DCE/RPC Over SMB

DCE/RPC Over SMB
Author: Luke Kenneth Casson Leighton
Publisher: Sams
Total Pages: 320
Release: 2000
Genre: Computers
ISBN:


Download DCE/RPC Over SMB Book in PDF, Epub and Kindle

Now that Microsoft's systems have been unleashed onto the Internet, they are more vulnerable to attack. This book describes how Microsoft has taken Distributed Computer Environment/Remote Procedure Calls and implemented it over Server Message Block. The author presents Microsoft Developer NT system calls and shows what they look like over the wire.


DCE/RPC Over SMB
Language: en
Pages: 320
Authors: Luke Kenneth Casson Leighton
Categories: Computers
Type: BOOK - Published: 2000 - Publisher: Sams

GET EBOOK

Now that Microsoft's systems have been unleashed onto the Internet, they are more vulnerable to attack. This book describes how Microsoft has taken Distributed
Implementing CIFS
Language: en
Pages: 678
Authors: Christopher R. Hertel
Categories: Computers
Type: BOOK - Published: 2004 - Publisher: Prentice Hall Professional

GET EBOOK

"The book that Microsoft should have written, but didn't." --Jeremy Allison, Samba Team "Your detailed explanations are clear and backed-up with source code--an
TCP/IP Analysis and Troubleshooting Toolkit
Language: en
Pages: 432
Authors: Kevin Burns
Categories: Computers
Type: BOOK - Published: 2003-08-19 - Publisher: John Wiley & Sons

GET EBOOK

A must-have guide for troubleshooting and analyzing TCP/IP onthe Internet and corporate network Follows a practical approach to ensure that TCP/IP stays up andr
IDS and IPS with Snort 3
Language: en
Pages: 256
Authors: Ashley Thomas
Categories: Computers
Type: BOOK - Published: 2024-09-27 - Publisher: Packt Publishing Ltd

GET EBOOK

Learn the essentials of Snort 3.0, including installation, configuration, system architecture, and tuning to develop effective intrusion detection and preventio
Mechanics of User Identification and Authentication
Language: en
Pages: 760
Authors: Dobromir Todorov
Categories: Business & Economics
Type: BOOK - Published: 2007-06-18 - Publisher: CRC Press

GET EBOOK

User identification and authentication are essential parts of information security. Users must authenticate as they access their computer systems at work or at