搜索结果

找到约 884 项符合 NETWORK-centric 的查询结果

Internet/网络编程 P2P 之 UDP穿透NAT的原理与实现(附源代码) 原创:shootingstars 参考:http://midcom-p2p.sourceforge.net/draft-ford-midcom

P2P 之 UDP穿透NAT的原理与实现(附源代码) 原创:shootingstars 参考:http://midcom-p2p.sourceforge.net/draft-ford-midcom-p2p-01.txt baidu 论坛上经常有对P2P原理的讨论,但是讨论归讨论,很少有实质的东西产生(源代码)。呵呵,在这里我就用自己实现的一个源代码来说明UDP穿越NAT的原理。 首先先介绍一些基本概 ...
https://www.eeworm.com/dl/620/231636.html
下载: 42
查看: 1170

其他 The Microsoft&reg Active Directory&#8482 Service Interfaces (ADSI) Software Development Kit (SDK) is

The Microsoft&reg Active Directory&#8482 Service Interfaces (ADSI) Software Development Kit (SDK) is a client-side product, based on the Component Object Model (COM), that defines a directory service model and a set of COM interfaces that enables Microsoft Windows NT&reg /Windows&reg 2000 and Window ...
https://www.eeworm.com/dl/534/232531.html
下载: 139
查看: 1051

VC书籍 In addition to all the people who contributed to the first edition, we would like to thank the follo

In addition to all the people who contributed to the first edition, we would like to thank the following individuals for their generous help in writing this edition. Very special thanks go to Jory Prather for verifying the code samples as well as fixing them for consistency. Thanks to Dave Thaler, B ...
https://www.eeworm.com/dl/686/234984.html
下载: 50
查看: 1089

其他 This code was used to produce simulation results described in: Using Directional Antennas to Pre

This code was used to produce simulation results described in: Using Directional Antennas to Prevent Wormhole Attacks Lingxuan Hu and David Evans. Network and Distributed System Security Symposium, San Diego, 5-6 February 2004.
https://www.eeworm.com/dl/534/235440.html
下载: 75
查看: 1057

通讯编程文档 The present document specifies the CAMEL Application Part (CAP) supporting the fourth phase of the n

The present document specifies the CAMEL Application Part (CAP) supporting the fourth phase of the network feature Customized Applications for Mobile network Enhanced Logic. CAP is based on a sub-set of the ETSI Core INAP CS-2 as specified by ETSI EN 301 140 1 [26]. Descriptions and definitions prov ...
https://www.eeworm.com/dl/646/237978.html
下载: 94
查看: 1084

其他书籍 With User Mode Linux you can create virtual Linux machines within a Linux computer and use them to s

With User Mode Linux you can create virtual Linux machines within a Linux computer and use them to safely test and debug applications, network services, and even kernels. You can try out new distributions, experiment with buggy software, and even test security. Now, for the first time, the creator a ...
https://www.eeworm.com/dl/542/238506.html
下载: 148
查看: 1057

系统设计方案 This a journal paper on the optimization of Max Connection problem in a telecommunication optical ne

This a journal paper on the optimization of Max Connection problem in a telecommunication optical network.
https://www.eeworm.com/dl/678/238951.html
下载: 88
查看: 1039

书籍源码 如果有人搞网络协议仿真

如果有人搞网络协议仿真,想必一定听过NS2这个仿真软件,小弟这里真好有《NS and Network Simulation》书后源码
https://www.eeworm.com/dl/532/243062.html
下载: 185
查看: 1040

网络 《Linux程序设计权威指南》源代码

《Linux程序设计权威指南》源代码,包含: awk copyright curses cvs debug framebuffer gnome gnutools gtk i18n kde manual motif network newt qt regexp rpm shell style svgalib system thread xlib ya
https://www.eeworm.com/dl/635/243634.html
下载: 104
查看: 1039

其他书籍 CCISP考试指南与导读 CISSP STUDY NOTES FROM CISSP PREP GUIDE 1 DOMAIN 1 – SECURITY MANAGEMENT PRACTICES 2

CCISP考试指南与导读 CISSP STUDY NOTES FROM CISSP PREP GUIDE 1 DOMAIN 1 – SECURITY MANAGEMENT PRACTICES 2 DOMAIN 2 – ACCESS CONTROL SYSTEMS 7 DOMAIN 3 – TELECOM AND NETWORK SECURITY 13 DOMAIN 4 – CRYPTOGRAPHY 34 DOMAIN 5 – SECURITY ARCHITECTURE AND MODELS 46 DOMAIN 6 – OPERATIONS SECURITY 56 DO ...
https://www.eeworm.com/dl/542/246854.html
下载: 25
查看: 1419