Networks, Protocols & APIs
epub, mobi |eng | 2019-11-28 | Author:Mike Brown [Mike Brown]

( Category: Networks, Protocols & APIs March 29,2020 )
epub |eng | | Author:Thomas G. Robertazzi

2.ODU (Optical Data Unit): ODU overhead includes optical path level monitoring, claim indication, protection switching bytes, and embedded communication channels. The ODU is the payload that is groomed and switched ...
( Category: Networks March 28,2020 )
epub |eng | 0101-01-01 | Author:Omar Santos,Joseph Muniz,Stefano De Crescenzo [Omar Santos,Joseph Muniz,Stefano De Crescenzo]

Foundation Topics Cryptography The word cryptography or cryptology comes from the Greek word kryptós, which means a secret. It is the study of the techniques used for encryption and secure ...
( Category: Network Security March 28,2020 )
epub |eng | 2009-06-03 | Author:Rich Seifert [Rich Seifert]

8.2.1.1.2 Aggressive Backoff Analogous to the backpressure approaches discussed earlier, a switch or other device can modify the characteristics of the Ethernet backoff algorithm to obtain an unfair advantage and ...
( Category: LAN March 28,2020 )
epub |eng | 2015-05-23 | Author:Erl, Thomas & Cope, Robert & Naserpour, Amin

Mechanisms • Cloud Storage Device – The cloud storage device provides the storage space that is needed to host and provision IT resources, in addition to application baseline information, templates, ...
( Category: Client-Server Systems March 27,2020 )
epub |eng | 2020-01-29 | Author:Danesh Kuruppu & Kasun Indrasiri [Danesh Kuruppu]

Example 5-5. gRPC deadlines for the client application conn, err := grpc.Dial(address, grpc.WithInsecure()) if err != nil { log.Fatalf("did not connect: %v", err) } defer conn.Close() client := pb.NewOrderManagementClient(conn) clientDeadline ...
( Category: Design & Architecture March 26,2020 )
epub |eng | 2013-11-07 | Author:Babak Akhgar & Hamid R. Arabnia

R Shaikh, 2013 [10] In this most recent paper on CSRF [10], the author describes how most client-side CSRF defenses arebased on either anomaly or signature detection schemes, and as ...
( Category: Network Security March 26,2020 )
mobi |eng | 2019-05-16 | Author:Jonathan Baier

Checking out the dashboard is a great way to look for suspects visually. Nodes and pods that are either over-subscribed or under-utilized are candidates for quota and resource request mismatches: ...
( Category: Networks, Protocols & APIs March 26,2020 )
epub |eng | 2009-06-29 | Author:Kate J. Chase

Figure 6-2. While the Database window always opens to the default view where the Tables option is selected, you’re about to get a whole new view as you explore what’s ...
( Category: ODBC March 25,2020 )
epub |eng | 2019-09-25 | Author:John Savill

DNS is used for the Azure Storage namespace, which is why when talking about Azure Storage accounts and services, you will see the following format: http(s)://<account>.<service>.core.windows.net/<partition>/object Using Storage Accounts and ...
( Category: Cloud Computing March 22,2020 )
epub |eng | 2015-10-05 | Author:GAVI, HAPPYSON

PCM measures air densities and temperature then stores them. As you drive it uses that stored information / data to decide fuel trim. This implies that during winter or rapid ...
( Category: Networks March 22,2020 )
epub, azw3 |eng | 2015-09-24 | Author:Hayden, Lance

* * * Behavioral Models for Security Culture Transformation Information security today is undergoing a series of experiments in behavioral engineering and cultural transformation, although we do not tend to ...
( Category: Information Theory March 22,2020 )
epub, pdf |eng | | Author:Bernard Scott

5.2 Recent Views of the Cerebral Process Recent neuroimaging-based studies in the past decade have begun to reveal a considerably more nuanced picture of the cortical language process. For one, ...
( Category: Networks March 22,2020 )
epub |eng | 2016-04-28 | Author:Looney, Jonathan...

This regular expression is used to parse the IP address. We really don’t need to make a variable to hold this. The main reason we did that was just to ...
( Category: Linux & UNIX Administration March 22,2020 )
epub |eng | 2018-11-12 | Author:Mark Collier, David Endler

Manipulating or flooding ARP entries on your network can cause a serious denial of service on the local segment you’re testing, rendering the network unusable for a short time, or ...
( Category: Hacking March 22,2020 )