Search
Search Results
-
Creating a CentOS 8 Server Virtual Machine
In this chapter, you will download a CentOS 8 bootable image to install and create a second virtual machine on your VMware Workstation. The CentOS 8... -
Introduction to Python Network Automation
This chapter introduces the book by starting with a casual discussion of the experience of working as an IT professional in today’s IT landscape. It... -
Using a nested virtualization tool for teaching VPN fundamentals
A common problem of undergraduate courses about security and computer networks is the difficulty of providing practical exercises to students....
-
Enhancing attack resilience of cyber-physical systems through state dependency graph models
This paper presents a method that utilizes graph theory and state modelling algorithms to perform automatic complexity analysis of the architecture...
-
Linux Fundamentals I – Linux File and Directory Mastery
In this chapter, you dive deep into the heart of Linux, exploring the essential concepts and commands that will empower you to navigate and... -
NDFuzz: a non-intrusive coverage-guided fuzzing framework for virtualized network devices
Network function virtualization provides programmable in-network middlewares by leveraging virtualization technologies and commodity hardware and has...
-
Regular Expressions for Network Automation
In this chapter, you venture into the powerful world of Regular Expressions, a universal key to working with text and data in various programming... -
Study of methods for endpoint aware inspection in a next generation firewall
Given the global increase in remote work with the COVID-19 pandemic and deperimeterization due to cloud deployment of next generation firewalls, the...
-
Exploring patron behavior in an academic library: A wi-fi-connection data analysis
This paper introduces a Patron Counting and Analysis (PCA) system that leverages Wi-Fi-connection data to monitor space utilization and analyze...
-
Comparisons of Stock Price Predictions Using Stacked RNN-LSTM
This paper seeks to identify how the RNN-LSTM can be used in predicting the rise and fall in stock markets thereby hel** investors to understand... -
Human Intelligence
From the surging grasslands of Africa to the expansive stretch of our modern cities, the story of life is far broader in scope than just biological... -
Network Device Identification Based on MAC Boundary Inference
Network device is an important part of cyberspace, and accurate identification of network device is the basis of network management and security... -
ACI Fundamentals: Underlay Infrastructure
In this chapter, you will focus on establishing a proper understanding of the main ACI components: the underlay network infrastructure and APIC... -
Introduction: Datacenter Network Evolution
What is a datacenter (or “data center,” which will be used interchangeably throughout the book)? It’s a fairly simple question at first blush to many... -
Design and Simulation of an IoT Intelligent University Campus for Academic Aim
Design, implementation, and experiments as well as the use of simulation technology are useful in learning telecommunication networks, allowing to... -
Overview of Mean Field Games in Wireless Networks
The current generation of wireless networks allows users to access a variety of services such as data, voice, and multimedia. However, according to... -
Deploying a vSphere Environment
Diving into the deployment of a vSphere environment, we begin by focusing on the hardware configuration, ensuring that our physical setup meets the... -
Exploring the effects of roles and group compositions on social and cognitive interaction structures in online collaborative problem-solving
Collaborative problem-solving (CPS) involves the interaction and interdependence of students’ social and cognitive skills, making it a complex...
-
Advanced Features of Wireshark
In this chapter, we will review the capabilities of Wireshark that are in the Advanced features category and as such not referenced in many of the... -
On the coordination of vulnerability fixes
The Common Vulnerabilities and Exposures (CVE) program is dedicated to analyzing vulnerabilities, then to assigning a unique ID to them and...