Networks, Protocols & APIs
epub, pdf |eng | 2012-10-31 | Author:Doug Lowe [Lowe, Doug]
Figure 4-5: Configuring a Windows client to obtain its DNS address from DHCP. Chapter 5: Using FTP In This Chapter Figuring out the basics of FTP Setting up an FTP ...
( Category:
Networks
March 26,2014 )
epub |eng | 2012-03-25 | Author:Dinkar Sitaram & Geetha Manjunath
• partition(key2) : Determine a data partition and return the reducer number The partition function is given the key with the number of reducers and returns the index of the ...
( Category:
Cloud Computing
March 26,2014 )
epub, mobi, pdf |eng | 2013-10-03 | Author:Elliotte Rusty Harold
Disconnecting from the Server HTTP 1.1 supports persistent connections that allow multiple requests and responses to be sent over a single TCP socket. However, when Keep-Alive is used, the server ...
( Category:
LAN
March 26,2014 )
epub, pdf |eng | 2013-04-01 | Author:Charles E. Spurgeon & Joann Zimmerman [Charles E. Spurgeon and Joann Zimmerman]
In this chapter, we will show some of the basic ways switches can be used to build an Ethernet system. Network design is a large topic, and there are many ...
( Category:
LAN
March 26,2014 )
epub |eng | 2012-10-23 | Author:Joe Fichera & Steven Bolt
Snort One suggestion I have is to use another open source tool, Snort. Snort is a network intrusion prevention and detection system (IPS/IDS) that was developed by Sourcefire. Snort[5] can ...
( Category:
Network Security
March 26,2014 )
epub |eng | 2013-03-11 | Author:Jessica McKellar & Abe Fettig
$ twistd -n echo --auth memory:user:pass:foo:bar 2012-12-01 14:04:11-0500 [-] Log opened. 2012-12-01 14:04:11-0500 [-] twistd 12.1.0 (/usr/bin/python 2.7.1) ... 2012-12-01 14:04:11-0500 [-] reactor class: twisted.internet.select... 2012-12-22 14:07:26-0500 [-] EchoFactory starting ...
( Category:
Networks, Protocols & APIs
March 26,2014 )
epub, mobi |eng | 2013-07-25 | Author:Richard Bejtlich
Part IV. NSM in Action Chapter 9. NSM Operations Analysts need tools to find intruders, but methodology is more important than software. Tools collect and interpret data, but methodology provides ...
( Category:
Networks
March 26,2014 )
epub, pdf |eng | 2011-03-16 | Author:Lawrence C. Miller
Movies on your TV, courtesy of your gaming console All three of the major gaming consoles now support the delivery of Internet-based movie and TV content to your TV screen. ...
( Category:
Networks
March 26,2014 )
epub |eng | 2013-03-25 | Author:Kerrie Meyler & Byron Holt & Marcus Oh & Jason Sandys & Greg Ramsey
( Category:
Client-Server Systems
March 26,2014 )
epub |eng | 2013-07-01 | Author:Wilhelm, Thomas [Wilhelm, Thomas]
TCP Scanning Most of the interesting applications from a pentest perspective use TCP to communicate across the networks, including Web servers, file transfer applications, databases, and more. There are a ...
( Category:
Hacking
March 26,2014 )
epub, pdf |eng | 2013-01-27 | Author:Eric Cole
There is a lot of focus, energy and effort put against incident response today, but what we have found is not everyone is using the same definitions. Therefore in order ...
( Category:
Hacking
March 26,2014 )
epub |eng | 2008-12-16 | Author:Kevin Dooley & Ian Brown [Kevin Dooley]
Time-Stamping Router Logs Problem You want the router to record the time along with log and debug messages. Solution The service timestamp global configuration command enables timestamps on debug and ...
( Category:
LAN
March 26,2014 )
epub |eng | 2012-07-19 | Author:Susan Prosser & Stuart Gripman [Susan Prosser and Stuart Gripman]
If you turn on “Show only related records” and “Match current record only,” then FileMaker returns a found set of only those records that match the active record. The customer ...
( Category:
ODBC
March 26,2014 )
epub, pdf |eng | 2013-04-10 | Author:Matthew MacDonald
Optionally, set Enabled to No to hammer home the point that this value can’t be edited. When you create a control that uses an expression, Access doesn’t let you edit ...
( Category:
ODBC
March 26,2014 )
epub, mobi, pdf |eng | 2012-11-19 | Author:Matthew Metheny
Table 6.5 Key Process Activities—Step 3 Table 6.6 Key Process Activities—Step 4 Both NIST and the ISO/IEC processes address the ongoing communications and sharing of risk-related information with decision makers ...
( Category:
Cloud Computing
March 26,2014 )
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9796)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7796)
Grails in Action by Glen Smith Peter Ledbrook(7707)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6710)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6709)
Running Windows Containers on AWS by Marcio Morales(6225)
Kotlin in Action by Dmitry Jemerov(5077)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(4993)
Combating Crime on the Dark Web by Nearchos Nearchou(4580)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4487)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4429)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4250)
The Age of Surveillance Capitalism by Shoshana Zuboff(3967)
Python for Security and Networking - Third Edition by José Manuel Ortega(3819)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3518)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3488)
Learn Wireshark by Lisa Bock(3402)
Mastering Python for Networking and Security by José Manuel Ortega(3364)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3339)
Blockchain Basics by Daniel Drescher(3309)
