- 国密SM2数字签名算法文档0 490浏览会员免费
- STM32CAN发送和接收过滤详解,仲裁CAN协议。 STM32CAN发送和接收过滤详解0 348浏览会员免费
- 一个崭新的集网络安全专业技术、基础技术为一体的专业杂志,2010合订本下半年。0 121浏览会员免费
- 一个崭新的集网络安全专业技术、基础技术为一体的专业杂志,2010合订本 上半年。0 103浏览会员免费
- lvs 转发后端时丢包并返回icmp need fragment 报文,使用lvs + keepalived 套件实现高可用和负载均衡功能,读vip链路上有连接失败,链路超时等异常,原因是操作系统的RHEL6.3内核lvs组件与网络gro/gso机制配合存在问题:当前置机器发往lvs的数据包超过1500bytes(ether MTU)时,网络gro/gso机制有机会在lvs将多个小包聚合,导致lvs转发后端的网络包超过MTU,lvs组件对于这类长度大于MTU报文的处理逻辑是不予转发直接丢弃,从而引发业务层传输异常.0 473浏览会员免费
- 无线电广播技术手册,远程遥控技术和信息技术。在人工智能和无线设备领域有参考价值0 209浏览会员免费
- postman中文文档手册,制作了目录,方便阅读,适合需要使用postman入门的人4 1435浏览会员免费
- Fine Packet Builder 快速入门0 70浏览会员免费
- ice3.4文档 Distributed Programming with Ice0 87浏览会员免费
- CentOS部署OCS-Inventory-NG+GLPL教程 企业资产管理工具0 326浏览会员免费
- Over 100 recipes to analyze and troubleshoot network problems using Wireshark 2 This book contains practical recipes on troubleshooting a data communications network. This second version of the book focuses on Wireshark 2, which has already gained a lot of traction due to the enhanced features that it offers to users. The book expands on some of the subjects explored in the first version, including TCP performance, network security, Wireless LAN, and how to use Wireshark for cloud and virtual system monitoring. You will learn how to analyze end-to-end IPv4 and IPv6 connectivity failures for Unicast and Multicast traffic using Wireshark. It also includes Wireshark capture files so that you can practice what you’ve learned in the book. You will understand the normal operation of E-mail protocols and learn how to use Wireshark for basic analysis and troubleshooting. Using Wireshark, you will be able to resolve and troubleshoot common applications that are used in an enterprise network, like NetBIOS and SMB protocols. Finally, you will also be able to measure network parameters, check for network problems caused by them, and solve them effectively. By the end of this book, you’ll know how to analyze traffic, find patterns of various offending traffic, and secure your network from them. What You Will Learn Configure Wireshark 2 for effective network analysis and troubleshooting Set up various display and capture filters Understand networking layers, including IPv4 and IPv6 analysis Explore performance issues in TCP/IP Get to know about Wi-Fi testing and how to resolve problems related to wireless LANs Get information about network phenomena, events, and errors Locate faults in detecting security failures and breaches in networks0 364浏览会员免费
- 利用搜索引擎的规则提高网站在有关搜索引擎内的自然排名。目的是:为网站提供生态式的自我营销解决方案,让其在行业内占据领先地位,获得品牌收益;SEO包含站外SEO和站内SEO两方面;为了从搜索引擎中获得更多的免费流量,从网站结构、内容建设方案、用户互动传播、页面等角度进行合理规划,还会使搜索引擎中显示的网站相关信息对用户来说更具有吸引力。0 447浏览会员免费
- 海康web3.0监控pdf文档,用于海康插件在浏览器端 的调用0 658浏览会员免费
- 在广域网中动态ip视频监控遇到的难题,和前段多设备、多信号的情况下使用的智能汇聚物联网关,有效解决项目难题,大大简化项目对接开发难度!0 391浏览会员免费
- R8.3网康ICG用户手册0 172浏览会员免费
- WiFi 探针可以用来探测周边开启 WiFi 功能的手机的 MAC 地址,无论手机是否连接上 WiFi 路由器,都可以探测(在苹果手机休眠时探测 MAC 随机)。此功能可用于 WiFi客流统计、WiFi 信号考勤等。基于信号强度可进行用户轨迹分析、商场客流热度图、客流量统计、新增客户统计、用户驻留时间等数据分析,辅助商业决策。 基于广大客户的二次开发需要,本公司还提供了全套的 WiFi 探针开发资料包, 开发包包括相关的开发工具软件,WiFi 探针固件的源程序,模块原理图和 PCB 版图,说明书及其它相关增值资料。0 629浏览会员免费
- 深入理解Net-SNMP.pdf,张春强著,高清非扫描版,有目录,4 1051浏览会员免费
- 深信服AC 流控设置。0 223浏览会员免费
- Suricata is a high performance Network IDS, IPS and Network Security Monitoring engine. It is open source and owned by a community-run non-profit foundation, the Open Information Security Foundation (OISF). Suricata is developed by the OISF.0 1001浏览会员免费
- Snort really isn't very hard to use, but there are a lot of command line options to play with, and it's not always obvious which ones go together well. This file aims to make using Snort easier for new users.0 110浏览会员免费
- 云数据库RDS(Relational Database Service)是一种稳定可靠、可弹性伸缩的在线数据库服务。基于飞天分 布式系统和全SSD盘高性能存储,支持MySQL、SQL Server、PostgreSQL和PPAS(高度兼容Oracle)引擎 ,默认部署主备架构且提供了容灾、备份、恢复、监控、迁移等方面的全套解决方案,彻底解决数据库运维的 烦恼0 103浏览会员免费
- zabbix2的服务端与agent端的安装,这是zabbix服务端和agent端安装在一起的(即一台电脑既是服务端也是客户端)0 97浏览会员免费
- RTL8188eu芯片的无线网卡驱动和hostap-qinglajiao-ChinaUnix博客0 317浏览会员免费
- 通信技术综合实验报告201809(光网络与传输)0 276浏览会员免费
- Kali Linux Network Scanning Cookbook - Second Edition by Michael Hixon English | 6 Jun. 2017 | ASIN: B06VW5FB1S | 634 Pages | AZW3 | 36.7 MB Key Features Learn the fundamentals behind commonly used scanning techniques Deploy powerful scanning tools that are integrated into the Kali Linux testing platform The practical recipes will help you automate menial tasks and build your own script library Book Description With the ever-increasing amount of data flowing in today’s world, information security has become vital to any appl ication. This is where Kali Linux comes in. Kali Linux focuses mainly on security auditing and penetration testing. This step-by-step cookbook on network scanning trains you in important scanning concepts based on version 2016.2. It will enable you to conquer any network environment through a range of network scanning techniques and will also equip you to script your very own tools. Starting with the fundamentals of installing and managing Kali Linux, this book will help you map your target with a wide range of network scanning tasks, including discovery, port scanning, fingerprinting, and more. You will learn how to utilize the arsenal of tools available in Kali Linux to conquer any network environment. The book offers expanded coverage of the popular Burp Suite and has new and updated scripts for automating scanning and target exploitation. You will also be shown how to identify remote services, how to assess security risks, and how various attacks are performed. You will cover the latest features of Kali Linux 2016.2, which includes the enhanced Sparta tool and many other exciting updates. This immersive guide will also encourage the creation of personally scripted tools and the skills required to create them. What you will learn Develop a network-testing environment that can be used to test scanning tools and techniques Understand the underlying principles of network scanning technologies by building custom scripts and tools Identify distinct vulnerabilities in both web applications and remote services and understand the techniques that are used to exploit them Perform comprehensive scans to identify listening on TCP and UDP sockets Get an overview of the different desktop environments for Kali Linux such as KDE, MATE, LXDE, XFC, and so on Use Sparta for information gathering, port scanning, fingerprinting, vulnerability scanning, and more Evaluate Denial of Service threats and develop an understanding of how common Denial of Service attacks are performed Learn how to use Burp Suite to evaluate web applications About the Author Michael Hixon is a former Marine Corps veteran; he worked as an infantryman and counterintelligence agent. After the military, he worked as a programmer before changing his focus to IT security. Michael has worked for the Red Cross, Department of Defense, Department of Justice, and numerous intelligence agencies in his career. Michael currently runs the Baltimore chapter of OWASP, and oversees security for a number of the FAA’s web sites, CISSP, CEH, and eCPPT.5 235浏览会员免费
- 本人自测可以安装并进入系统可以监控。。。。。。。。0 442浏览会员免费
- 移动统一DPI详细规范,对DPI 的识别能力提出详细的要求。1 1810浏览会员免费
- Learn RouterOS0 86浏览会员免费
- Essential SNMP 2nd Edition.pdf 此书的最新版本, 同时是SNMP方面的权威书籍.0 108浏览会员免费
- 从运维角度对Zabbix的各项功能进行了详细介绍,以自动化运维视角为出发点,对Zabbix的安装配置,自动化功能,监控告警,性能调优等内容进行了全方位的深入剖析。3 506浏览会员免费
- linux加入windows域之完美方案,亲测可以用。0 443浏览会员免费
- 分布式会话跟踪系统架构设计与实践 张志桐@美团点评基础架构中心 20160625 链路追踪(调用链路监控)最出名的是谷歌公开的论文提到的Dapper(中文版)。开发Dapper是为了收集更多的复杂分布式系统的行为信息,理解分布式系统的行为。这就需要监控那些横跨了不同的应用、不同的服务器之间的关联动作。在复杂的微服务架构系统中,几乎每一个前端请求都会形成一个复杂的分布式服务调用链路。0 925浏览会员免费
- 鹰眼下的淘宝 ---分布式调用跟踪系统介绍 全链路追踪(调用链路监控)最出名的是谷歌公开的论文提到的Dapper(中文版)。开发Dapper是为了收集更多的复杂分布式系统的行为信息,理解分布式系统的行为。这就需要监控那些横跨了不同的应用、不同的服务器之间的关联动作。在复杂的微服务架构系统中,几乎每一个前端请求都会形成一个复杂的分布式服务调用链路。3 2751浏览会员免费
- Modbus读写数据比较,Modbus读写数据比较0 194浏览会员免费
- Nowadays, monitoring systems play a crucial role in any IT environment. They are extensively used to not only measure your system's performance, but also to forecast capacity issues. This is where Zabbix, one of the most popular monitoring solutions for networks and applications, comes into the picture. With an efficient monitoring system in place, you'll be able to foresee when your infrastructure runs under capacity and react accordingly. Due to the critical role a monitoring system plays, it is fundamental to implement it in the best way from its initial setup. This avoids misleading, confusing, or, even worse, false alarms that can disrupt an efficient and healthy IT department.0 255浏览会员免费
- 《基于DNS的隐蔽通道流量检测》,总结了DNS隐蔽隧道通信的一些特征,可以参考这些特征来构建自己的机器学习模型以通过机器学习检测网络内部的DNS隐蔽隧道通信,防范网络间谍程序或APT(高级可持续性威胁)病毒。个人研究或IDS(入侵检测设备)制造商可以参考4 416浏览会员免费
- GB 35114-2017 公共安全视频监控联网信息安全技术要求,pdf文档0 74浏览会员免费
- zabbix2.0使用手册,运用 zabbix 构建企业大型监控系统0 97浏览会员免费
- 使用WhatsUP在Client端接收SNMP Server的网管监控资料。0 134浏览会员免费
- The Art of Monitoring-James Turnbull(2016).The Art of Monitoring-James Turnbull(2016)0 158浏览会员免费
- 经过系统深入的分析,读者既能对WinPcap的架构、使用与实现机制有深入的理解,又能快速熟悉操作系统内核与用户层交互的实现机制,并全面了解网络分析专业各方面的技术,进而将相关知识运用到实际项目中。0 102浏览会员免费
- wifi问题log 复现问题抓取信息前,或者抓取后,记得收集以下信息: a.本机的 wifi mac 地址及分配到的 ip 地址 b.本机连接的路由器的 AP/SSID/IP 地址 c.测试开始时间点 d.测试出现问题的大概时间点5 2013浏览会员免费
- this RFC is an official specification for the internet community. It incorporates by reference,amends,corrects,an supplements the primary protocol standards documents relating to hosts.0 71浏览会员免费
- TR-114 VDSL2 Performance Test Plan Issue: 3 Amendment 4 Issue Date: June 20180 109浏览会员免费
- TR-104 Provisioning Parameters for VoIP CPE Issue: 2 Issue Date: March 20140 179浏览会员免费
- TR-098 Internet Gateway Device Data Model for TR-069 Issue: 1 Amendment 2 Corrigendum 1 Issue Date: December 20140 89浏览会员免费
- TR-143 Enabling Network Throughput Performance Tests and Statistical Monitoring Issue: 1 Amendment 1 Corrigendum 1 Issue Date: August 20153 260浏览会员免费
- broadband forum org, TR-181 Issue 2 Amendment 12 pdf, 20180 214浏览会员免费
- 本安装手册主要介绍网络卫士防火墙的安装和使用。通过阅读本文档,用户可以了解 如何正确地在网络中安装网络卫士防火墙,并进行简单配置。0 115浏览会员免费
- 《妙手回春:网站可用性测试及优化指南(修订版)》是作者Steve Krug继畅销书《点石成金:访客至上的网页设计秘笈》(Don't Make Me Think)后推出的又一力作。多年来,人们就认识到网站可用性测试可以极大地改善产品质量,但鉴于正规的可用性测试流程复杂、费用高昂,很少人这样做。在《妙手回春:网站可用性测试及优化指南(修订版)》中,作者详细阐述了一种简化的网站可用性测试方法,让任何人都能够尽早并频繁地对其网站、应用程序和其他产品进行可用性测试,从而将最严重的可用性问题消灭在萌芽状态。 《妙手回春:网站可用性测试及优化指南(修订版)》短小精悍,语言轻松幽默,任何从事产品设计或对可用性测试感兴趣的读者都将受益匪浅。1 290浏览会员免费
- 网络监控软件cacti的PDF版手册,官网下载速度比较慢。0 119浏览会员免费
- Wireshark数据包分析实战 第2版 本书从网络嗅探和数据包分析为基础,逐步介绍Wireshark基本使用方法1 82浏览会员免费
- 讲解如何使用wireshark进行网络排错及监控,经典书籍。0 73浏览会员免费
- 本文档涉及内容,zabbix 的安装配置,zabbix 的邮件报警,zabbix 自定义脚本,自动化 配置0 85浏览会员免费
- 最新安川驱动器CN3通信协议,包括使用方法和接线定义。中文版很实用,和代理商那拿的最新资料。最新安川驱动器CN3通信协议,包括使用方法和接线定义。中文版很实用,和代理商那拿的最新资料。0 258浏览会员免费
- 网络传输态势感知的研究与实现,利用网络参数预判网络0 88浏览会员免费
- 基于机器学习技术的新一代web入侵检测技术有望弥补传统规则集方法的不足,为web对抗的防守端带来新的发展和突破。0 285浏览会员免费
- Wireshark数据包分析实战详解0 711浏览会员免费
- 深信服上网行为安全网关设备主要功能介绍。包括:精准的上网行为识别、灵活的授权策略、细致的带宽和流量管理。0 246浏览会员免费
- 安捷伦N9030A-N9020-N9010-N9000使用说明书-入门及故障,操作说明4 1605浏览会员免费