搜索结果

找到约 874 项符合 network 的查询结果

按分类筛选

显示更多分类

其他书籍 With User Mode Linux you can create virtual Linux machines within a Linux computer and use them to s

With User Mode Linux you can create virtual Linux machines within a Linux computer and use them to safely test and debug applications, network services, and even kernels. You can try out new distributions, experiment with buggy software, and even test security. Now, for the first time, the creator a ...
https://www.eeworm.com/dl/542/238506.html
下载: 148
查看: 1057

系统设计方案 This a journal paper on the optimization of Max Connection problem in a telecommunication optical ne

This a journal paper on the optimization of Max Connection problem in a telecommunication optical network.
https://www.eeworm.com/dl/678/238951.html
下载: 88
查看: 1039

书籍源码 如果有人搞网络协议仿真

如果有人搞网络协议仿真,想必一定听过NS2这个仿真软件,小弟这里真好有《NS and Network Simulation》书后源码
https://www.eeworm.com/dl/532/243062.html
下载: 185
查看: 1040

网络 《Linux程序设计权威指南》源代码

《Linux程序设计权威指南》源代码,包含: awk copyright curses cvs debug framebuffer gnome gnutools gtk i18n kde manual motif network newt qt regexp rpm shell style svgalib system thread xlib ya
https://www.eeworm.com/dl/635/243634.html
下载: 104
查看: 1039

其他书籍 CCISP考试指南与导读 CISSP STUDY NOTES FROM CISSP PREP GUIDE 1 DOMAIN 1 – SECURITY MANAGEMENT PRACTICES 2

CCISP考试指南与导读 CISSP STUDY NOTES FROM CISSP PREP GUIDE 1 DOMAIN 1 – SECURITY MANAGEMENT PRACTICES 2 DOMAIN 2 – ACCESS CONTROL SYSTEMS 7 DOMAIN 3 – TELECOM AND NETWORK SECURITY 13 DOMAIN 4 – CRYPTOGRAPHY 34 DOMAIN 5 – SECURITY ARCHITECTURE AND MODELS 46 DOMAIN 6 – OPERATIONS SECURITY 56 DO ...
https://www.eeworm.com/dl/542/246854.html
下载: 25
查看: 1419

Linux/Unix编程 This a naive implementation of BOOTP/TFTPBOOT, the protocols to use to bootstrap a computer through

This a naive implementation of BOOTP/TFTPBOOT, the protocols to use to bootstrap a computer through a TCP/IP network. The goal was to design a small footprint implementation to allow the code to be integrated into a monitor program stored in a ROM/FLASH, the footprint is about 7 KBytes for the test ...
https://www.eeworm.com/dl/619/248211.html
下载: 70
查看: 1085

其他书籍 You know the rudiments of the SQL query language, yet you feel you aren t taking full advantage of S

You know the rudiments of the SQL query language, yet you feel you aren t taking full advantage of SQL s expressive power. You d like to learn how to do more work with SQL inside the database before pushing data across the network to your applications. You d like to take your SQL skills to the next ...
https://www.eeworm.com/dl/542/248229.html
下载: 195
查看: 1030

通讯编程文档 This article describes a sniffer for Windows. WinSniff is an application for capturing packets on th

This article describes a sniffer for Windows. WinSniff is an application for capturing packets on the network. It displays all the packets that are transmitted on the local network and gives detailed information about each header in the packet. In order to keep it simple, I am not dealing with appli ...
https://www.eeworm.com/dl/646/249490.html
下载: 147
查看: 1065

Linux/Unix编程 The Linux Enterprise Cluster explains how to take a number of inexpensive computers with limited res

The Linux Enterprise Cluster explains how to take a number of inexpensive computers with limited resources, place them on a normal computer network, and install free software so that the computers act together like one powerful server. This makes it possible to build a very inexpensive and reliable ...
https://www.eeworm.com/dl/619/250244.html
下载: 50
查看: 1070

行业发展研究 IEEE Communication Magazine2007

IEEE Communication Magazine2007,11中关于Wireless Mesh Network 的分析(Guest Editorial)
https://www.eeworm.com/dl/692/256012.html
下载: 101
查看: 1060