Flylib.com
List of Tables
Previous page
Table of content
< Day Day Up >
Chapter 2: The Basic Political Economy of Identifiers
Table 2.1: Summary of Common Name/Address Spaces and Their Features
Chapter 3: The Internet Name and Address Spaces
Table 3.1: Root Server confederations
Chapter 5: Growing the Root
Table 5.1: Number of Internet Hosts
Table 5.2: Number of Country Code Delegations, 1985-1993
Chapter 6: Appropriating the Root: Property Rights Conflicts
Table 6.1: Number of InterNIC Domain Name Registrations, July 1994 and February 1996
Table 6.2: Typosquatting on Yahoo!
Table 6.3: TLD Applications to IANA, 1995-1996
Chapter 7: The Root in Play
Table 7.1: The Composition of the IAHC
Chapter 8: Institutionalizing the Root: The Formation of ICANN
Table 8.1: Stakeholders List in Internet Governance
Chapter 9: The New Regime
Table 9.1: At-Large Election Results
Table 9.2: New ICANN Top-Level Domains
< Day Day Up >
Previous page
Table of content
Ruling the Root: Internet Governance and the Taming of Cyberspace
ISBN: 0262134128
EAN: 2147483647
Year: 2006
Pages: 110
Authors:
Milton L. Mueller
BUY ON AMAZON
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
Step 3.3 Use WinSCP as a Graphical Replacement for FTP and RCP
Step 4.5 How to use OpenSSH Passphrase Agents
Step 4.6 How to use PuTTY Passphrase Agents
Step 5.1 General Troubleshooting
Step 6.2 Using Port Forwarding Within PuTTY to Read Your E-mail Securely
C++ How to Program (5th Edition)
Memory Concepts
Type Fields and switch Statements
Introduction
D.2. Abbreviating Binary Numbers as Octal and Hexadecimal Numbers
I.4. Visual C++
Visual C# 2005 How to Program (2nd Edition)
Compound Assignment Operators
Wrap-Up
Summary
F.9. Unordered Lists
Appendix J. ATM Case Study Code
Cisco IOS Cookbook (Cookbooks (OReilly))
Warm Upgrade
Default Passive Interface
Checking IPSec Protocol Status
Setting the Time Zone
Making a Router a Mobile Node
101 Microsoft Visual Basic .NET Applications
Working with Microsoft Visual Studio .NET 2003 and Microsoft .NET Framework 1.1
Advanced .NET Framework
GDI+
Visual Studio .NET
Coding Conventions
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hacks 2339: Introduction
Hack 55. Increase the Range of a PowerBook
Hack 64. Bridge Your Linux AP
Hack 91. The Passive Repeater
Section A.2. 802.11a: The Betamax of the 802.11 Family
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies