... the problem. Building Internet Firewalls Elizabeth D. Zwicky, Simon Cooper & D. Brent Chapman Second Edition, June 2000 ISBN: 1-5 659 2-8 7 1-7 , 890 pages Completely ... principles you need to understand before beginning to build firewalls. Building Internet Firewalls p age 9 Chapter 1. Why Internet Firewalls? It is scarcely possib...
Ngày tải lên: 25/03/2014, 10:40
... almost always an in-process (ActiveX DLL) com- ponent, though you can use out-of-process components if you wish. However, ASP is optimized for in-process access of components. As in-process COM+ objects, ... usually created using the apart- ment- or both-threaded model or the new neutral-threaded apartment model. ASP components are not and should not be created using the single-threaded model...
Ngày tải lên: 25/03/2014, 10:41
o'reilly - java network programming 2nd edition
... editions, to: O'Reilly & Associates, Inc. 101 Morris Street Sebastopol, CA 95472 (800) 99 8-9 938 (in the United States or Canada) (707) 82 9-0 515 (international/local) (707) 82 9-0 104 ... the Internet to communicate. 1.1.4 Peer-to-Peer Interaction The previous examples all follow a client/server model. However, Java applications can also talk to each other across...
Ngày tải lên: 25/03/2014, 10:44
o'reilly - linux device drivers 2nd edition
... Alpha, ARM, IA-64, M68k, PowerPC, SPARC, SPARC64, and VR41xx (MIPS). Because the code has been tested on both 32-bit and 64-bit processors, it should compile and run on all other plat- for ms. As ... this list is essen- tial for those who are inter ested in kernel development; it also can be a top-qual- ity resource for those in need of kernel development help. To join the linux-kernel list,...
Ngày tải lên: 25/03/2014, 10:48
o'reilly - mastering regular expressions 2nd edition
... Multiple ranges arefine, so ![0123456789abcdefABCDEF]" can be written as ![ 0-9 a-fA-F]" (or,perhaps, ![A-Fa-f 0-9 ]",since the order in which ranges aregiven doesn’t matter). These last ... character class, the character-class metacharacter - (dash)indicates a range of characters: !<H[ 1-6 ]>" is identical to the previous example. ![ 0-9 ]" and ![a-z]&...
Ngày tải lên: 25/03/2014, 10:50
o'reilly - virtual private networks 2nd edition
... Connection-to-LAN and LAN-to-LAN/LAN-to-WAN implementations of the AltaVista Tunnel are different. The LAN-to-LAN/LAN-to-WAN tunnel configurations are for an enterprise that requires two-way tunnel ... Implementing a LAN-to-LAN Tunnel This configuration features a firewall on each side. 6.4.1.1 Sample configuration In the LAN-to-LAN tunnel configuration shown in Figure 6-1 , LAN 1 is...
Ngày tải lên: 25/03/2014, 10:53
o'reilly - xml pocket reference 2nd edition
... <xsl:strip-space/> <xsl:preserve-space/> <xsl:output/> <xsl:key/> <xsl:decimal-format/> <xsl:namespace-alias/> <xsl:attribute-set> </xsl:attribute-set> ... case-insensitive manner. In addition, ISO-3166 provides extensions for nonstandardized languages or language variants. Valid xml:lang values include notations such as en, en-US,...
Ngày tải lên: 25/03/2014, 10:53
o'reilly - java and xml 2nd edition - brett mclaugblin
... the schema in Example 2-5 , for reasons you will soon understand. Example 2-5 . Additional XML Schema for Example 2-1 Java & XML, 2nd Edition 2 Java & XML, 2nd Edition 30 <?xml ... explanation on its own. Example 2-4 shows the XML Schema constraining Example 2-1 . Example 2-4 . XML Schema constraining Example 2-1 Java & XML, 2nd Ed...
Ngày tải lên: 31/03/2014, 16:55
o'reilly - java and xml 2nd edition - brett mclaugblin
... the schema in Example 2-5 , for reasons you will soon understand. Example 2-5 . Additional XML Schema for Example 2-1 Java & XML, 2nd Edition 2 Java & XML, 2nd Edition 30 <?xml ... explanation on its own. Example 2-4 shows the XML Schema constraining Example 2-1 . Example 2-4 . XML Schema constraining Example 2-1 Java & XML, 2nd Ed...
Ngày tải lên: 31/03/2014, 17:04