Networks, Protocols & APIs
epub, pdf |eng | 2012-10-31 | Author:Doug Lowe [Lowe, Doug]

Figure 4-5: Configuring a Windows client to obtain its DNS address from DHCP. Chapter 5: Using FTP In This Chapter Figuring out the basics of FTP Setting up an FTP ...
( Category: Networks March 26,2014 )
epub |eng | 2012-03-25 | Author:Dinkar Sitaram & Geetha Manjunath

• partition(key2) : Determine a data partition and return the reducer number The partition function is given the key with the number of reducers and returns the index of the ...
( Category: Cloud Computing March 26,2014 )
epub, mobi, pdf |eng | 2013-10-03 | Author:Elliotte Rusty Harold

Disconnecting from the Server HTTP 1.1 supports persistent connections that allow multiple requests and responses to be sent over a single TCP socket. However, when Keep-Alive is used, the server ...
( Category: LAN March 26,2014 )
epub, pdf |eng | 2013-04-01 | Author:Charles E. Spurgeon & Joann Zimmerman [Charles E. Spurgeon and Joann Zimmerman]

In this chapter, we will show some of the basic ways switches can be used to build an Ethernet system. Network design is a large topic, and there are many ...
( Category: LAN March 26,2014 )
epub |eng | 2012-10-23 | Author:Joe Fichera & Steven Bolt

Snort One suggestion I have is to use another open source tool, Snort. Snort is a network intrusion prevention and detection system (IPS/IDS) that was developed by Sourcefire. Snort[5] can ...
( Category: Network Security March 26,2014 )
epub |eng | 2013-03-11 | Author:Jessica McKellar & Abe Fettig

$ twistd -n echo --auth memory:user:pass:foo:bar 2012-12-01 14:04:11-0500 [-] Log opened. 2012-12-01 14:04:11-0500 [-] twistd 12.1.0 (/usr/bin/python 2.7.1) ... 2012-12-01 14:04:11-0500 [-] reactor class: twisted.internet.select... 2012-12-22 14:07:26-0500 [-] EchoFactory starting ...
( Category: Networks, Protocols & APIs March 26,2014 )
epub, mobi |eng | 2013-07-25 | Author:Richard Bejtlich

Part IV. NSM in Action Chapter 9. NSM Operations Analysts need tools to find intruders, but methodology is more important than software. Tools collect and interpret data, but methodology provides ...
( Category: Networks March 26,2014 )
epub, pdf |eng | 2011-03-16 | Author:Lawrence C. Miller

Movies on your TV, courtesy of your gaming console All three of the major gaming consoles now support the delivery of Internet-based movie and TV content to your TV screen. ...
( Category: Networks March 26,2014 )
epub |eng | 2013-03-25 | Author:Kerrie Meyler & Byron Holt & Marcus Oh & Jason Sandys & Greg Ramsey

( Category: Client-Server Systems March 26,2014 )
epub |eng | 2013-07-01 | Author:Wilhelm, Thomas [Wilhelm, Thomas]

TCP Scanning Most of the interesting applications from a pentest perspective use TCP to communicate across the networks, including Web servers, file transfer applications, databases, and more. There are a ...
( Category: Hacking March 26,2014 )
epub, pdf |eng | 2013-01-27 | Author:Eric Cole

There is a lot of focus, energy and effort put against incident response today, but what we have found is not everyone is using the same definitions. Therefore in order ...
( Category: Hacking March 26,2014 )
epub |eng | 2008-12-16 | Author:Kevin Dooley & Ian Brown [Kevin Dooley]

Time-Stamping Router Logs Problem You want the router to record the time along with log and debug messages. Solution The service timestamp global configuration command enables timestamps on debug and ...
( Category: LAN March 26,2014 )
epub |eng | 2012-07-19 | Author:Susan Prosser & Stuart Gripman [Susan Prosser and Stuart Gripman]

If you turn on “Show only related records” and “Match current record only,” then FileMaker returns a found set of only those records that match the active record. The customer ...
( Category: ODBC March 26,2014 )
epub, pdf |eng | 2013-04-10 | Author:Matthew MacDonald

Optionally, set Enabled to No to hammer home the point that this value can’t be edited. When you create a control that uses an expression, Access doesn’t let you edit ...
( Category: ODBC March 26,2014 )
epub, mobi, pdf |eng | 2012-11-19 | Author:Matthew Metheny

Table 6.5 Key Process Activities—Step 3 Table 6.6 Key Process Activities—Step 4 Both NIST and the ISO/IEC processes address the ongoing communications and sharing of risk-related information with decision makers ...
( Category: Cloud Computing March 26,2014 )