Networks, Protocols & APIs
epub |eng | 2015-05-09 | Author:Wright, Joshua

* * * A sample packet capture of a Fitbit One device that can be displayed using the SmartRF Packet Sniffer software (without the CC2540 USB hardware) is available on ...
( Category: Cryptography May 9,2019 )
epub |eng | 2019-03-29 | Author:Mustafa Toroman

Getting ready Before you start, open a web browser and go to the Azure portal at https://portal.azure.com. How to do it... In order to modify local network gateway settings, we ...
( Category: Enterprise Applications May 6,2019 )
epub |eng | 2016-05-04 | Author:Mohammad S Obaidat & Petros Nicopolitidis

Figure 10.5 Computing Optimal Policy for the Two-Smart Meter Examples As is discussed previously, the decision maker aims to choose the action with the maximum discounted expected reward. Assume the ...
( Category: Mobile & Wireless May 5,2019 )
epub |eng | 2019-03-29 | Author:Ajit Pratap Kundan

BIG-IP DNS assists with various kinds of queries when the A type query is used extensively. A BIG-IP DNS gets a query by matching the domain name and type with ...
( Category: Intelligence & Semantics May 4,2019 )
epub |eng | 2019-03-29 | Author:Himanshu Sharma

( Category: Hacking May 3,2019 )
epub |eng | 2018-04-29 | Author:Mike Meyers

FIGURE 2.5-30 Typical home network interface box In an office environment, the demarc is usually more complex, given that a typical building simply has to serve a much larger number ...
( Category: Networks April 29,2019 )
azw3 |eng | 2015-03-30 | Author:Diogenes, Yuri & Gilbert, Jeff [Diogenes, Yuri]

* * * Tip There are many more options and configuration policy settings that go beyond the scope of this book that you should review and consider implementing as part ...
( Category: Networks April 12,2019 )
epub |eng | 2016-10-24 | Author:Jordan Krause [Krause, Jordan]

Network Location Server This major component in a DirectAccess infrastructure is something that does not even exist on the DA server itself, or at least it shouldn't if you are ...
( Category: Network Administration April 4,2019 )
azw3, epub, pdf |eng | 2015-07-15 | Author:Piyush Verma

OS fingerprinting attempts OS fingerprinting is the technique where an attacker tries to identify the operating system running on the target machine(s). An attacker can perform either passive or active ...
( Category: Network Security April 4,2019 )
epub, pdf |eng | 2014-01-13 | Author:Ed Wilson [Ed Wilson]

Note Keep in mind that you want to convert the contents of the passwordHash.txt file to a secure string and not the path to the passwordHash.txt file. The first time ...
( Category: Enterprise Applications April 1,2019 )
epub |eng | 2013-05-28 | Author:Brian Svidergol & Robbie Allen

Using a command-line interface The following command creates an AD integrated reverse zone: > dnscmd <DNSServerName> /zoneadd <ZoneName> /DsPrimary Using PowerShell The following PowerShell command will create an Active Directory−integrated ...
( Category: Networks April 1,2019 )
epub |eng | 2010-03-04 | Author:Iljitsch van Beijnum [Iljitsch van Beijnum]

Smurf directed broadcast amplification “Smurf” attacks use misconfigured intermediate networks to multiply traffic, allowing attackers to easily muster up large amounts of traffic without the need to hack any systems. ...
( Category: Networks, Protocols & APIs April 1,2019 )
mobi, epub |eng | 2009-07-15 | Author:Harry Reynolds and Doug Marschke

Enter the Routed VLAN Interface While lollipop routing has a certain aesthetic appeal, it was not long before a sharp engineer realized that by adding some primitive Layer 3 functionality ...
( Category: Networks, Protocols & APIs April 1,2019 )
mobi, epub |eng | 2010-08-15 | Author:Rob Cameron, Brad Woodberg, Patricio Giecco, Timothy Eberhard, and James Quinn

Drop-Packet Drop-Packet will drop an individual offending packet, but not the rest of the session. Typically, you want to use the Drop-Connection action when malicious activity is detected on a ...
( Category: Network Security April 1,2019 )
epub |eng | 2017-03-27 | Author:Rajiv Chopra

3.4 CREATING A VIRTUALIZED ARCHITECTURE During virtualization, software known as a Virtual Machine Monitor (VMM) or a Hypervisor is used. What is a Hypervisor? A hypervisor is an operating system ...
( Category: Cloud Computing March 15,2019 )