Flylib.com
index_V
Previous page
Table of content
Next page
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]
Variable Length Subnet Masks (VLSM)
VLSM (Variable Length Subnet Masks)
VBR
VBRnrt
VBRrt
VCs (virtual circuits)
VDSL (Very-High-Data-Rate Digital Subscriber Line)
virtual addresses
logical addresses 2nd 3rd
virtual circuits:DLCIs:global addresses
global DLCI addresses
universal significance;DLCIs:universal significance
virtual circuits:SVCs:DLCIs
DLCIs
Frame Relay:SVCs:DLCIs;SVCs:DLCIs 2nd
virtual circuits:SVCs:E.164 addressing
DLCIs
Frame Relay:SVCs:E.164 addressing;SVCs:E.164 addressing;E.164 addressing
virtual circuits:SVCs:X.121 addressing
DLCIs
Frame Relay:SVCs:X.121 addressing;SVCs:X.121 addressing;X.121 addressing
viruses
VLANs
VLANs (Virtual LANs)
VLANs:WAN integration
WANs:VLAN integration
VoFr (Voice over Frame Relay)
voice networks:lines
lines
CO:lines;PBX (private branch exchange):lines;lines
voice networks:PSTN:dedicated access
PSTN:dedicated access
dedicated PSTN access
voice networks:PSTN:switched access
PSTN:switched access
switched PSTN access
VPNs:tunneling protocols
tunneling protocols
remote access:VPNs:tunneling protocols
VPNs:tunneling protocols:L2F
tunneling protocols:L2F
remote access:VPNs:L2F;L2F (Layer 2 Forwarding)
VPNs:tunneling protocols:L2TP
tunneling protocols:L2TP
remote access:VPNs:L2TP;L2TP (Layer 2 Tunneling Protocol)
VPNs:tunneling protocols:PPTP
tunneling protocols:PPTP
remote access:VPNs:PPTP;PPTP
VRML (Virtual Reality Modeling Language)
vulnerability to WinNuke attack:testing
WinNuke attack
Previous page
Table of content
Next page
Network Sales and Services Handbook (Cisco Press Networking Technology)
ISBN: 1587050900
EAN: 2147483647
Year: 2005
Pages: 269
Authors:
Matthew J Castelli
BUY ON AMAZON
Professional Java Native Interfaces with SWT/JFace (Programmer to Programmer)
Combos and Lists
Tables
Creating a Text Editor with JFace Text
Eclipse Forms
Drawing Diagrams with Draw2D
FileMaker Pro 8: The Missing Manual
Advanced Find Mode
Format the Number/Date/Time/Graphic
The Structure of a Calculation
Calculations and Data Types
Sharing Your Database
Service-Oriented Architecture (SOA): Concepts, Technology, and Design
Web Services and Primitive SOA
Metadata exchange
Orchestration service layer
Service-Oriented Analysis (Part II: Service Modeling)
Service modeling (a step-by-step process)
Visual Studio Tools for Office(c) Using C# with Excel, Word, Outlook, and InfoPath
Working with the Workbook Object
Dynamic Controls
Properties Merged from OLEObject or OLEControl
Deploying Policy to User Machines
Conclusion
The Oracle Hackers Handbook: Hacking and Defending Oracle
The Oracle Network Architecture
Attacking the Authentication Process
Oracle and PL/SQL
Defeating Virtual Private Databases
Accessing the File System
Microsoft Visual Basic .NET Programmers Cookbook (Pro-Developer)
Arrays and Collections
Multithreading
Reflection
ASP.NET Web Applications
Security and Cryptography
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies