013-12-25 | Author:Mike Shema
Usually, services only respond to a particular protocol handshake. So, the trigger for SSL shouldn’t elicit a response from a DNS service, and the DNS trigger shouldn’t elicit a response ...
( Category:
Hacking
August 28,2014 )
epub |eng | 2012-02-01 | Author:Wale Soyinka
Figure 13-1. Using SNAT on a connection Alas, this raises a small problem3. The server is going to send back some packets—but how does the NAT device know which packet ...
( Category:
LDAP
August 24,2014 )
epub |eng | 2013-08-05 | Author:George G. Morgan
Example 3 Genealogical societies and historical societies are excellent resources for helping you work around research roadblocks. They play important roles in their geographic area. These include: the preservation of ...
( Category:
Crafts & Hobbies
August 23,2014 )
mobi, epub |eng | 2011-10-16 | Author:Troy McMillan
Uses CSMA/CD to detect collisions Uses one pair of wires and can send or receive at only one time, not both at once Is the only type of connection that ...
( Category:
Networks
July 16,2014 )
mobi |eng | 2014-07-13 | Author:Katie Cunningham
After that, you think of some of the things you want your program to do. Here are some potential functions: Click here to view code image Functions --------- Play a ...
( Category:
Internet, Groupware, & Telecommunications
July 15,2014 )
epub |eng | 2013-06-12 | Author:Empson, Scott [Empson, Scott]
* * * * * * Tip An access port can belong to only one VLAN. * * * * * * Tip By default, all ports are members of ...
( Category:
LAN
June 20,2014 )
mobi |eng | 2006-05-25 | Author:Cricket Liu & Paul Albitz [Liu, Cricket]
( Category:
LAN
June 20,2014 )
mobi |eng | 2011-06-14 | Author:Aaron Margosis & Mark Russinovich
Table 7-2. Command-Line Options for Logging Option Description –l logfile Logs output to the specified logfile –m n Limits log file to n MB –p Appends to the file if ...
( Category:
Client-Server Systems
May 26,2014 )
mobi, epub |eng | 2008-01-28 | Author:Jon Erickson
Example Internet Datagram Header Each element in the structure corresponds to the fields shown in the RFC header diagram. Since the first two fields, Version and IHL (Internet Header Length) ...
( Category:
Privacy & Online Safety
May 26,2014 )
mobi |eng | 2007-01-22 | Author:Pfleeger, Charles P. & Pfleeger, Shari Lawrence [Pfleeger, Charles P.]
Protocol Failures and Implementation Flaws Each protocol is a specification of a service to be provided; the service is then implemented in software, which, as discussed in Chapter 3, may ...
( Category:
Network Security
May 26,2014 )
Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks by Zalewski Michal
azw3 |eng | 2005-04-14 | Author:Zalewski, Michal [Zalewski, Michal]
Customer Profiling and Privacy Invasion Many companies go to great lengths to gather and sell valuable information about people’s habits, preferences, and behavior. Although this information is usually used for ...
( Category:
LAN
May 26,2014 )
epub, pdf |eng | 2008-05-08 | Author:Douglas Crockford [Crockford, Douglas]
Regexp Escape The backslash character indicates escapement in regexp factors as well as in strings, but in regexp factors, it works a little differently. As in strings, \f is the ...
( Category:
Software Development
May 16,2014 )
epub, pdf |eng | 2014-03-19 | Author:Kim, Peter [Kim, Peter]
Figure 66 - Mimikatz Again, it doesn’t matter how long their password is and you don’t have to even worry about the hashes. You can now take these usernames/passwords and ...
( Category:
Testing
April 29,2014 )
epub |eng | 2014-02-10 | Author:Thord Daniel Hedengren
PART III: USING PLUGINS WITH WORDPRESS Chapter 7: Making the Most of WordPress Plugins Chapter 8: Plugins or functions.php? Chapter 7: Making the Most of WordPress Plugins IT GOES WITHOUT ...
( Category:
Content Management
April 29,2014 )
epub |eng | 2011-04-01 | Author:Darril Gibson
Windows Server 2008 includes all the software components to configure it as a software router. You don’t need to purchase any additional software. The only item that is required is ...
( Category:
Networks
April 28,2014 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9813)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7810)
Grails in Action by Glen Smith Peter Ledbrook(7719)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6838)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6837)
Running Windows Containers on AWS by Marcio Morales(6364)
Kotlin in Action by Dmitry Jemerov(5092)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5069)
Combating Crime on the Dark Web by Nearchos Nearchou(4647)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4613)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4437)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4335)
The Age of Surveillance Capitalism by Shoshana Zuboff(3979)
Python for Security and Networking - Third Edition by José Manuel Ortega(3895)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3554)
Learn Wireshark by Lisa Bock(3529)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3528)
Mastering Python for Networking and Security by José Manuel Ortega(3376)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3355)
Blockchain Basics by Daniel Drescher(3325)
