Home
>
Computers & Technology
>
Networking & Cloud Computing
>
Networks, Protocols & APIs
>
Networks
Networks
epub, pdf |eng | 2009-04-17 | Author:Andy Oram
Breakers usually represent the glass as half empty, and are often so pessimistic that you wonder, when listening to some of them, why the Internet hasn’t totally collapsed already and ...
( Category:
Networks
May 12,2019 )
epub |eng | 2018-04-29 | Author:Mike Meyers
FIGURE 2.5-30 Typical home network interface box In an office environment, the demarc is usually more complex, given that a typical building simply has to serve a much larger number ...
( Category:
Networks
April 29,2019 )
azw3 |eng | 2015-03-30 | Author:Diogenes, Yuri & Gilbert, Jeff [Diogenes, Yuri]
* * * Tip There are many more options and configuration policy settings that go beyond the scope of this book that you should review and consider implementing as part ...
( Category:
Networks
April 12,2019 )
epub |eng | 2013-05-28 | Author:Brian Svidergol & Robbie Allen
Using a command-line interface The following command creates an AD integrated reverse zone: > dnscmd <DNSServerName> /zoneadd <ZoneName> /DsPrimary Using PowerShell The following PowerShell command will create an Active Directory−integrated ...
( Category:
Networks
April 1,2019 )
epub |eng | 2019-02-14 | Author:Peter Bradley [Bradley, Peter]
Hacking a Wi-Fi Network – Practical Guide Kali Linux is a versatile tool and can be used for a lot of different things but it is best known for hacking ...
( Category:
Networks
February 27,2019 )
epub |eng | | Author:Bogdan Ciubotaru & Gabriel-Miro Muntean
( Category:
Expert Systems
March 30,2017 )
epub, pdf |eng | | Author:Joseph Migga Kizza
Other configurations of firewalls depend on the structure of the network. For example, in a set up with multiple networks, several firewalls may be used, one per network. Security in ...
( Category:
Networks
March 4,2017 )
epub |eng | | Author:Frank M. Groom, Kevin Groom & Stephan S. Jones
Figure 14.4 Two main goals of issuing denial-of-service attacks. Stopping Services Locally, these attacks are focused on process crashing and forcing system reconfiguration. Remotely, the attacks are predominantly focused on ...
( Category:
Networks
December 11,2016 )
mobi |eng | 2016-04-07 | Author:Arshad Iqbal
Header Station Header Transmission MCQ 78: In internetwork, the network layer at the destination is responsible for Address Authentication Address Links Address IP Address Verification MCQ 79: The total length ...
( Category:
Networks
June 26,2016 )
epub |eng | 2013-10-24 | Author:Nitesh Dhanjani [Nitesh Dhanjani and Justin Clarke]
Scanner Design Now that we have defined the basic requirements for our scanner, we can start to develop an overview of the scanner’s overall structure. Based on our requirements, two ...
( Category:
LAN
May 11,2016 )
epub |eng | | Author:Mike O’Leary
Persistence Another important use of malware by attackers is for persistence. Persistence scripts allow an attacker the ability to return to a compromised system without the necessity of exploiting it ...
( Category:
Networks
April 8,2016 )
mobi |eng | 2010-06-27 | Author:Teare, Diane [Teare, Diane]
In both cases, routing can be either static or dynamic (typically BGP). Multihomed ISP Connectivity Figure 6-9 illustrates a company connected to two different ISPs. The benefits of doing so ...
( Category:
Networks
February 14,2016 )
epub |eng | 2015-12-15 | Author:Beaver, Kevin
( Category:
LAN
January 14,2016 )
azw3 |eng | 2015-12-15 | Author:Beaver, Kevin [Beaver, Kevin]
Scanning your local airwaves Monitor the airwaves around your building to see what authorized and unauthorized APs you can find. You’re looking for the SSID, which is your wireless network ...
( Category:
LAN
January 14,2016 )
azw3 |eng | 2015-08-16 | Author:Taylor, Peter J. & Derudder, Ben [Taylor, Peter J.]
Measuring hinterworlds To compute a city’s hinterworld it is necessary to specify its external relations with all other cities. For this exercise we deal with our operational roster of 152 ...
( Category:
Networks
January 5,2016 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9787)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7789)
Grails in Action by Glen Smith Peter Ledbrook(7705)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6643)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6628)
Running Windows Containers on AWS by Marcio Morales(6157)
Kotlin in Action by Dmitry Jemerov(5074)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(4957)
Combating Crime on the Dark Web by Nearchos Nearchou(4544)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4422)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4415)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4209)
The Age of Surveillance Capitalism by Shoshana Zuboff(3964)
Python for Security and Networking - Third Edition by José Manuel Ortega(3781)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3515)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3448)
Mastering Python for Networking and Security by José Manuel Ortega(3358)
Learn Wireshark by Lisa Bock(3339)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3337)
Blockchain Basics by Daniel Drescher(3307)
