Search alternatives:
"poet" » "post", "port", "poem"

1
by Foster, James C.
Published 2005
Syngress Pub.
... developers: coding, sockets, shellocode, porting applications, and coding security tools...

2
by Fleishman, Glenn
Published 2022
alt concepts
... figuratively cuts through the mess of ports, cables, and protocols with his new book, Take Control...

3
by Wade, Matt, LaPorte, Jamie
Published 2021
Visual

4
by Shaw, David
Published 2015
Packt Publishing
...Harness the power of Nmap, the most versatile network port scanner on the planet, to secure large...

5
by Piper, Ben
Published 2017
Manning Publications Co.
Table of Contents: ... system -- Managing switch ports -- Securing ports by using the port securit feature -- Managing virtual...

6
by Hagino, Jun-ichiro itojun
Published 2005
Elsevier Digital Press
Table of Contents: ...Introduction -- IPv6 socket programming -- Porting applications to support IPv6 -- Tips in IPv6...

7
by Hassell, Jonathan
Published 2002
O'Reilly
Table of Contents: ...Framed-RouteFramed-Routing; Idle-Timeout; Login-LAT-Group; Login-LAT-Node; Login-LAT-Port; Login...

8
by Mohit
Published 2018
Packt Publishing
Table of Contents: ... -- What are the services running on the target machine? -- The concept of a port scanner -- How to create...

9
by Kennedy, David
Published 2011
No Starch Press
Table of Contents: ... Your First Machine; Exploiting an Ubuntu Machine; All-Ports Payloads: Brute Forcing Ports; Resource...

10
by Baloch, Rafay
Published 2015
CRC Press
Table of Contents: ... and port scanning techniques -- Vulnerability assessment -- Network sniffing -- Remote exploitation...

11
by Grevers, Ted
Published 2007
Cisco Press
Table of Contents: ... scenarios -- Common ports and assigned applications -- Ten places for more information...

12
Published 2009
Palgrave Macmillan UK
... the socio-economic transformation in Asia and the restructuring of manufacturing industries, ports...

13
by Kanclirz, Jan
Published 2008
Syngress Pub.

14
by Rountree, Derrick
Published 2011
Syngress
Table of Contents: ... and Operational Security; Chapter 6. Security Assessments and Audits; Appendix A: Common Applications and Port...

15
by Grimes, Brad
Published 2014
McGraw-Hill Education
Table of Contents: ..., ports, and documenting AV devices and protocols -- Part III : Networked AV applications -- Audio...

16
by Messier, Ric
Published 2017
Wiley
Table of Contents: ...Port SpanningARP Spoofing; Passive Scanning; Packet Analysis with Wireshark; Packet Decoding...

17
by LeBlanc, Jonathan
Published 2011
O'Reilly
Table of Contents: ... references -- Porting applications, profiles, and friendships -- OpenSocial activities, sharing, and data...

18
by Liu, Dale
Published 2009
Syngress Pub.
Table of Contents: ... Advanced Use -- Chapter 13: SSH Port Forwarding -- Index...

19
by Deming, David
Published 2014
Auerbach
Table of Contents: ... -- Physical Layer -- Chapter 7 -- Error Handling -- Chapter 8 -- Cables and Connectors -- Chapter 9 -- Port...

20
by Hixon, Michael, Hutchens, Justin
Published 2017
Packt Publishing
Table of Contents: ... host discovery -- Getting ready -- How to do it... -- How it works... -- Chapter 4: Port Scanning...