Networks, Protocols & APIs
epub |eng | 2011-04-01 | Author:Darril Gibson
Windows Server 2008 includes all the software components to configure it as a software router. You don’t need to purchase any additional software. The only item that is required is ...
( Category:
Networks
April 28,2014 )
epub |eng | 2013-12-11 | Author:Todd Lammle
Here is the command syntax you use to add a static route to a routing table from global config: ip route [destination_network] [mask] [next-hop_address or exitinterface] [administrative_distance] [permanent] Router(config)#ip route ...
( Category:
Networks, Protocols & APIs
April 14,2014 )
epub, pdf |eng | 2011-04-08 | Author:Richard G. Lyons
For computational efficiency reasons, to avoid unnecessary arithmetic using the imaginary parts of the complex C values, we might decide to compute Q as Show the validity (the correctness) of ...
( Category:
Signal Processing
April 9,2014 )
epub |eng | 2011-08-24 | Author:Hartpence, Bruce [Bruce Hartpence]
The Rapid Spanning Tree Protocol The Spanning Tree Protocol from IEEE 802.1D is highly effective at eliminating loops but very slow at converging in other situations such as recovering pathways. ...
( Category:
Networks, Protocols & APIs
April 6,2014 )
epub |eng | 2010-03-04 | Author:Beijnum, Iljitsch van [Iljitsch van Beijnum]
Smurf directed broadcast amplification “Smurf” attacks use misconfigured intermediate networks to multiply traffic, allowing attackers to easily muster up large amounts of traffic without the need to hack any systems. ...
( Category:
Networks, Protocols & APIs
April 6,2014 )
epub |eng | 2011-06-02 | Author:Hartpence, Bruce [Bruce Hartpence]
Node A MAC 1 1 Node B MAC 1 2 Node C MAC 1 3 Node D MAC 1 4 A switch has some basic procedures to follow: When a ...
( Category:
Networks, Protocols & APIs
April 6,2014 )
epub |eng | 2009-02-08 | Author:Chandra, Pravir, Messier, Matt, Viega, John & Matt Messier & Pravir Chandra [John Viega]
type The operation to perform, which can be one of the following constants: EVP_CTRL_GET_RC2_KEY_BITS EVP_CTRL_SET_RC2_KEY_BITS EVP_CTRL_GET_RC5_ROUNDS EVP_CTRL_SET_RC5_ROUNDS arg The numerical value to set, if appropriate. If not appropriate, its value ...
( Category:
Network Security
April 6,2014 )
epub |eng | 2010-08-24 | Author:Dwivedi, Himanshu [Himanshu Dwivedi]
User supplies the challenge, which in this case is 214484840. User supplies the MD5 hash that was sniffed over the network. From Figure 5-5 we see that the hash is ...
( Category:
Hacking
April 5,2014 )
mobi |eng | 2013-09-12 | Author:Hallberg, Bruce [Hallberg, Bruce]
Acquiring Backup Media and Technologies Once you have some idea of your backup needs, you can then proceed to acquire the necessary hardware and software to create and manage your ...
( Category:
LAN
April 3,2014 )
mobi, epub |eng | 2012-11-06 | Author:Robin Heydon
wait <until end of working day> connect to lights: send "off" to control point disconnect It is this combination of multiple services in the client that is one of the ...
( Category:
Software Development
April 2,2014 )
epub |eng | 2000-01-02 | Author:Clinton Wong [Wong, Clinton]
* * * The Pragma header specifies directives for proxy and gateway systems. Since many proxy systems may exist between a client and server, Pragma headers must pass through each ...
( Category:
Web Design
March 31,2014 )
epub |eng | | Author:Ross, John [John Ross]
Performing a Site Survey Understanding general networking principles is fine, but you're installing a wireless network in a real location with real walls and real furniture (and most likely, real ...
( Category:
LAN
March 31,2014 )
epub |eng | 2012-08-27 | Author:Robert J. Bartz
Frames Used for Active Scanning During the active scanning process, two frames are exchanged between the device and the access point. 1. The wireless LAN device sends a broadcast probe ...
( Category:
LAN
March 26,2014 )
epub, pdf |eng | 2013-08-07 | Author:Thomas D. Nadeau & Ken Gray
Billing system interface after provisioning operations are executed Workflow automation Adding and removing virtual machines to and from tenants Specifying the bandwidth, quality of service, and security attributes of a ...
( Category:
Networks
March 26,2014 )
epub |eng | 2013-01-14 | Author:Sander van Vugt
Managing Linux Users and Groups in LDAP In this section, you'll learn how to manage Linux user and group accounts in an LDAP Directory. You'll learn how to add users ...
( Category:
Networks
March 26,2014 )
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9798)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7798)
Grails in Action by Glen Smith Peter Ledbrook(7710)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6721)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6721)
Running Windows Containers on AWS by Marcio Morales(6236)
Kotlin in Action by Dmitry Jemerov(5080)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(4996)
Combating Crime on the Dark Web by Nearchos Nearchou(4583)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4497)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4430)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4255)
The Age of Surveillance Capitalism by Shoshana Zuboff(3968)
Python for Security and Networking - Third Edition by José Manuel Ortega(3824)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3519)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3495)
Learn Wireshark by Lisa Bock(3411)
Mastering Python for Networking and Security by José Manuel Ortega(3366)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3341)
Blockchain Basics by Daniel Drescher(3312)
