« Home « Chủ đề networking

Chủ đề : networking


Có 20+ tài liệu thuộc chủ đề "networking"

ASP.NET Database Programming Weekend Crash Course

tailieu.vn

ASP.NET. Introducing ASP.NET. Setting Up .NET. Developing ASP.NET Pages. Using ASP.NET Controls. Maintaining State in ASP.NET. ASP.NET Caching. Introducing ADO.NET. Navigating The ADO.NET Object Model. Data Shaping with ADO.NET. Handling ADO.NET Errors. Migrating From ASP to ASP.NET. Migration From ADO to ADO.Net. ASP.NET Database Programming. ASP.NET Database Programming Weekend Crash Course™. Session 1–Introducing ASP.NET ...5. Session 7–Developing ASP.NET Pages ...61....

Configuring Juniper Networks NetScreen & SSG Firewalls

tailieu.vn

Figure 1.1 The Seven-Layer OSI Model. The application layer contains application data.This is the layer at which applications com- municate to one another.The reason for all of the other layers is essentially to transport the messages contained at the application layer. network.The way in which the transmission of data at this level is handled is based upon the protocol used....

Java network programming, 2nd edition

tailieu.vn

The most obvious change to the first edition is that all of the examples have been rewritten with the Java 1.1 I/O API. Organization of the Book. Parsing and rendering HTML is one of the most difficult. You should be thoroughly familiar with the syntax of the language. You should also be an accomplished user of the Internet. Indeed, in...

Cisco Data Center Infrastructure 2.5 Design Guide

tailieu.vn

C H A P T E R 1 Data Center Architecture Overview 1-1. Data Center Architecture Overview 1-1. Data Center Design Models 1-3. C H A P T E R 2 Data Center Multi-Tier Model Design 2-1. Data Center Core Layer 2-3. Traffic Flow in the Data Center Core 2-4. Data Center Aggregation Layer 2-6. Traffic Flow in the Data...

Linux Virtual Server Administration for red hat enterprise linux 5.1

tailieu.vn

Configuring Services on the LVS Routers ...17. Limiting Access To the Piranha Configuration Tool ...20. Configuring Services on the Real Servers ...21. Routing on the Real Servers ...25. Enabling NAT Routing on the LVS Routers ...25. Configuring the LVS Routers with Piranha Configuration Tool ...37. Chapter 4, Configuring the LVS Routers with Piranha Configuration Tool. For more information about Red...

Red Hat Cluster for red hat enterprise Linux 5.1

tailieu.vn

Adding a Cluster Service to the Cluster ...45. Starting the Cluster Configuration Tool ...54. Adding a Cluster Service to the Cluster ...74. Starting the Cluster Software ...78. Starting and Stopping the Cluster Software ...79. Modifying the Cluster Configuration ...82. Disabling the Cluster Software ...84. The type required depends on the purpose of the cluster.. relationship among the cluster components. The...

Configuration and administration

tailieu.vn

"<>. >B #C >). >>. >8 # >. >". >7 5 - >B. >: =0 2 ><. 2 >". 2 <<. ">. > gt;. "<. S )")<. S )")>. 2C )")>. >B"<. S:8>7>. 33%/ 2>>O C@'2". I 2$ 9>2# >, 2. K - 2 >>. 0 5 S)")<. 59 , )<)<. 0 <! )<. ,,)+<!@)<. >>. B>>7!. >". -J @...

Red Hat Enterprise Linux 5

tailieu.vn

'0 ) &))&. <'&0 :&. +)&$ &. A &) +)&. 0 :&0 /&. &&. &) &). 2 -,2.$ &. &) &. !'(()&&(*+,&-+(.$. &) F $ 0 &. &&. '&$ &. &) -&. '&0 &. '&) (&$ &. &' '&. &) &. '&0 &&. &)&. &) &0. 0 &0 &. &$ &. &))&. B &&. ,2 &0 ) &0. &))&. &)...

Red Hat Global File System

tailieu.vn

Global File System. Red Hat Global File System. Global File System: Red Hat Global File System. Making a File System ...15. Mounting a File System ...18. Unmounting a File System ...20. Growing a File System ...27. Adding Journals to a File System ...29. Suspending Activity on a File System ...37. Repairing a File System ...39. Welcome to the Global File...

Bulletproof Wireless Security

tailieu.vn

Being visual creatures, we can accept the fact that in a wired network, our voice (or data) travels “on” the wire but seeing a wireless network is almost magical—your voice (or data) disappears into your handset and reappears out of the handset of another person at the other side of the globe.. or “Crossing the Andes” or “In the middle...

Check Point™ NG VPN-1/FireWall-1 Advanced Configuration and Troubleshooting

tailieu.vn

Other changes in the software, including the new names for the old GUI clients, are covered in Chapter 2.The SMART Clients provide new names and new features for the management of the FireWall-1 NG product. installing it on the Solaris platform is covered in Chapter 13.The User Authority allows you to combine Check Point user. Figure 1.1 Web Server Object....

Cisco Internetwork Troubleshooting

tailieu.vn

Resolving Problems at the Physical and Data Link Layers 3-1. Isolating the Problem at the Physical and Data Link Layers 3-3. Isolating Problems at the Physical and Data Link Layers 3-35. Example: Isolating Problems at the Physical and Data Link Layers 3-36. Correcting the Problem at the Physical and Data Link Layers 3-39. Resolving Problems at the Network Layer 4-1....

CCNP Quick Reference

tailieu.vn

Quick Reference. Core layer—The backbone that provides a high-speed path between distribution elements.. The newer Cisco model—the Enterprise Composite Model—is significantly more complex and attempts to address the shortcomings of the Hierarchical Design Model by expanding the older version and making specific recommendations about how and where certain network functions should be implemented. Enterprise Edge—The portion of the enterprise network...

SSL REMOTE ACCESS VPNs

tailieu.vn

Chapter 2 SSL VPN Technology 17. SSL VPN 49. SSL VPN Tunnel Client 58 Summary 59. Chapter 3 SSL VPN Design Considerations 63. Chapter 4 Cisco SSL VPN Family of Products 85. SSL VPN Licenses 95. Pre-SSL VPN Configuration Guide 97. Enabling Clientless SSL VPN on an Interface 116. Keeping the SSL VPN Client Installed 162 Configuring DTLS 163. Troubleshooting...

Designing and Developing Scalable IP Networks

tailieu.vn

10.2 Example of the limitations of TTL-based multicast scoping. Today’s Service Provider (SP) marketplace is a highly competitive environment in which it is important to make the most of the assets you have. Different media have significantly differing levels of overhead just in the transportation of the packets. IPv6 is the latest version of the Internet Protocol. On the other...

Knowledge Networks: The Social Software Perspective

tailieu.vn

Knowledge sharing and knowledge transfer have a strong effect on the success of the born-globals.. The following figure shows the logic structure of the framework.. Logic structure of the proposed framework. In the following sections, a detailed descrip- tion of the three levels of the framework is provided.. The General Facilities of the proposed framework can be described along three...

Introducing Ubuntu: Desktop Linux

tailieu.vn

That’s the nickel-tour synopsis of Ubuntu, the free operating system that can run on just about any PC. Linus himself still serves as project manager for the Linux kernel—the very heart of the operating system—even as businesses ranging from IBM to neighborhood churches use the Linux operating system every day.. It is possible that someone could ‘‘take over’’ the block...

Networking with Microsoft Windows Vista

tailieu.vn

Using the Network Window. Laying the Network Cable. Turning Off the Network Icon. Accessing the Network and Sharing Center. Opening the Network Connections Window. Sharing Resources with the Network. Adding an Xbox 360 to the Network. Backing Up to the Network. Publishing a Windows Vista Calendar on the Network. Running a Screensaver Slideshow from the Network. Running a Slideshow from...

Virtualization for Security

tailieu.vn

John is a graduate of the University of Utah.. He is the creator of the CWSandbox, an automated malware analysis tool. Virtualization Explosion of the 1990s and Early 2000s. Using the system to Demonstrate the Meaning of the Evidence. Easier to Get in the Mind-set of the suspect. Two are considered part of the evolutionary lineage of virtualization as we...

Ubuntu Unleashed

tailieu.vn

Wubi—The Easy Installer for Windows ...22. KDE—The Other Environment...77. Granting Root Privileges on Occasion—The sudo Command ...227. To Bernice and John—the best supporters a man could ever wish for.. My son John now has his own keyboard and mouse—the computer will come in a few years!. FIGURE 1.3 The standard Ubuntu desktop, complete with the helpful Install icon ready for...