Networks, Protocols & APIs
epub |eng | 2019-11-19 | Author:Tim Wired [Wired, Tim]
Chapter 3: Transmission control protocol (TCP) and IMPLEMENTATION The Transmission Control Protocol (TCP). It’s the system model utilized during the present web engineering also. Conventions are a set of principles ...
( Category:
Networks
April 29,2020 )
epub, pdf |eng | | Author:Edward H. Shortliffe & James J. Cimino
( Category:
Networks
April 24,2020 )
epub |eng | 2020-05-25 | Author:Peter F. Drucker [Peter F. Drucker]
( Category:
Strategic Planning
April 22,2020 )
azw3, epub, pdf |eng | 2015-12-21 | Author:Richard Reese [Reese, Richard]
The following code will keep the program running until the user terminates it. The close method is then used to close the table: Scanner scanner = new Scanner(System.in); System.out.println("Press Enter ...
( Category:
Networks
April 14,2020 )
epub |eng | 2019-01-31 | Author:Florian Klaffenbach [Florian Klaffenbach]
OpenStack DNS service– Designate DNS is an important service that many services rely on. Designate is the DNS as a service solution of OpenStack. A variety of DNS servers are ...
( Category:
LAN
April 14,2020 )
epub |eng | 2020-03-20 | Author:Mining, Ethem [Mining, Ethem]
Kali Linux Hacking A Complete Step by Step Guide to Learn the Fundamentals of Cyber Security, Hacking, and Penetration Testing. Includes Valuable Basic Networking Concepts. By: Ethem Mining Introduction Have ...
( Category:
Networks
April 7,2020 )
epub |eng | 2018-10-23 | Author:Aaron Philipp, David Cowen, Chris Davis
( Category:
Hacking
April 5,2020 )
epub |eng | | Author:Kanclirz, Jan , Jr.
If the server you're scanning is running HTTPS, or secure HTTP, Netcat cannot directly communicate with this port. You will need a TLS wrapper, such as stunnel, to take the ...
( Category:
Network Security
April 3,2020 )
epub |eng | | Author:Gerard O'Regan
13.5 The Iridium Satellite System Iridium was a global satellite phone company that was backed by Motorola. In many ways it was an engineering triumph over common sense, and over ...
( Category:
Networks
April 3,2020 )
epub |eng | | Author:Vlad Catrinescu & Trevor Seward
To create the Service Application by PowerShell, we need to use the New-SPBusinessDataConnectivityServiceApplication PowerShell cmdlet from an elevated SharePoint Management Shell. We need to specify the name of the Service ...
( Category:
NET
April 3,2020 )
epub |eng | 2020-03-22 | Author:Morgan, Kevin [Morgan, Kevin]
Quick Notes: · Hubs and switches are employed to build networks · Routers are designed to affix networks What is the difference between a modem and a router? Others may ...
( Category:
Networks
April 3,2020 )
epub |eng | 2020-03-30 | Author:Allan Johnson [Allan Johnson]
( Category:
Networks, Protocols & APIs
March 31,2020 )
epub, pdf |eng | 2020-03-30 | Author:Omar Santos [Omar Santos]
Port Security How many MAC addresses should legitimately show up inbound on an access port? Port security controls how many MAC addresses can be learned on a single switch port. ...
( Category:
Networks, Protocols & APIs
March 31,2020 )
epub |eng | | Author:Michael Schwartz & Maciej Machulak
Easy JavaScript Client This JavaScript client is one of the easiest ways to test OpenID Connect, although it’s not the most secure (remember Figure 5-1). The client we will use ...
( Category:
LDAP
March 31,2020 )
epub |eng | 2019-01-29 | Author:Yohan Wadia [Yohan Wadia]
Parameters: SubnetIds: Description: Subnet IDs where instances can be launched Type: List<AWS::EC2::Subnet::Id> Still under the Parameters section, add the optional instance configuration parameters: AmiId: Description: The application server's AMI ID ...
( Category:
Cloud Computing
March 30,2020 )
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9787)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7791)
Grails in Action by Glen Smith Peter Ledbrook(7705)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6653)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6645)
Running Windows Containers on AWS by Marcio Morales(6167)
Kotlin in Action by Dmitry Jemerov(5074)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(4963)
Combating Crime on the Dark Web by Nearchos Nearchou(4550)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4428)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4424)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4214)
The Age of Surveillance Capitalism by Shoshana Zuboff(3964)
Python for Security and Networking - Third Edition by José Manuel Ortega(3787)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3515)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3454)
Mastering Python for Networking and Security by José Manuel Ortega(3359)
Learn Wireshark by Lisa Bock(3348)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3337)
Blockchain Basics by Daniel Drescher(3308)
