Résultats de la recherche - (((((protcol OR protocols) _) OR ((protcol OR protocols) i))) OR (protocol ii))
Suggestion de sujets dans votre recherche.
Suggestion de sujets dans votre recherche.
- Computer networks 5
- Computer network protocols 2
- Human rights 2
- Operating systems (Computers) 2
- Aggression (International law) 1
- Biomedical Research 1
- Bridges (Computer networks) 1
- Business Communication systems 1
- Business Data processing 1
- Business enterprises--Computer networks 1
- Case method 1
- Civil rights 1
- Client/server computing 1
- Computer Communication Networks 1
- Computer systems 1
- Computers 1
- Computers Law and legislation 1
- Content analysis (Communication) 1
- Data processing & computer science 1
- Data transmission systems 1
- Database management 1
- Electronic commerce 1
- Electronic government information 1
- Electronic information resources 1
- Electronic public records 1
- Electronic records 1
- Experimental design 1
- Health 1
- Human rights | Human Rights Africa (Organization) | Women's rights | Children's rights | Civil rights | International law 1
- Humanitarian law 1
Recherches alternatives:
- protocol ii »
-
1
Interconnections : bridges, routers, switches, and internetworking protocols /
Publié 2000Table des matières: “…145 (1) Network Service Types 146 (7) Connection-oriented Nets: X.25 and ATM 153 (26) Generic Connection-oriented Network 153 (2) X.25: Reliable Connection-oriented Service 155 (12) Implementing X.25 Inside the Net 167 (1) Asynchronous Transfer Mode 168 (11) Generic Connectionless Service 179 (10) Data Transfer 179 (1) Addresses 180 (1) Hop Count 180 (1) Service Class Information 181 (2) Network Feedback 183 (1) Fragmentation and Reassembly 183 (2) Maximum Packet Size Discovery 185 (4) Network Layer Addresses 189 (32) Hierarchical Addresses with Fixed Boundaries 190 (2) Hierarchical Addresses with Flexible Boundaries 192 (1) Owning versus Renting Addresses 193 (1) Types of Addresses 194 (1) IP 194 (5) IPX 199 (4) IPX+ 203 (1) IPv6 204 (7) CLNP Network Layer Addresses 211 (4) AppleTalk Network Layer Addresses 215 (1) DECnet Phases III and IV 216 (2) NAT/NAPT 218 (3) Connectionless Data Packet Formats 221 (44) Pieces of a Connectionless Network Layer 221 (1) Data Packets 222 (1) Summary of Packet Formats for Easy Reference 222 (8) Technical Issues and Comparisons in Data Packet Formats 230 (20) Source Routing 250 (3) The Great IPX Frame Format Mystery 253 (3) Error Reports and Other Network Feedback to the Endnode 256 (9) Neighbor Greeting and Autoconfiguration 265 (34) Endnodes Attached via Point-to-Point Links 266 (1) Endnodes Attached via LANs 267 (17) Endnodes Attached via Nonbroadcast Multiaccess Media 284 (9) Finding Things 293 (6) Routing Algorithm Concepts 299 (48) Distance Vector Routing 299 (8) Link State Routing 307 (13) Comparison of Link State and Distance Vector Routing 320 (5) Load Splitting 325 (1) Link Costs 326 (2) Migrating Routing Algorithms 328 (3) LANs 331 (3) Types of Service 334 (7) Partition Repair: Level I Subnetwork Partition 341 (6) Fast Packet Forwarding 347 (20) Using an Additional Header 347 (1) Address Prefix Matching 348 (2) Longest Prefix Match with Trie 350 (11) Binary Search 361 (6) Specific Routing Protocols 367 (82) A Brief History of Intradomain Routing Protocols 367 (2) RIP 369 (3) RTMP, IPX-RIP, and DECnet 372 (1) IS-IS, OSPF, NLSP, and PNNI 373 (52) Interdomain Routing Protocols 425 (24) WAN Multicast 449 (30) Introduction 449 (4) Multicast in IP 453 (26) Sabotage-proof Routing 479 (14) The Problem 480 (1) All You Need to Know about Cryptography 480 (2) Overview of the Approach 482 (2) Detailed Description of the Approach 484 (7) Summary 491 (1) For Further Reading 491 (2) To Route, Bridge, or Switch: Is That the Question? …”
Livre -
2
-
3
-
4
Internetworking with TCP/IP : principles, protocols, and architecture
Publié 2009Sujets: “…TCP/IP (Computer network protocol)…”
Livre -
5
-
6
-
7
-
8
-
9
-
10
From exclusion to equality : realizing the rights of persons with disabilities : handbook for parliamentarians on the Convention of the Rights of persons with disabilities and its optional protocol.
Publié 2007Table des matières: “…Overview -- The Convention in detail -- Monitoring the Convention and the Optional Protocol -- Becoming a party to the Convention and Optional Protocol -- National legislation and the Convention -- From provisions to practice : implementing the Convention -- Creating national institutions to implement and monitor the Convention.…”
Accéder au texte intégral
Livre -
11
Computer networks
Publié 2003Table des matières: “…Elementary Data Link Protocols. Sliding Window Protocols. Protocol Verification. …”
Livre -
12
Advanced concepts in operating systems : distributed, database, and multiprocessor operating systems
Publié 1994Table des matières: “…1. Overview 2. Synchronization Mechanisms 3. Process Deadlocks 4. …”
Livre -
13
Fundamentals of patent law : interpretation and scope of protection /
Publié 2007Table des matières: “…The Novelty of NasmithA Practice Accepted; Liardet v Johnson; Conclusion; 3Patents within the Market Economy(Part I)Classical Economics and PhilosophyPreface; Preface; Introduction; Patents Within the Market Economy; Property and Patents; Classical Justifications Of Property In The Intangible-The Patent; The Natural Right Theory; The Reward by Monopoly Theory; The Incentive to Invent Theory; The Exchange for Secrets Theory; Postscript; 4Patents within the Market Economy(Part II)Does the Philosophy Fit The Facts?…”
Livre -
14
Personal injury practice : the guide to litigation in the county court and high court
Publié 2003Table des matières: “…Contents: Part I: Preparation 1. Case Management - In House 2. …”
Livre -
15
Netware to Windows NT complete /
Publié 1998Table des matières: “…66 (2) Single Point of Access to Network Resources 68 (1) Internetworking: Transport Protocol 69 (1) Interoperability: Service Protocol 69 (1) Security 70 (1) Maintenance 71 (1) Training 71 (1) Terminology 72 (1) Network Traffic 73 (1) File System Backup 74 (1) Complete Migration 74 (29) Getting All the Systems to Work Together 75 (1) The OSI Reference Model 75 (28) Chapter 3 Protocol Integration 103 (82) Chapter Objectives 104 (1) An Overview of the Communication Process 104 (1) An Analogy 105 (1) Addressing 106 (23) The Open Systems Interconnection (OSI) Reference Model 108 (2) The Physical Layer 110 (2) The Data Link Layer 112 (4) The Network Layer 116 (3) The Transport Layer 119 (1) The Session Layer 120 (2) The Presentation Layer 122 (2) The Application Layer 124 (2) The Complete OSI Model 126 (2) A Trekky Analogy 128 (1) Comparing Novell and Microsoft Networking Protocols 129 (1) Novell Netware Protocols 130 (10) Internetwork Packet eXchange (IPX) 135 (1) Sequenced Packet eXchange (SPX) 135 (1) Netware Core Protocol (NCP) 136 (1) Netware IP 137 (1) The Netware IP Client Architecture 137 (1) Routing Information Protocol (RIP) 138 (1) Netware Link State Protocol (NLSP) 138 (1) Service Advertising Protocol (SAP) 138 (1) Network Basic Input Output System (NetBIOS) 139 (1) Netware Remote Procedure Call (RPC) 139 (1) Apple Talk 139 (1) The NetWare Communication Process in Action 140 (1) Windows NT Networking Protocols 140 (5) Network Device Interface Specification (NDIS) 144 (1) Transport Level Protocols 145 (40) NetBIOS Extended User Interface (NetBEUI) 145 (2) NBF Limitation 147 (1) NWLink Internetwork Packet eXchange (NWLink IPX or NetWare Link Protocol) 147 (3) NetBIOS in TCP/IP (NBT) 150 (3) Transport Driver Interface (TDI) 153 (32) Chapter 4 Client Connectivity 185 (150) Chapter Objectives 186 (1) Overview of Multiplatform Connectivity from a Client Perspective 187 (2) Client Connectivity in a Heterogeneous Network Environment 189 (16) DOS/Windows Connectivity Options 189 (1) Installing the DOS/Windows 3.x Netware Client Drivers 190 (1) Supporting Multiple Protocol Stacks 190 (5) Connecting the DOS/Windows Client to NetWare and Windows NT 195 (1) NET Command Syntax 196 (1) Accessing NT Server Drives 197 (1) Accessing Windows NT Printers 198 (1) Another Alternative: Changing the Windows NT Server 198 (1) Using the NetWare MAP Command to Access a Windows NT Server Running File and Print Service for NetWare 198 (2) Integrating Windows for Workgroups with NetWare and Windows NT 200 (2) Supporting Non-Microsoft Windows Networks 202 (3) Making the Windows NT Network Connection from WFWG 205 (5) Configuring the Logon 205 (1) Logon Startup Settings 206 (1) The Logon to Windows NT 207 (1) Accessing File and Print Services 207 (3) Making the Novell NetWare Connection from WFWG 210 (76) The NetWare Login 210 (1) NetWare Client Redirector Options 211 (2) The NetWare User Tools 213 (1) Accessing NetWare File and Print Services 214 (1) The Latest Thing for Windows for Workgroups: 32-Bit Network Drivers 215 (5) Coordinating User Names and Passwords 220 (1) The Hidden User Name and Password File 220 (21) Profiles and Policies 241 (45) Windows NT Connectivity Options 286 (49) Windows NT Networking Architecture 288 (1) Windows NT Networking Architecture 289 (2) Overview of the Windows NT Logon Process 291 (2) NetWare Connectivity 293 (1) Windows NT Workstation Is Tightly Integrated with Windows NT Domains 293 (3) Logon Validation 296 (1) Loading the User Profile 297 (1) Microsoft's Client Services for NetWare (CSNW) 298 (1) Implementing CSNW for Windows NT 299 (2) Changing Your CSNW Settings 301 (2) Accessing NetWare Server Volumes and Directories 303 (1) Working with the MS-DOS-Compatible Command Prompt to Access Network Services 304 (1) Accessing Netware Print Queues 305 (2) Support for NetWare-Aware Applications and Utilities 307 (1) Don't Forget the Message Files 307 (1) Running NetWare-Aware Applications 308 (1) Monitoring CSNW Performance 309 (1) General CSNW Troubleshooting Tips 310 (1) Windows NT Workstation 4.0 and Client Services for NetWare 311 (3) Are Profiles and Policies Still Supported? …”
Livre -
16
-
17
Business data communications
Publié 1998Table des matières: “…Ch. 1. Introduction Ch. 2. Business Information Ch. 3. …”
Livre -
18
International law and the use of force : cases and materials
Publié 2009Table des matières: “…408 (5) Marco Gestri Security Council Backs Nigerian-Led Force in Liberia 413 (3) Legality of Use of Force 416 (13) Notes, Questions, and Problems 429 (4) The Basic Law and Institutions on Application of Force 433 (77) Post-War Developments 435 (5) Geneva 436 (1) Frits Kalshoven The chaotic Status of the Laws of War and the Urgent Necessity for Their Revision 437 (3) Josef Kunz The Conventions 440 (59) The 1949 Geneva Conventions 440 (1) Geneva Convention Relative to the Treatment of Prisoners of War of August 12, 1949 441 (5) Geneva Convention Relative to the Protection of Civilian Persons in Time of War of August 12, 1949 446 (5) The 1954 Hague Convention 451 (1) 1954 Convention for the Protection of Cultural Property in the Event of an Armed Conflict 451 (1) The 1977 Additional Protocols 452 (1) 1977 Geneva Protcol I Additional to the Geneva Conventions of 12 August 1949, and Relating to the Protection of Victims of International Armed Conflicts 453 (9) Protocol Additional to the Geneva Conventions of 12 August 1949,, and Relating to the Protection of Victims of Non-International Armed Conflicts (Protocol II) 462 (3) Letter of Transmittal form Ronald Reagan, President of the United States of America to the United States Senate 465 (2) An Appeal for Ratification by the United States 467 (6) Hans-Peter Gasser The 1998 Rome Statute of the International Criminal Court 473 (1) The Evolution of the ICC: From the Hague to Rome and Back Again 474 (5) Leila Nadya Sadat 1998 Rome Statute of the International Court 479 (5) International Criminal Court (``ICC'') 484 (2) Knut Dormann Louis Maresca Customary IHL 486 (1) Study on Customary International Law: A Contribution to the Understanding and Respect for the Rule of Law in Armed Conflict 486 (13) Jean-Marie Henckaerts The International Commitee of the Red Cross 499 (4) Constraints on the Waging of War 501 (2) Fritz Kalshoven Statutes of the International Red Cross and Red Crescent Movements 503 (1) Notes, Questions, and Problems 503 (7) Civilians 510 (85) Civilian Status and Protections in Hostilities 511 (43) Prosecutor v. …”
Livre -
19
War & law since 1945
Publié 1997Table des matières: “…Abbreviations, Short Titles, and Archive References xiii PART I: THE BACKGROUND TO THE LAWS OF WAR 3 (64) 1. …”
Livre -
20