Networks, Protocols & APIs
epub, mobi |eng | 2019-11-28 | Author:Mike Brown [Mike Brown]
( Category:
Networks, Protocols & APIs
March 29,2020 )
epub |eng | | Author:Thomas G. Robertazzi
2.ODU (Optical Data Unit): ODU overhead includes optical path level monitoring, claim indication, protection switching bytes, and embedded communication channels. The ODU is the payload that is groomed and switched ...
( Category:
Networks
March 28,2020 )
epub |eng | 0101-01-01 | Author:Omar Santos,Joseph Muniz,Stefano De Crescenzo [Omar Santos,Joseph Muniz,Stefano De Crescenzo]
Foundation Topics Cryptography The word cryptography or cryptology comes from the Greek word kryptós, which means a secret. It is the study of the techniques used for encryption and secure ...
( Category:
Network Security
March 28,2020 )
epub |eng | 2009-06-03 | Author:Rich Seifert [Rich Seifert]
8.2.1.1.2 Aggressive Backoff Analogous to the backpressure approaches discussed earlier, a switch or other device can modify the characteristics of the Ethernet backoff algorithm to obtain an unfair advantage and ...
( Category:
LAN
March 28,2020 )
epub |eng | 2015-05-23 | Author:Erl, Thomas & Cope, Robert & Naserpour, Amin
Mechanisms • Cloud Storage Device – The cloud storage device provides the storage space that is needed to host and provision IT resources, in addition to application baseline information, templates, ...
( Category:
Client-Server Systems
March 27,2020 )
epub |eng | 2020-01-29 | Author:Danesh Kuruppu & Kasun Indrasiri [Danesh Kuruppu]
Example 5-5. gRPC deadlines for the client application conn, err := grpc.Dial(address, grpc.WithInsecure()) if err != nil { log.Fatalf("did not connect: %v", err) } defer conn.Close() client := pb.NewOrderManagementClient(conn) clientDeadline ...
( Category:
Design & Architecture
March 26,2020 )
epub |eng | 2013-11-07 | Author:Babak Akhgar & Hamid R. Arabnia
R Shaikh, 2013 [10] In this most recent paper on CSRF [10], the author describes how most client-side CSRF defenses arebased on either anomaly or signature detection schemes, and as ...
( Category:
Network Security
March 26,2020 )
mobi |eng | 2019-05-16 | Author:Jonathan Baier
Checking out the dashboard is a great way to look for suspects visually. Nodes and pods that are either over-subscribed or under-utilized are candidates for quota and resource request mismatches: ...
( Category:
Networks, Protocols & APIs
March 26,2020 )
epub |eng | 2009-06-29 | Author:Kate J. Chase
Figure 6-2. While the Database window always opens to the default view where the Tables option is selected, you’re about to get a whole new view as you explore what’s ...
( Category:
ODBC
March 25,2020 )
epub |eng | 2019-09-25 | Author:John Savill
DNS is used for the Azure Storage namespace, which is why when talking about Azure Storage accounts and services, you will see the following format: http(s)://<account>.<service>.core.windows.net/<partition>/object Using Storage Accounts and ...
( Category:
Cloud Computing
March 22,2020 )
epub |eng | 2015-10-05 | Author:GAVI, HAPPYSON
PCM measures air densities and temperature then stores them. As you drive it uses that stored information / data to decide fuel trim. This implies that during winter or rapid ...
( Category:
Networks
March 22,2020 )
epub, azw3 |eng | 2015-09-24 | Author:Hayden, Lance
* * * Behavioral Models for Security Culture Transformation Information security today is undergoing a series of experiments in behavioral engineering and cultural transformation, although we do not tend to ...
( Category:
Information Theory
March 22,2020 )
epub, pdf |eng | | Author:Bernard Scott
5.2 Recent Views of the Cerebral Process Recent neuroimaging-based studies in the past decade have begun to reveal a considerably more nuanced picture of the cortical language process. For one, ...
( Category:
Networks
March 22,2020 )
epub |eng | 2016-04-28 | Author:Looney, Jonathan...
This regular expression is used to parse the IP address. We really don’t need to make a variable to hold this. The main reason we did that was just to ...
( Category:
Linux & UNIX Administration
March 22,2020 )
epub |eng | 2018-11-12 | Author:Mark Collier, David Endler
Manipulating or flooding ARP entries on your network can cause a serious denial of service on the local segment you’re testing, rendering the network unusable for a short time, or ...
( Category:
Hacking
March 22,2020 )
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9787)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7792)
Grails in Action by Glen Smith Peter Ledbrook(7705)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6667)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6659)
Running Windows Containers on AWS by Marcio Morales(6183)
Kotlin in Action by Dmitry Jemerov(5076)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(4968)
Combating Crime on the Dark Web by Nearchos Nearchou(4559)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4441)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4426)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4223)
The Age of Surveillance Capitalism by Shoshana Zuboff(3964)
Python for Security and Networking - Third Edition by José Manuel Ortega(3795)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3515)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3464)
Mastering Python for Networking and Security by José Manuel Ortega(3362)
Learn Wireshark by Lisa Bock(3361)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3338)
Blockchain Basics by Daniel Drescher(3308)
