Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Content Type
      Content Type
      Clear All
      Content Type
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Item Type
    • Is Full-Text Available
    • Subject
    • Publisher
    • Source
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
59 result(s) for "HTTP (Computer network protocol)"
Sort by:
Nginx HTTP Server
Nginx is a lightweight HTTP server designed for high-traffic websites, with network scalability as the primary objective. With the advent of high speed Internet access, short loading times and faster transfer rates have become a necessity. This book is a detailed guide to setting up Nginx in different ways that correspond to actual production.
HTTP/2 in action
\"HTTP--Hypertext transfer protocol--is the standard for exchanging messages between websites and browsers. And after 20 years, it's gotten a much-needed upgrade. With support for streams, server push, header compression, and prioritization, HTTP/2 delivers vast improvements in speed, security, and efficiency. 'HTTP/2 in action' teaches you everything you need to know to use HTTP/2 effectively. You'll learn how to optimize web performance with new features like frames, multiplexing, and push. You'll also explore real-world examples on advanced topics like flow control and dependencies. With ready-to-implement tips and best practices, this practical guide is sure to get you, and your websites, up to speed\"--Provided by publisher.
A Lightweight Double-Stage Scheme to Identify Malicious DNS over HTTPS Traffic Using a Hybrid Learning Approach
The Domain Name System (DNS) protocol essentially translates domain names to IP addresses, enabling browsers to load and utilize Internet resources. Despite its major role, DNS is vulnerable to various security loopholes that attackers have continually abused. Therefore, delivering secure DNS traffic has become challenging since attackers use advanced and fast malicious information-stealing approaches. To overcome DNS vulnerabilities, the DNS over HTTPS (DoH) protocol was introduced to improve the security of the DNS protocol by encrypting the DNS traffic and communicating it over a covert network channel. This paper proposes a lightweight, double-stage scheme to identify malicious DoH traffic using a hybrid learning approach. The system comprises two layers. At the first layer, the traffic is examined using random fine trees (RF) and identified as DoH traffic or non-DoH traffic. At the second layer, the DoH traffic is further investigated using Adaboost trees (ADT) and identified as benign DoH or malicious DoH. Specifically, the proposed system is lightweight since it works with the least number of features (using only six out of thirty-three features) selected using principal component analysis (PCA) and minimizes the number of samples produced using a random under-sampling (RUS) approach. The experiential evaluation reported a high-performance system with a predictive accuracy of 99.4% and 100% and a predictive overhead of 0.83 µs and 2.27 µs for layer one and layer two, respectively. Hence, the reported results are superior and surpass existing models, given that our proposed model uses only 18% of the feature set and 17% of the sample set, distributed in balanced classes.
Nginx HTTP Server - Fourth Edition
Dive into the world of Nginx HTTP Server and discover how it can revolutionize the way you manage high-traffic websites. This comprehensive guide walks you through setting up Nginx for various production scenarios, including serving static content, acting as a reverse proxy, and integrating with applications such as PHP and Python effortlessly.What this Book will help me doSet up and configure Nginx to handle traffic efficiently and securely.Gain a deep understanding of Nginx modules and how to extend its functionality.Integrate Nginx with other servers and frameworks, such as Apache or PHP and Python applications.Optimize your website's performance using Nginx features like caching and load balancing.Troubleshoot and resolve configuration issues to ensure high availability.Author(s)None Fjordvald and None Nedelcu are seasoned web server administrators and authors with a deep knowledge of web technologies and architectures. Their approach emphasizes practical, clear instructions to empower administrators and developers.Who is it for?If you're a web administrator looking to optimize your server infrastructure or a developer seeking to improve website performance, this book is for you. It assumes some familiarity with web server concepts, but its detailed examples are helpful for those new to Nginx as well. Learn to make Nginx your powerhouse server solution across a variety of use cases.
Physical beauty, the appetizers. Holy accidents
Andy Gomberoff (author of the best-seller \"Physics and Eggplants\") explains in 100 seconds scientific phenomena, theories and stories covering a wide range of topics to millennials in a fun way: how a Nobel prize established in a theorem how democracy is related to mathematics, how Marconi created the radio, etc. He pays tributes to leading scientists or demolishes popular myths with scientific facts, easy to understand and with examples from daily life. This is Physical Beauty, The Appetizer. A starter for your brain.
The internet of things. 6, Characters, strings and strings
A description of characters, strings, and String data types as it relates to sending data to the cloud.
Comparative Analysis of Power Consumption between MQTT and HTTP Protocols in an IoT Platform Designed and Implemented for Remote Real-Time Monitoring of Long-Term Cold Chain Transport Operations
IoT platforms for the transportation industry are portable with limited battery life and need real-time and long-term monitoring operations. Since MQTT and HTTP are widely used as the main communication protocols in the IoT, it is imperative to analyze their power consumption to provide quantitative results that help maximize battery life in IoT transportation systems. Although is well known that MQTT consumes less power than HTTP, a comparative analysis of their power consumption with long-time tests and different conditions has not yet been conducted. In this sense, a design and validation of an electronic cost-efficient platform system for remote real-time monitoring is proposed using a NodeMCU module, in which experimentation is carried out for HTTP and MQTT with different QoS levels to make a comparison and demonstrate the differences in power consumption. Furthermore, we characterize the behavior of the batteries in the systems and compare the theoretical analysis with real long-time test results. The experimentation using the MQTT protocol with QoS 0 and 1 was successful, resulting in power savings of 6.03% and 8.33%, respectively, compared with HTTP, demonstrating many more hours in the duration of the batteries, which could be very useful in technological solutions for the transport industry.
Python for Cybersecurity
Discover an up-to-date and authoritative exploration of Python cybersecurity strategies Python For Cybersecurity: Using Python for Cyber Offense and Defense delivers an intuitive and hands-on explanation of using Python for cybersecurity. It relies on the MITRE ATT&CK framework to structure its exploration of cyberattack techniques, attack defenses, and the key cybersecurity challenges facing network administrators and other stakeholders today. Offering downloadable sample code, the book is written to help you discover how to use Python in a wide variety of cybersecurity situations, including: * Reconnaissance, resource development, initial access, and execution * Persistence, privilege escalation, defense evasion, and credential access * Discovery, lateral movement, collection, and command and control * Exfiltration and impact Each chapter includes discussions of several techniques and sub-techniques that could be used to achieve an attacker's objectives in any of these use cases. The ideal resource for anyone with a professional or personal interest in cybersecurity, Python For Cybersecurity offers in-depth information about a wide variety of attacks and effective, Python-based defenses against them.