|
|
|
|
|
|
|
Writing Security Tools and ExploitsExploits. In most information technology circles these days, the term exploits has become synonymous with vulnerabilities or in some cases, buffer overflows. It is not only a scary word that can keep you up at night wondering if you purchased the best firewalls, configured your new host-based intrusion prevention system correctly,... | | The Complete IS-IS Routing Protocol
IS-IS has always been my favourite Interior Gateway Protocol. Its elegant simplicity, its
well-structured data formats, its flexibility and easy extensibility are all appealing – IS-IS
epitomizes link-state routing. Whether for this reason or others, IS-IS is the IGP of choice
in some of the world’s largest networks.... | | Coastal Pollution: Effects on Living Resources and Humans (Marine Science)
In 1996, after more than a decade of researching the effects of over-population and the consequent pollution of the greater metropolitan New York City area, Carl Sindermann published his observations and conclusions in Ocean Pollution: Effects on Living Resources and Humans, a mostly technical document that emphasized the pathological effects... |
|
|
Result Page: 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 |