Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for ''
published presentations and documents on DocSlides.
DNS Load Balancing in the CERN Cloud Highlights
by stone946
Highlights. Ignacio Reguero . Naredo and Lorena Lo...
Network Applications: DNS;
by melanie
. Network . Programming: . UDP,. . TCP. Th. is. ...
The Challenge of DNS and IP Mappings
by grace3
By: Dr. T V Gopal, Professor, DCSE, CEG Campus, An...
The DNS or Domain Name System is a critical piece of the
by jade
1 Abstract — Internet infrastructure. In recent...
AWS Hybrid DNS with Active
by sophia2
Directory Technical Guide June 9 , 202 1 Notices C...
anycasted secondary DNS service procured from a specialist company ope
by lydia
user, these two servers shall be run in active-act...
DNS-sly: Avoiding Censorship through Network Complexity
by myesha-ticknor
Qurat-Ul-Ann Akbar, Northwestern U. . ...
DNS and the Web EE 122, Fall 2013
by danika-pritchard
Sylvia Ratnasamy. http://inst.eecs.berkeley.edu/~...
1 Improved DNS Server Selection for Multi-Homed Nodes
by kittie-lecroy
. draft-savolainen-mif-dns-server-selection-04. ...
DNS-sly: Avoiding Censorship through Network Complexity
by lois-ondreau
Qurat-Ul-Ann Akbar, Northwestern U. . ...
DNS as a Gatekeeper: Creating Lightweight Capabilities for
by conchita-marotz
Curtis Taylor. taylorcr@ornl.gov. Craig . Shue. c...
Networking Services: NAT, DHCP, DNS, Multicasting, NTP
by stefany-barnette
Magda El Zarki. Prof. of CS. Univ. of CA, Irvine....
Ch 3: Networking Services: NAT, DHCP, DNS, Multicasting, NTP
by brooke
Magda El Zarki. Prof. of CS. Univ. of CA, Irvine. ...
Mobile Broadband Technologies
by davies
www.strategyanalytics.com Virtual Domain Name Syst...
CSC 495/583 Advanced Topics in Computer Security
by natalia-silvester
CSC 495/583 Advanced Topics in Computer Security ...
Introduction to DNSWatch
by myesha-ticknor
1. Introduction to DNSWatch . DNSWatch. Overview...
When the Sky is Falling Network-Scale Mitigation of High-Volume
by kittie-lecroy
Reflection/Amplification . DDoS. Attacks. Introd...
Networking and the Internet
by liane-varnes
Introduction: “Everything is Connected to Every...
re·con·nais·sance
by celsa-spraggs
Dr. Andy Wu. BCIS . 4630 Fundamentals of IT Secur...
Data Communications and Networks
by pasty-toler
Chapter 5 – Network Services DNS, DHCP, FTP and...
Review
by trish-goza
CS 3516 – Computer Networks. Protocol. What doe...
Some thoughts on
by pamella-moone
The ID/LOC Split. David . Freedman – Network Ma...
Data Communications and Networks
by briana-ranney
Chapter 5 – Network Services DNS, DHCP, FTP and...
CS590/690 Detecting network interference
by valerie
(Spring 2018). Lecture 04. Phillipa. . Gill. ACKs...
Leandro M. Bertholdo Towards a federated anycast infrastructure
by layla
16/Jun/2022. University of Twente. A case study wi...
The Link Layer Introduction to the Link Layer
by berey
. Error-detection and -correction Techniques. Mult...
Nick Kavadias nick@cryptoaustralia.org.au
by danika-pritchard
I’m new to . RPi. and Pi-hole. I’ve been us...
Application Layer and Socket Programming
by celsa-spraggs
Hakim . Weatherspoon. Assistant Professor, . Dept...
Does Your Time to First Byte Bite?
by liane-varnes
Data . Connectors . Philadelphia. 1. David Thomps...
IPv6 @ Cloudflare (and v6 related items)
by calandra-battersby
AfPIF Abidjan – August/2017. Martin J. Levy @ C...
Host Identifier Revocation in HIP
by ellena-manuel
. draft-irtf-hiprg-revocation-01. . Dacheng Zha...
Does Your Time to First Byte Bite?
by briana-ranney
Data Connectors . Minneapolis. 1. Scott Taylor. ...
P561: Network Systems
by briana-ranney
Week 7: Finding content. Multicast. Tom Ander...
Latest relevant Techniques and applications
by conchita-marotz
Distributed Systems. Outline. Services: DNSSEC. A...
Footprinting
by danika-pritchard
Traditional Hacking. The traditional way to hack ...
Application Layer and Socket Programming
by karlyn-bohler
Hakim . Weatherspoon. Assistant Professor, . Dept...
When the Sky is Falling
by myesha-ticknor
Network-Scale Mitigation of High-Volume . Reflect...
Domain Name System
by karlyn-bohler
(or Service). (DNS). . Computer Networks . ...
Availability Problems in the DNSSEC Deployment
by test
Eric Osterweil. Dan Massey. Lixia Zhang. 1. Motiv...
Network Security Protocols and Defensive Mechanisms
by pasty-toler
John Mitchell. CS 155. Spring 2018. Network secur...
Load More...