Networks, Protocols & APIs
mobi |eng | 2011-01-11 | Author:Kurose, James F. & Keith W. Ross [Kurose, James F.]

b. Suppose a central node determines paths and VC numbers at connection setup. Suppose the same VC number is used on each link along the VC’s path. Describe how the ...
( Category: Networks March 4,2015 )
mobi |eng | 2013-10-06 | Author:Gregg, Brendan [Gregg, Brendan]

Table 8.5 File System Benchmark Expectations Some file system benchmark tools are not clear about what they are testing and may imply a disk benchmark but use a small total ...
( Category: LAN March 3,2015 )
epub |eng | 2011-03-08 | Author:Todd Lammle [Lammle, Todd]

A. Any available route B. RIP route C. Static route D. EIGRP route E. They will all load-balance. 17. You have the following routing table. Which of the following networks ...
( Category: Networks March 3,2015 )
azw3, mobi |eng | 2009-02-08 | Author:Corbet, Jonathan & Rubini, Alessandro & Kroah-Hartman, Greg [Corbet, Jonathan]

Hardware Abstractions We complete the discussion of PCI by taking a quick look at how the system handles the plethora of PCI controllers available on the marketplace. This is just ...
( Category: Device Drivers February 13,2015 )
azw3 |eng | 2009-03-01 | Author:Donahoo, Michael J. & Calvert, Kenneth L. [Donahoo, Michael J.]

The method GetNextMsg() reads data from the given stream and places it in the given buffer until it runs out of room or determines that it has received a complete ...
( Category: TCP-IP February 13,2015 )
azw3 |eng | 2013-09-02 | Author:Pahlavan, Kaveh & Krishnamurthy, Prashant [Pahlavan, Kaveh]

Secret-key algorithms such as AES are based on two principles: confusion and diffusion. The former introduces a layer of scrambling that creates confusion as to what exactly might be the ...
( Category: Mobile & Wireless February 13,2015 )
azw3 |eng | 2012-12-14 | Author:

It is ironic that Cass would not include the liminality of gays among her themes, particularly since her best known work arguably is her refinement of the stepped model for ...
( Category: Networks February 13,2015 )
mobi, epub, pdf |eng | 2009-02-08 | Author:Greg Kroah-Hartman

Synopsis ihash_entries= n Override the default number of hash buckets for the kernel's inode cache. Recommended only for kernel experts. Name max_addr — Ignore memory. Synopsis max_addr= n Cause the ...
( Category: Unix February 13,2015 )
epub, pdf |eng | 2010-12-14 | Author:Robert Faludi [Robert Faludi]

Chapter 6. Sleeping, Then Changing the World Whew! At this point, the book has covered a lot of ground and you have come a long way in a very short ...
( Category: Networks January 25,2015 )
epub |eng | 2013-09-14 | Author:Todd Lammle

We’ll cover these types of access lists in more depth later in the chapter. Once you create an access list, it’s not really going to do anything until you apply ...
( Category: Networks, Protocols & APIs January 24,2015 )
mobi, pdf |eng | 2004-12-15 | Author:Paul Graham

where w is the token whose probability we're calculating, good and bad are the hash tables I created in the first step, and G and B are the number of ...
( Category: Hacking December 31,2014 )
epub |eng | 2015-12-24 | Author:Kevin Wallace

* * * ! R4's output here: R4# show ip route Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP D - EIGRP, ...
( Category: Networks, Protocols & APIs December 25,2014 )
epub |eng | 2015-01-09 | Author:Daniel Regalado & Shon Harris & Allen Harper & Chris Eagle & Jonathan Ness & Branko Spasojevic & Ryan Linn & Stephen Sims [Regalado, Daniel]

Congratulations, we now have a shell with the effective uid (euid) of root. Using “return to libc” (ret2libc), we have the ability to direct application flow to other parts of ...
( Category: Encryption December 15,2014 )
epub, azw3, mobi, pdf |eng | 2014-12-15 | Author:Tyler Wrightson [Wrightson, Tyler]

Active Wireless Recon Before we know which wireless attack will be the most lucrative, we need to identify if there are any access points to target. We will perform active ...
( Category: Hacking December 15,2014 )
azw3, mobi |eng | 2010-03-19 | Author:Pogue, David [Pogue, David]

Figure 13-4. Top: Click "Send a link" once you've opened the folder you want to share. Bottom: Then click the To button to choose recipients, or categories of them, from ...
( Category: CORBA December 7,2014 )