Networks, Protocols & APIs
pdf | | 2015-05-04 | Author:Unknown
( Category:
Networks, Protocols & APIs
August 20,2024 )
epub |eng | 2024-02-04 | Author:Wealth, Victor
Chapter 6: Maintaining Communication During Power Outages During power outages, maintaining communication channels becomes paramount for ensuring connectivity and coordination in emergency situations. Various strategies and technologies exist to mitigate ...
( Category:
Networks, Protocols & APIs
April 24,2024 )
pdf | | 2016-11-22 | Author:Phillip A. Laplante
( Category:
Networks, Protocols & APIs
October 24,2023 )
pdf | | | Author:Unknown
( Category:
Networks, Protocols & APIs
April 28,2023 )
pdf | | 2021-12-09 | Author:Yalin Guo & Botao Qiao
( Category:
Networks, Protocols & APIs
February 6,2023 )
pdf | | | Author:User
( Category:
Networks, Protocols & APIs
December 17,2022 )
epub |eng | 2022-04-04 | Author:Jean Nestor M. Dahj; [Dahj;, Jean Nestor M.]
These storage requirements are essential for reproducing and consuming intelligence within and outside the organization. When selecting feeds, the CTI team must evaluate the complexity of storing the data. Intelligence ...
( Category:
Networks, Protocols & APIs
September 19,2022 )
epub |eng | 2021-01-05 | Author:Zen, Vittore [Zen, Vittore]
{Some examples of filter rule} Before giving some examples of filtering rules it is useful to re-read some ports used by the most common services in the table table:common-ports . ...
( Category:
Networks, Protocols & APIs
September 1,2022 )
epub |eng | 2022-08-15 | Author:Srivastava, Vizeet; [Srivastava, Vizeet]
Malware Malware is a malicious program that intends to steal information or damage the computer or network. Malware could be used to steal information by spyware or trojan. Malware can ...
( Category:
Networks, Protocols & APIs
August 22,2022 )
pdf | | 2021-03-29 | Author:Centieiro, Henrique
( Category:
Networks, Protocols & APIs
June 20,2022 )
Categories
Popular ebooks
Kubernetes in Production Best Practices by Aly Saleh & Murat Karslioglu(6787)Optimizing Microsoft Azure Workloads by Rithin Skaria(6327)
Kubernetes in Production Best Practices by Aly Saleh and Murat Karslioglu(6058)
Cloud Computing Demystified for Aspiring Professionals by David Santana(5170)
Zed Attack Proxy Cookbook by Ryan Soper & Nestor N Torres & Ahmed Almoailu(4597)
Google Cloud for Developers: Write, migrate, and extend your code by leveraging Google Cloud by Hector Parra Martinez(3578)
Mastering Cyber Intelligence by Jean Nestor M. Dahj;(3282)
AWS Observability Handbook by Phani Kumar Lingamallu & Fabio Braga de Oliveira(3196)
The Road to Azure Cost Governance by Paola E. Annis Giuliano Caglio(2811)
Microsoft 365 Fundamentals Guide by Gustavo Moraes and Douglas Romão(2256)
Agile Security Operations: Engineering for Agility in Cyber Defense, Detection, and Response by Hinne Hettema(1791)
Cloud Identity Patterns and Strategies: Design enterprise cloud identity models with OAuth 2.0 and Azure Active Directory by Giuseppe Di Federico Fabrizio Barcaroli(1776)
Bootstrapping Service Mesh Implementations with Istio by Anand Rai(1673)
The Road to Azure Cost Governance: Techniques to tame your monthly Azure bill with a continuous optimization journey for your apps by Paola E. Annis Giuliano Caglio(1267)
Zed Attack Proxy Cookbook: Hacking tactics, techniques, and procedures for testing web applications and APIs by Ryan Soper Nestor N Torres Ahmed Almoailu(1200)
Agile Security Operations: Engineering for agility in cyber defense, detection, and response by Hinne Hettema(1199)
Linux Administration Best Practices: Practical Solutions to Approaching the Design and Management of Linux Systems by Scott Alan Miller(1136)
DevSecOps in Practice with VMware Tanzu: Build, run, and manage secure multi-cloud apps at scale on Kubernetes with the Tanzu portfolio by Parth Pandit Robert Hardt(1085)
Terraform for Google Cloud Essential Guide by Bernd Nordhausen(893)
Becoming KCNA Certified by Dmitry Galkin(875)
