We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 41-60 of 7,525 results
  1. Creating a CentOS 8 Server Virtual Machine

    In this chapter, you will download a CentOS 8 bootable image to install and create a second virtual machine on your VMware Workstation. The CentOS 8...
    Chapter 2021
  2. Introduction to Python Network Automation

    This chapter introduces the book by starting with a casual discussion of the experience of working as an IT professional in today’s IT landscape. It...
    Chapter 2024
  3. Using a nested virtualization tool for teaching VPN fundamentals

    A common problem of undergraduate courses about security and computer networks is the difficulty of providing practical exercises to students....

    Juan M. Orduña, Carlos Pérez in Cluster Computing
    Article Open access 21 February 2024
  4. Enhancing attack resilience of cyber-physical systems through state dependency graph models

    This paper presents a method that utilizes graph theory and state modelling algorithms to perform automatic complexity analysis of the architecture...

    Konstantinos Adamos, George Stergiopoulos, ... Dimitris Gritzalis in International Journal of Information Security
    Article Open access 22 July 2023
  5. Linux Fundamentals I – Linux File and Directory Mastery

    In this chapter, you dive deep into the heart of Linux, exploring the essential concepts and commands that will empower you to navigate and...
    Chapter 2024
  6. NDFuzz: a non-intrusive coverage-guided fuzzing framework for virtualized network devices

    Network function virtualization provides programmable in-network middlewares by leveraging virtualization technologies and commodity hardware and has...

    Yu Zhang, Nanyu Zhong, ... Wei Huo in Cybersecurity
    Article Open access 01 November 2022
  7. Regular Expressions for Network Automation

    In this chapter, you venture into the powerful world of Regular Expressions, a universal key to working with text and data in various programming...
    Chapter 2024
  8. Study of methods for endpoint aware inspection in a next generation firewall

    Given the global increase in remote work with the COVID-19 pandemic and deperimeterization due to cloud deployment of next generation firewalls, the...

    Jenny Heino, Antti Hakkala, Seppo Virtanen in Cybersecurity
    Article Open access 03 September 2022
  9. Exploring patron behavior in an academic library: A wi-fi-connection data analysis

    This paper introduces a Patron Counting and Analysis (PCA) system that leverages Wi-Fi-connection data to monitor space utilization and analyze...

    Article 18 October 2023
  10. Comparisons of Stock Price Predictions Using Stacked RNN-LSTM

    This paper seeks to identify how the RNN-LSTM can be used in predicting the rise and fall in stock markets thereby hel** investors to understand...
    Sheldon Sequeira, P. K. Nizar Banu in Data Science and Computational Intelligence
    Conference paper 2021
  11. Human Intelligence

    From the surging grasslands of Africa to the expansive stretch of our modern cities, the story of life is far broader in scope than just biological...
    Chapter 2024
  12. Network Device Identification Based on MAC Boundary Inference

    Network device is an important part of cyberspace, and accurate identification of network device is the basis of network management and security...
    **nmiao Guo, **angnan Li, ... **angyang Luo in Advances in Artificial Intelligence and Security
    Conference paper 2021
  13. ACI Fundamentals: Underlay Infrastructure

    In this chapter, you will focus on establishing a proper understanding of the main ACI components: the underlay network infrastructure and APIC...
    Jan Janovic in Cisco ACI: Zero to Hero
    Chapter 2023
  14. Introduction: Datacenter Network Evolution

    What is a datacenter (or “data center,” which will be used interchangeably throughout the book)? It’s a fairly simple question at first blush to many...
    Jan Janovic in Cisco ACI: Zero to Hero
    Chapter 2023
  15. Design and Simulation of an IoT Intelligent University Campus for Academic Aim

    Design, implementation, and experiments as well as the use of simulation technology are useful in learning telecommunication networks, allowing to...
    Mary Luz Mouronte-López, Ángel Lambertt Lobaina, ... Jorge Alberto Rodríguez Rubio in Learning and Collaboration Technologies
    Conference paper 2023
  16. Overview of Mean Field Games in Wireless Networks

    The current generation of wireless networks allows users to access a variety of services such as data, voice, and multimedia. However, according to...
    Reginald A. Banez, Lixin Li, ... Zhu Han in Mean Field Game and its Applications in Wireless Networks
    Chapter 2021
  17. Deploying a vSphere Environment

    Diving into the deployment of a vSphere environment, we begin by focusing on the hardware configuration, ensuring that our physical setup meets the...
    Luciano Patrão in VMware vSphere Essentials
    Chapter 2024
  18. Exploring the effects of roles and group compositions on social and cognitive interaction structures in online collaborative problem-solving

    Collaborative problem-solving (CPS) involves the interaction and interdependence of students’ social and cognitive skills, making it a complex...

    Yeye Tang, Xu Du, ... Yiqian **e in Education and Information Technologies
    Article 06 March 2024
  19. Advanced Features of Wireshark

    In this chapter, we will review the capabilities of Wireshark that are in the Advanced features category and as such not referenced in many of the...
    Kevin Cardwell in Tactical Wireshark
    Chapter 2023
  20. On the coordination of vulnerability fixes

    The Common Vulnerabilities and Exposures (CVE) program is dedicated to analyzing vulnerabilities, then to assigning a unique ID to them and...

    Jiahuei Lin, Bram Adams, Ahmed E. Hassan in Empirical Software Engineering
    Article 10 November 2023
Did you find what you were looking for? Share feedback.