Academic literature on the topic 'DHCP'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'DHCP.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "DHCP"
Pradana, Dio Aditya, and Ade Surya Budiman. "The DHCP Snooping and DHCP Alert Method in Securing DHCP Server from DHCP Rogue Attack." IJID (International Journal on Informatics for Development) 10, no. 1 (2021): 38–46. http://dx.doi.org/10.14421/ijid.2021.2287.
Full textKadafi, Muamar, and Khusnawi Khusnawi. "Analisis Rogue DHCP Packets Menggunakan Wireshark Network Protocol Analyzer." Creative Information Technology Journal 2, no. 2 (2015): 165. http://dx.doi.org/10.24076/citec.2015v2i2.46.
Full textAriyadi, Tamsir. "Mitigasi Keamanan Dynamic Host Control Protocl (DHCP) Untuk Mengurangi Serangan Pada Local Area Network (LAN)." INOVTEK Polbeng - Seri Informatika 3, no. 2 (2018): 147. http://dx.doi.org/10.35314/isi.v3i2.455.
Full textAli, Salim M., and Ammar A. Shareef. "DESIGNING A SECURE NETWORK SOLUTION AGAINST DHCP ATTACKS." Iraqi Journal of Information and Communications Technology 1, no. 1 (2021): 45–57. http://dx.doi.org/10.31987/ijict.1.1.175.
Full textAhmad Zaki Hamidi, Eki, Mufid Ridlo Effendi, and Nanang Ismail. "The Implementation of DHCP Relay Using Pox Controller on Openflow Protocol." International Journal of Engineering & Technology 7, no. 2.29 (2018): 821. http://dx.doi.org/10.14419/ijet.v7i2.29.14264.
Full textSarip, Nfn, and Arief Setyanto. "Packet Filtering Based On Differentiated Services Code Point For DHCP Starvation Attacks Prevention." Journal Pekommas 4, no. 2 (2019): 137. http://dx.doi.org/10.30818/jpkm.2019.2040204.
Full textJäger, G., and W. Zhang. "An Effective Algorithm for and Phase Transitions of the Directed Hamiltonian Cycle Problem." Journal of Artificial Intelligence Research 39 (November 30, 2010): 663–87. http://dx.doi.org/10.1613/jair.3109.
Full textTrombeta, Lucas, and Nunzio Torrisi. "DHCP Hierarchical Failover (DHCP-HF) Servers over a VPN Interconnected Campus." Big Data and Cognitive Computing 3, no. 1 (2019): 18. http://dx.doi.org/10.3390/bdcc3010018.
Full textWalker, H. C., K. A. McEwen, P. Boulet, E. Colineau, and F. Wastin. "Magnetic susceptibility of DHCP." Physica B: Condensed Matter 359-361 (April 2005): 1156–58. http://dx.doi.org/10.1016/j.physb.2005.01.313.
Full textPrem, M., and G. Krexner. "Martensitic phase transitions HCP – DHCP and DHCP – FCC in Co 0.85 at% Fe." Physica B: Condensed Matter 276-278 (March 2000): 927–28. http://dx.doi.org/10.1016/s0921-4526(99)01596-3.
Full textDissertations / Theses on the topic "DHCP"
Molerón, Bermudez Daniel, and Capilla Sergio Sánchez-Camacho. "Distributed DHCP for WMNs using IPv6." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-996.
Full textRoy, Christian 1977. "An alternative approach to identifying stolen network clients using DHCP /." Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=98783.
Full textПрокоф’єв, П. С. "Графiчний iнтерфейс налаштування протоколу DHCP в мережах з підтримкою IPv6". Master's thesis, Сумський державний університет, 2020. https://essuir.sumdu.edu.ua/handle/123456789/79556.
Full textTrombeta, Lucas. "Solução de redundância múltipla de servidores DHCP utilizando redes definidas por software." reponame:Repositório Institucional da UFABC, 2016.
Find full textМороз, Е. В. "Інформаційно-комунікаційна технологія налаштування корпоративних мультисервісних мереж". Master's thesis, Сумський державний університет, 2021. https://essuir.sumdu.edu.ua/handle/123456789/86865.
Full textDemerjian, Jacques. "Services d'autorisation et Intégration au protocole d'attribution dynamique des adresses." Paris, ENST, 2004. http://www.theses.fr/2004ENST0036.
Full textHolubovský, Petr. "Management výkonnosti a optimalizace VoIP technologie." Master's thesis, Česká zemědělská univerzita v Praze, 2016. http://www.nusl.cz/ntk/nusl-259801.
Full textPecho, Ladislav. "Vytvoření modulu jádra a konfigurace síťového serveru pro operační systém Linux." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2010. http://www.nusl.cz/ntk/nusl-218670.
Full textFilippi, Geoffrey George. "A High-Availability Architecture for the Dynamic Domain Name System." Thesis, Virginia Tech, 2008. http://hdl.handle.net/10919/32869.
Full textMeyer, Ralph. "Analyse dynamischer Hostkonfiguration auf Basis von IPv6." [S.l. : s.n.], 2001. http://www.bsz-bw.de/cgi-bin/xvms.cgi?SWB10047783.
Full textBooks on the topic "DHCP"
Thompson, Robert Bruce. Dynamic Host Configuration Protocol (DHCP). O'Reilly & Associates, Inc., 1998.
Find full textfer, Carsten Scha. Das DHCP-Handbuch: Ein Leitfaden zur Planung, Einfu hrung und Administration von DHCP. Addison-Wesley, 2002.
Find full textDroms, Ralph. The DHCP handbook: Understanding, deploying, and managing automated configuration services. Macmillan Technical Pub., 1999.
Find full text1964-, Shiblī ʻĀṣim Shahnavāz, ред. Dhūp dhūp safar: Naẓmaun̲ kā majmūʻah. Is̲bāt va Nafī Pablīkeshanz, 2002.
Find full textNiẓāmī, K̲h̲ālid. Dhūp chāʼon̲. Naishnal Insṭīṭiyūṭ āf Kashmīr Sṭaḍīz (NIKS), 2013.
Find full textBook chapters on the topic "DHCP"
Vazquez, Antonio. "DHCP." In Learn CentOS Linux Network Services. Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2379-6_5.
Full textBoth, David. "DHCP." In Using and Administering Linux: Volume 3. Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5485-1_3.
Full textSrivastava, Amit Kumar, and Arun Kumar Misra. "Plugging DHCP Security Holes Using S-DHCP." In Advances in Computing and Information Technology. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31513-8_23.
Full textKania, Stefan. "Ausfallsicherer DHCP-Server." In Samba 4. Carl Hanser Verlag GmbH & Co. KG, 2019. http://dx.doi.org/10.3139/9783446457355.008.
Full textMajumdar, Saugat, Dhananjay Kulkarni, and Chinya V. Ravishankar. "DHCP Origin Traceback." In Distributed Computing and Networking. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-17679-1_35.
Full textHorley, Edward. "IPv6 and DHCP." In Practical IPv6 for Windows Administrators. Apress, 2013. http://dx.doi.org/10.1007/978-1-4302-6371-5_9.
Full textKania, Stefan. "Ausfallsicherer DHCP-Server." In Samba 4, 2nd ed. Carl Hanser Verlag GmbH & Co. KG, 2021. http://dx.doi.org/10.3139/9783446469785.008.
Full textBuchanan, Bill. "SNMP, Wins and DHCP." In Handbook of Data Communications and Networks. Springer US, 1999. http://dx.doi.org/10.1007/978-1-4757-0905-6_37.
Full textDemerjian, Jacques, and Ahmed Serhrouchni. "DHCP Authentication Using Certificates." In Security and Protection in Information Processing Systems. Springer US, 2004. http://dx.doi.org/10.1007/1-4020-8143-x_30.
Full textBuchanan, William J. "SNMP, WINS and DHCP." In Mastering Microsoft Windows, Novell NetWare and UNIX. Macmillan Education UK, 1999. http://dx.doi.org/10.1007/978-1-349-14968-1_6.
Full textConference papers on the topic "DHCP"
Akashi, Shigeo, and Yao Tong. "Classification of DHCP Spoofing and Effectiveness of DHCP Snooping." In International Conference on Advances in Computer Technology, Information Science and Communications. SCITEPRESS - Science and Technology Publications, 2019. http://dx.doi.org/10.5220/0008099002330238.
Full textGiordano, Silvia, Davide Lenzarini, Alessandro Puiatti, and Salvatore Vanini. "Enhanced DHCP client." In the second workshop. ACM Press, 2007. http://dx.doi.org/10.1145/1287791.1287809.
Full textBrik, Vladimir, Jesse Stroik, and Suman Banerjee. "Debugging DHCP performance." In the 4th ACM SIGCOMM conference. ACM Press, 2004. http://dx.doi.org/10.1145/1028788.1028822.
Full textTripathi, Nikhil, and Neminath Hubballi. "Exploiting DHCP server-side IP address conflict detection: A DHCP starvation attack." In 2015 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS). IEEE, 2015. http://dx.doi.org/10.1109/ants.2015.7413661.
Full textTong, Yao, and Shigeo Akashi. "A Feasible Method for Realizing Leakage of DHCP Transactions under the Implementation of DHCP Snooping." In DSIT 2019: 2019 2nd International Conference on Data Science and Information Technology. ACM, 2019. http://dx.doi.org/10.1145/3352411.3356103.
Full textDinu, Dumitru Daniel, and Mihai Togan. "DHCP server authentication using digital certificates." In 2014 10th International Conference on Communications (COMM). IEEE, 2014. http://dx.doi.org/10.1109/iccomm.2014.6866756.
Full textKhadilkar, Manas, Nick Feamster, Matt Sanders, and Russ Clark. "Usage-based dhcp lease time optimization." In the 7th ACM SIGCOMM conference. ACM Press, 2007. http://dx.doi.org/10.1145/1298306.1298315.
Full textPapapanagiotou, Ioannis, Erich M. Nahum, and Vasileios Pappas. "Configuring DHCP leases in the smartphone era." In the 2012 ACM conference. ACM Press, 2012. http://dx.doi.org/10.1145/2398776.2398814.
Full textLin, Changsheng, Tian Su, and Zhiqian Wang. "Summary of high-availability DHCP service solutions." In Multimedia Technology (IC-BNMT 2011). IEEE, 2011. http://dx.doi.org/10.1109/icbnmt.2011.6155886.
Full textKorkmaz, Mehmet Halis, and Cemal Kose. "Port-based DHCP server design with authentication." In 2017 25th Signal Processing and Communications Applications Conference (SIU). IEEE, 2017. http://dx.doi.org/10.1109/siu.2017.7960334.
Full textReports on the topic "DHCP"
T'Joens, Y., C. Hublet, and P. De. DHCP reconfigure extension. RFC Editor, 2001. http://dx.doi.org/10.17487/rfc3203.
Full textLemon, T., and Q. Wu. Relay-Supplied DHCP Options. RFC Editor, 2011. http://dx.doi.org/10.17487/rfc6422.
Full textLear, E., and P. Eggert. Timezone Options for DHCP. RFC Editor, 2007. http://dx.doi.org/10.17487/rfc4833.
Full textDroms, R. Authentication for DHCP Messages. Edited by W. Arbaugh. RFC Editor, 2001. http://dx.doi.org/10.17487/rfc3118.
Full textJiang, S., S. Krishnan, and T. Mrugalski. Privacy Considerations for DHCP. RFC Editor, 2016. http://dx.doi.org/10.17487/rfc7819.
Full textJohnson, R., J. Kumarasamy, K. Kinnear, and M. Stapp. DHCP Server Identifier Override Suboption. RFC Editor, 2008. http://dx.doi.org/10.17487/rfc5107.
Full textPatrick, M. DHCP Relay Agent Information Option. RFC Editor, 2001. http://dx.doi.org/10.17487/rfc3046.
Full textDroms, R. Interoperation Between DHCP and BOOTP. RFC Editor, 1993. http://dx.doi.org/10.17487/rfc1534.
Full textHuitema, C., T. Mrugalski, and S. Krishnan. Anonymity Profiles for DHCP Clients. RFC Editor, 2016. http://dx.doi.org/10.17487/rfc7844.
Full text