搜索结果
找到约 884 项符合
NETWORK-centric 的查询结果
Internet/网络编程 P2P 之 UDP穿透NAT的原理与实现(附源代码) 原创:shootingstars 参考:http://midcom-p2p.sourceforge.net/draft-ford-midcom
P2P 之 UDP穿透NAT的原理与实现(附源代码)
原创:shootingstars
参考:http://midcom-p2p.sourceforge.net/draft-ford-midcom-p2p-01.txt
baidu
论坛上经常有对P2P原理的讨论,但是讨论归讨论,很少有实质的东西产生(源代码)。呵呵,在这里我就用自己实现的一个源代码来说明UDP穿越NAT的原理。
首先先介绍一些基本概 ...
其他 The Microsoft® Active Directory™ Service Interfaces (ADSI) Software Development Kit (SDK) is
The Microsoft&reg Active Directory&#8482 Service Interfaces (ADSI) Software Development Kit (SDK) is a client-side product, based on the Component Object Model (COM), that defines a directory service model and a set of COM interfaces that enables Microsoft Windows NT&reg /Windows&reg 2000 and Window ...
VC书籍 In addition to all the people who contributed to the first edition, we would like to thank the follo
In addition to all the people who contributed to the first edition, we would like to thank the following individuals for their generous help in writing this edition. Very special thanks go to Jory Prather for verifying the code samples as well as fixing them for consistency. Thanks to Dave Thaler, B ...
其他 This code was used to produce simulation results described in: Using Directional Antennas to Pre
This code was used to produce simulation results described in:
Using Directional Antennas to Prevent Wormhole Attacks
Lingxuan Hu and David Evans. Network and Distributed System Security
Symposium, San Diego, 5-6 February 2004.
通讯编程文档 The present document specifies the CAMEL Application Part (CAP) supporting the fourth phase of the n
The present document specifies the CAMEL Application Part (CAP) supporting the fourth phase of the network feature Customized Applications for Mobile network Enhanced Logic. CAP is based on a sub-set of the ETSI Core INAP CS-2 as specified by ETSI EN 301 140 1 [26]. Descriptions and definitions prov ...
其他书籍 With User Mode Linux you can create virtual Linux machines within a Linux computer and use them to s
With User Mode Linux you can create virtual Linux machines within a Linux computer and use them to safely test and debug applications, network services, and even kernels. You can try out new distributions, experiment with buggy software, and even test security. Now, for the first time, the creator a ...
系统设计方案 This a journal paper on the optimization of Max Connection problem in a telecommunication optical ne
This a journal paper on the optimization of Max Connection problem in a telecommunication optical network.
书籍源码 如果有人搞网络协议仿真
如果有人搞网络协议仿真,想必一定听过NS2这个仿真软件,小弟这里真好有《NS and Network Simulation》书后源码
网络 《Linux程序设计权威指南》源代码
《Linux程序设计权威指南》源代码,包含:
awk
copyright
curses
cvs
debug
framebuffer
gnome
gnutools
gtk
i18n
kde
manual
motif
network
newt
qt
regexp
rpm
shell
style
svgalib
system
thread
xlib
ya
其他书籍 CCISP考试指南与导读 CISSP STUDY NOTES FROM CISSP PREP GUIDE 1 DOMAIN 1 – SECURITY MANAGEMENT PRACTICES 2
CCISP考试指南与导读
CISSP STUDY NOTES FROM CISSP PREP GUIDE 1
DOMAIN 1 – SECURITY MANAGEMENT PRACTICES 2
DOMAIN 2 – ACCESS CONTROL SYSTEMS 7
DOMAIN 3 – TELECOM AND NETWORK SECURITY 13
DOMAIN 4 – CRYPTOGRAPHY 34
DOMAIN 5 – SECURITY ARCHITECTURE AND MODELS 46
DOMAIN 6 – OPERATIONS SECURITY 56
DO ...