Networks, Protocols & APIs
mobi |eng | 2011-01-11 | Author:Kurose, James F. & Keith W. Ross [Kurose, James F.]
b. Suppose a central node determines paths and VC numbers at connection setup. Suppose the same VC number is used on each link along the VC’s path. Describe how the ...
( Category:
Networks
March 4,2015 )
mobi |eng | 2013-10-06 | Author:Gregg, Brendan [Gregg, Brendan]
Table 8.5 File System Benchmark Expectations Some file system benchmark tools are not clear about what they are testing and may imply a disk benchmark but use a small total ...
( Category:
LAN
March 3,2015 )
epub |eng | 2011-03-08 | Author:Todd Lammle [Lammle, Todd]
A. Any available route B. RIP route C. Static route D. EIGRP route E. They will all load-balance. 17. You have the following routing table. Which of the following networks ...
( Category:
Networks
March 3,2015 )
azw3, mobi |eng | 2009-02-08 | Author:Corbet, Jonathan & Rubini, Alessandro & Kroah-Hartman, Greg [Corbet, Jonathan]
Hardware Abstractions We complete the discussion of PCI by taking a quick look at how the system handles the plethora of PCI controllers available on the marketplace. This is just ...
( Category:
Device Drivers
February 13,2015 )
azw3 |eng | 2009-03-01 | Author:Donahoo, Michael J. & Calvert, Kenneth L. [Donahoo, Michael J.]
The method GetNextMsg() reads data from the given stream and places it in the given buffer until it runs out of room or determines that it has received a complete ...
( Category:
TCP-IP
February 13,2015 )
azw3 |eng | 2013-09-02 | Author:Pahlavan, Kaveh & Krishnamurthy, Prashant [Pahlavan, Kaveh]
Secret-key algorithms such as AES are based on two principles: confusion and diffusion. The former introduces a layer of scrambling that creates confusion as to what exactly might be the ...
( Category:
Mobile & Wireless
February 13,2015 )
azw3 |eng | 2012-12-14 | Author:
It is ironic that Cass would not include the liminality of gays among her themes, particularly since her best known work arguably is her refinement of the stepped model for ...
( Category:
Networks
February 13,2015 )
mobi, epub, pdf |eng | 2009-02-08 | Author:Greg Kroah-Hartman
Synopsis ihash_entries= n Override the default number of hash buckets for the kernel's inode cache. Recommended only for kernel experts. Name max_addr — Ignore memory. Synopsis max_addr= n Cause the ...
( Category:
Unix
February 13,2015 )
epub, pdf |eng | 2010-12-14 | Author:Robert Faludi [Robert Faludi]
Chapter 6. Sleeping, Then Changing the World Whew! At this point, the book has covered a lot of ground and you have come a long way in a very short ...
( Category:
Networks
January 25,2015 )
epub |eng | 2013-09-14 | Author:Todd Lammle
We’ll cover these types of access lists in more depth later in the chapter. Once you create an access list, it’s not really going to do anything until you apply ...
( Category:
Networks, Protocols & APIs
January 24,2015 )
mobi, pdf |eng | 2004-12-15 | Author:Paul Graham
where w is the token whose probability we're calculating, good and bad are the hash tables I created in the first step, and G and B are the number of ...
( Category:
Hacking
December 31,2014 )
epub |eng | 2015-12-24 | Author:Kevin Wallace
* * * ! R4's output here: R4# show ip route Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP D - EIGRP, ...
( Category:
Networks, Protocols & APIs
December 25,2014 )
epub |eng | 2015-01-09 | Author:Daniel Regalado & Shon Harris & Allen Harper & Chris Eagle & Jonathan Ness & Branko Spasojevic & Ryan Linn & Stephen Sims [Regalado, Daniel]
Congratulations, we now have a shell with the effective uid (euid) of root. Using “return to libc” (ret2libc), we have the ability to direct application flow to other parts of ...
( Category:
Encryption
December 15,2014 )
epub, azw3, mobi, pdf |eng | 2014-12-15 | Author:Tyler Wrightson [Wrightson, Tyler]
Active Wireless Recon Before we know which wireless attack will be the most lucrative, we need to identify if there are any access points to target. We will perform active ...
( Category:
Hacking
December 15,2014 )
azw3, mobi |eng | 2010-03-19 | Author:Pogue, David [Pogue, David]
Figure 13-4. Top: Click "Send a link" once you've opened the folder you want to share. Bottom: Then click the To button to choose recipients, or categories of them, from ...
( Category:
CORBA
December 7,2014 )
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(10011)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7915)
Grails in Action by Glen Smith Peter Ledbrook(7881)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(7166)
Azure Containers Explained by Wesley Haakman & Richard Hooper(7166)
Running Windows Containers on AWS by Marcio Morales(6707)
Kotlin in Action by Dmitry Jemerov(5297)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5255)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4948)
Combating Crime on the Dark Web by Nearchos Nearchou(4837)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4521)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4492)
The Age of Surveillance Capitalism by Shoshana Zuboff(4115)
Python for Security and Networking - Third Edition by José Manuel Ortega(4077)
Learn Wireshark by Lisa Bock(3866)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3739)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3569)
Blockchain Basics by Daniel Drescher(3428)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3424)
Mastering Python for Networking and Security by José Manuel Ortega(3419)
