Networks, Protocols & APIs
epub |eng | 2011-11-07 | Author:Stevens, W. Richard & Fall, Kevin R. [Fall, Kevin R.]
thelongestdomainnameintheworldandthensomeandthensomemoreandmore.com was allegedly submitted as a potential world record for the longest name, with a label of length 63, but was judged to have been of insufficient merit to justify ...
( Category:
TCP-IP
November 23,2014 )
epub |eng | 1995-11-22 | Author:W. Richard Stevens & Gary R. Wright
Release interface reference 117-122 A check is made that the reference count is not negative, and then IFAFREE decrements the reference count for the ifaddr structure and releases it by ...
( Category:
TCP-IP
November 23,2014 )
mobi, epub, pdf |eng | 2013-08-08 | Author:Adam Nathan
( Category:
Software Development
November 14,2014 )
epub |eng | 2013-09-10 | Author:Derrick Rountree & Ileana Castrillo
Attaching an EBS Volume Since the HTML pages to be served from the Web portal need to be persistent, it is required to create an EBS volume for holding the ...
( Category:
Network Security
October 27,2014 )
epub |eng | 2014-04-20 | Author:Tom Fifield, Diane Fleming, Anne Gentle, Lorin Hochstein, Jonathan Proulx, Everett Toews & Joe Topjian
Summary The authors have spent too much time looking at packet dumps in order to distill this information for you. We trust that, following the methods outlined in this chapter, ...
( Category:
LAN
October 27,2014 )
mobi, pdf |eng | | Author:Francis daCosta
Neighborhoods and Affinities Internet of Things neighborhoods may be thought of as interesting aggregations of data sources that may be examined and collected by an integrator function. Locating and subscribing ...
( Category:
Robotics & Automation
October 27,2014 )
epub |eng | 2011-11-02 | Author:Steven Hoober & Eric Berkman [Steven Hoober]
Presentation details Figure 9-15. Just some of the many ways to communicate a shift function. Note that single-character capitalization is not precisely the same as Shift. Be sure to use ...
( Category:
Electronics
October 1,2014 )
epub, pdf |eng | 2011-10-18 | Author:Mark Masse [Mark Masse]
Rule: Media type negotiation should be supported when multiple representations are available Allow clients to negotiate for a given format and schema by submitting an Accept header with the desired ...
( Category:
Networks, Protocols & APIs
October 1,2014 )
epub |eng | 2005-10-03 | Author:Charles M. Kozierok [Charles M. Kozierok]
( Category:
Email Administration
September 17,2014 )
epub, pdf |eng | 2013-12-25 | Author:Mike Shema
Usually, services only respond to a particular protocol handshake. So, the trigger for SSL shouldn’t elicit a response from a DNS service, and the DNS trigger shouldn’t elicit a response ...
( Category:
Hacking
August 28,2014 )
epub |eng | 2012-02-01 | Author:Wale Soyinka
Figure 13-1. Using SNAT on a connection Alas, this raises a small problem3. The server is going to send back some packets—but how does the NAT device know which packet ...
( Category:
LDAP
August 24,2014 )
mobi, epub |eng | 2011-10-16 | Author:Troy McMillan
Uses CSMA/CD to detect collisions Uses one pair of wires and can send or receive at only one time, not both at once Is the only type of connection that ...
( Category:
Networks
July 16,2014 )
epub |eng | 2013-06-12 | Author:Empson, Scott [Empson, Scott]
* * * * * * Tip An access port can belong to only one VLAN. * * * * * * Tip By default, all ports are members of ...
( Category:
LAN
June 20,2014 )
mobi |eng | 2006-05-25 | Author:Cricket Liu & Paul Albitz [Liu, Cricket]
( Category:
LAN
June 20,2014 )
Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks by Zalewski Michal
azw3 |eng | 2005-04-14 | Author:Zalewski, Michal [Zalewski, Michal]
Customer Profiling and Privacy Invasion Many companies go to great lengths to gather and sell valuable information about people’s habits, preferences, and behavior. Although this information is usually used for ...
( Category:
LAN
May 26,2014 )
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9790)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7792)
Grails in Action by Glen Smith Peter Ledbrook(7705)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6669)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6665)
Running Windows Containers on AWS by Marcio Morales(6188)
Kotlin in Action by Dmitry Jemerov(5076)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(4971)
Combating Crime on the Dark Web by Nearchos Nearchou(4561)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4446)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4426)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4224)
The Age of Surveillance Capitalism by Shoshana Zuboff(3964)
Python for Security and Networking - Third Edition by José Manuel Ortega(3797)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3515)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3464)
Learn Wireshark by Lisa Bock(3369)
Mastering Python for Networking and Security by José Manuel Ortega(3362)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3338)
Blockchain Basics by Daniel Drescher(3308)
