Flylib.com
List of Tables
Previous page
Table of content
Next page
< Day Day Up >
Chapter 3: Standard BSD API Functions
Table 3.1: SOCKETS API FUNCTIONS DISCUSSED IN CHAPTER 3
Table 3.2: SOCKET TYPES USED AS THE TYPE ARGUMENT FOR SOCKET
Table 3.3: MOST COMMON FLAGS FOR THE
recv
/
recvfrom
FUNCTIONS
Table 3.4: MOST COMMON FLAGS FOR THE
send
/
sendto
FUNCTIONS
Chapter 4: Advanced Sockets Functions
Table 4.1: SOCKETS FUNCTIONS DISCUSSED IN CHAPTER 4
Table 4.2: RETURN VALUES FOR THE
select
FUNCTION
Table 4.3: STANDARD SOCKET OPTION LEVELS
Table 4.4: RANGE OF VALUES FOR THE
how
PARAMETER OF
shutdown
Chapter 5: Socket Options
Table 5.1:
Level
ARGUMENT FOR THE
setsockopt
/
getsockopt
FUNCTIONS
Table 5.2: INTERESTING COMBINATIONS FOR THE
SO_LINGER
SOCKET OPTION
Table 5.3: MEANING OF VALUES FOR THE
TCP_MAXRT
SOCKET OPTION
Chapter 6: Advanced Sockets Programming Topics
Table 6.1: PROTOCOL NUMBERS FOR TYPICAL IP PROTOCOLS
Chapter 16: Network Code Patterns in C
Table 16.1: CD-ROM COMPANION SOFTWARE
Chapter 17: Network Code Patterns in Java
Table 17.1: CD-ROM COMPANION SOFTWARE
Chapter 18: Network Code Patterns in Python
Table 18.1 CD-ROM companion software
Chapter 19: Network Code Patterns in Perl
Table 19.1: CD-ROM COMPANION SOFTWARE
Chapter 20: Network Code Patterns in Ruby
Table 20.1: CD-ROM COMPANION SOFTWARE
Chapter 21: Network Code Patterns in Tcl
Table 21.1: CD-ROM COMPANION SOFTWARE
< Day Day Up >
Previous page
Table of content
Next page
Network Programming for Microsoft Windows , Second Edition (Microsoft Programming Series)
ISBN: 1584502681
EAN: 2147483647
Year: 2003
Pages: 225
Authors:
Jim Ohlund
BUY ON AMAZON
Crystal Reports 9 on Oracle (Database Professionals)
Oracle SQL
Optimizing: The Crystal Reports Side
Optimizing: The Oracle Side
Appendix A Common Issues
Appendix B Functions
Agile Project Management: Creating Innovative Products (2nd Edition)
An Agile Process Framework
Phase: Speculate
Phase: Speculate
Progress
A Hub Organizational Structure
CISSP Exam Cram 2
We Want to Hear from You!
Answers to Exam Prep Questions
Applications and Systems-Development Security
Hack Attacks
Exam Prep Questions
The .NET Developers Guide to Directory Services Programming
DirectorySearcher Overview
Binary Data Conversion
Expanding Group Membership
Handcrafted COM Interop Declarations
Appendix B. LDAP Tools for Programmers
WebLogic: The Definitive Guide
Using CMP and EJB QL
SSL
The XML Registry
WebLogics XPath API
MBean Notifications
SQL Hacks
Hack 7. Modify a Schema Without Breaking Existing Queries
Hack 18. Sort Your Email
Hack 42. Present Data Graphically Using SVG
Hack 44. Tunnel into MySQL from Microsoft Access
Hack 64. Determine Your Isolation Level
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies