Networks, Protocols & APIs
epub |eng | 2015-05-09 | Author:Wright, Joshua
* * * A sample packet capture of a Fitbit One device that can be displayed using the SmartRF Packet Sniffer software (without the CC2540 USB hardware) is available on ...
( Category:
Cryptography
May 9,2019 )
epub |eng | 2019-03-29 | Author:Mustafa Toroman
Getting ready Before you start, open a web browser and go to the Azure portal at https://portal.azure.com. How to do it... In order to modify local network gateway settings, we ...
( Category:
Enterprise Applications
May 6,2019 )
epub |eng | 2016-05-04 | Author:Mohammad S Obaidat & Petros Nicopolitidis
Figure 10.5 Computing Optimal Policy for the Two-Smart Meter Examples As is discussed previously, the decision maker aims to choose the action with the maximum discounted expected reward. Assume the ...
( Category:
Mobile & Wireless
May 5,2019 )
epub |eng | 2019-03-29 | Author:Ajit Pratap Kundan
BIG-IP DNS assists with various kinds of queries when the A type query is used extensively. A BIG-IP DNS gets a query by matching the domain name and type with ...
( Category:
Intelligence & Semantics
May 4,2019 )
epub |eng | 2019-03-29 | Author:Himanshu Sharma
( Category:
Hacking
May 3,2019 )
epub |eng | 2018-04-29 | Author:Mike Meyers
FIGURE 2.5-30 Typical home network interface box In an office environment, the demarc is usually more complex, given that a typical building simply has to serve a much larger number ...
( Category:
Networks
April 29,2019 )
azw3 |eng | 2015-03-30 | Author:Diogenes, Yuri & Gilbert, Jeff [Diogenes, Yuri]
* * * Tip There are many more options and configuration policy settings that go beyond the scope of this book that you should review and consider implementing as part ...
( Category:
Networks
April 12,2019 )
epub |eng | 2016-10-24 | Author:Jordan Krause [Krause, Jordan]
Network Location Server This major component in a DirectAccess infrastructure is something that does not even exist on the DA server itself, or at least it shouldn't if you are ...
( Category:
Network Administration
April 4,2019 )
azw3, epub, pdf |eng | 2015-07-15 | Author:Piyush Verma
OS fingerprinting attempts OS fingerprinting is the technique where an attacker tries to identify the operating system running on the target machine(s). An attacker can perform either passive or active ...
( Category:
Network Security
April 4,2019 )
epub, pdf |eng | 2014-01-13 | Author:Ed Wilson [Ed Wilson]
Note Keep in mind that you want to convert the contents of the passwordHash.txt file to a secure string and not the path to the passwordHash.txt file. The first time ...
( Category:
Enterprise Applications
April 1,2019 )
epub |eng | 2013-05-28 | Author:Brian Svidergol & Robbie Allen
Using a command-line interface The following command creates an AD integrated reverse zone: > dnscmd <DNSServerName> /zoneadd <ZoneName> /DsPrimary Using PowerShell The following PowerShell command will create an Active Directory−integrated ...
( Category:
Networks
April 1,2019 )
epub |eng | 2010-03-04 | Author:Iljitsch van Beijnum [Iljitsch van Beijnum]
Smurf directed broadcast amplification “Smurf” attacks use misconfigured intermediate networks to multiply traffic, allowing attackers to easily muster up large amounts of traffic without the need to hack any systems. ...
( Category:
Networks, Protocols & APIs
April 1,2019 )
mobi, epub |eng | 2009-07-15 | Author:Harry Reynolds and Doug Marschke
Enter the Routed VLAN Interface While lollipop routing has a certain aesthetic appeal, it was not long before a sharp engineer realized that by adding some primitive Layer 3 functionality ...
( Category:
Networks, Protocols & APIs
April 1,2019 )
mobi, epub |eng | 2010-08-15 | Author:Rob Cameron, Brad Woodberg, Patricio Giecco, Timothy Eberhard, and James Quinn
Drop-Packet Drop-Packet will drop an individual offending packet, but not the rest of the session. Typically, you want to use the Drop-Connection action when malicious activity is detected on a ...
( Category:
Network Security
April 1,2019 )
epub |eng | 2017-03-27 | Author:Rajiv Chopra
3.4 CREATING A VIRTUALIZED ARCHITECTURE During virtualization, software known as a Virtual Machine Monitor (VMM) or a Hypervisor is used. What is a Hypervisor? A hypervisor is an operating system ...
( Category:
Cloud Computing
March 15,2019 )
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9799)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7799)
Grails in Action by Glen Smith Peter Ledbrook(7712)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6739)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6739)
Running Windows Containers on AWS by Marcio Morales(6254)
Kotlin in Action by Dmitry Jemerov(5080)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5005)
Combating Crime on the Dark Web by Nearchos Nearchou(4591)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4513)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4431)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4268)
The Age of Surveillance Capitalism by Shoshana Zuboff(3968)
Python for Security and Networking - Third Edition by José Manuel Ortega(3834)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3522)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3503)
Learn Wireshark by Lisa Bock(3424)
Mastering Python for Networking and Security by José Manuel Ortega(3368)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3343)
Blockchain Basics by Daniel Drescher(3316)
