虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

NetWork

  • With User Mode Linux you can create virtual Linux machines within a Linux computer and use them to s

    With User Mode Linux you can create virtual Linux machines within a Linux computer and use them to safely test and debug applications, NetWork services, and even kernels. You can try out new distributions, experiment with buggy software, and even test security. Now, for the first time, the creator and maintainer of User Mode Linux shows how to put it to work hands-on. Jeff Dike covers everything from getting started through running enterprise-class User Mode Linux servers. You ll find authoritative advice on bootup, compilation, administration, specialized configurations, and much more.

    标签: Linux computer machines virtual

    上传时间: 2013-12-19

    上传用户:xinzhch

  • This a journal paper on the optimization of Max Connection problem in a telecommunication optical ne

    This a journal paper on the optimization of Max Connection problem in a telecommunication optical NetWork.

    标签: telecommunication optimization Connection journal

    上传时间: 2015-12-27

    上传用户:xaijhqx

  • 如果有人搞网络协议仿真

    如果有人搞网络协议仿真,想必一定听过NS2这个仿真软件,小弟这里真好有《NS and NetWork Simulation》书后源码

    标签: 网络协议 仿真

    上传时间: 2016-01-06

    上传用户:Altman

  • 《Linux程序设计权威指南》源代码

    《Linux程序设计权威指南》源代码,包含: awk copyright curses cvs debug framebuffer gnome gnutools gtk i18n kde manual motif NetWork newt qt regexp rpm shell style svgalib system thread xlib ya

    标签: Linux 程序设计 源代码

    上传时间: 2016-01-07

    上传用户:tyler

  • CCISP考试指南与导读 CISSP STUDY NOTES FROM CISSP PREP GUIDE 1 DOMAIN 1 – SECURITY MANAGEMENT PRACTICES 2

    CCISP考试指南与导读 CISSP STUDY NOTES FROM CISSP PREP GUIDE 1 DOMAIN 1 – SECURITY MANAGEMENT PRACTICES 2 DOMAIN 2 – ACCESS CONTROL SYSTEMS 7 DOMAIN 3 – TELECOM AND NetWork SECURITY 13 DOMAIN 4 – CRYPTOGRAPHY 34 DOMAIN 5 – SECURITY ARCHITECTURE AND MODELS 46 DOMAIN 6 – OPERATIONS SECURITY 56 DOMAIN 7 – APPLICATIONS AND SYSTEM DEVELOPMENT 63 DOMAIN 8 – BUSINESS CONTINUITY AND DISASTER RECOVERY PLANNING 70 DOMAIN 9 – LAW, INVESTIGATION AND ETHICS 78 DOMAIN 10 – PHYSICAL SECURITY 87

    标签: CISSP MANAGEMENT PRACTICES SECURITY

    上传时间: 2014-02-13

    上传用户:sy_jiadeyi

  • This a naive implementation of BOOTP/TFTPBOOT, the protocols to use to bootstrap a computer through

    This a naive implementation of BOOTP/TFTPBOOT, the protocols to use to bootstrap a computer through a TCP/IP NetWork. The goal was to design a small footprint implementation to allow the code to be integrated into a monitor program stored in a ROM/FLASH, the footprint is about 7 KBytes for the test program. This code has not been yet tested in many environment. It should be seen at your starting point to integrate the NetWork boot function to your board.

    标签: implementation bootstrap protocols TFTPBOOT

    上传时间: 2013-12-18

    上传用户:极客

  • You know the rudiments of the SQL query language, yet you feel you aren t taking full advantage of S

    You know the rudiments of the SQL query language, yet you feel you aren t taking full advantage of SQL s expressive power. You d like to learn how to do more work with SQL inside the database before pushing data across the NetWork to your applications. You d like to take your SQL skills to the next level.

    标签: advantage the rudiments you

    上传时间: 2014-01-18

    上传用户:xz85592677

  • This article describes a sniffer for Windows. WinSniff is an application for capturing packets on th

    This article describes a sniffer for Windows. WinSniff is an application for capturing packets on the NetWork. It displays all the packets that are transmitted on the local NetWork and gives detailed information about each header in the packet. In order to keep it simple, I am not dealing with application level protocols. If you are interested, you can add features to support various application level protocols such as SMTP, FTP, NETBIOS etc

    标签: application describes capturing for

    上传时间: 2016-01-22

    上传用户:lijianyu172

  • The Linux Enterprise Cluster explains how to take a number of inexpensive computers with limited res

    The Linux Enterprise Cluster explains how to take a number of inexpensive computers with limited resources, place them on a normal computer NetWork, and install free software so that the computers act together like one powerful server. This makes it possible to build a very inexpensive and reliable business system for a small business or a large corporation. The book includes information on how to build a high-availability server pair using the Heartbeat package, how to use the Linux Virtual Server load balancing software, how to configure a reliable printing system in a Linux cluster environment, and how to build a job scheduling system in Linux with no single point of failure. The book also includes information on high availability techniques that can be used with or without a cluster, making it helpful for System Administrators even if they are not building a cluster. Anyone interested in deploying Linux in an environment where low cost computer reliability is important will find this book useful.

    标签: inexpensive Enterprise computers explains

    上传时间: 2014-11-29

    上传用户:zhangliming420

  • IEEE Communication Magazine2007

    IEEE Communication Magazine2007,11中关于Wireless Mesh NetWork 的分析(Guest Editorial)

    标签: Communication Magazine IEEE 2007

    上传时间: 2014-01-15

    上传用户:wangchong