Flylib.com
Linux Server Hacks, Volume Two: Tips & Tools for Connecting, Monitoring, and Troubleshooting
Linux Server Hacks, Volume Two: Tips & Tools for Connecting, Monitoring, and Troubleshooting
ISBN: 735615799
EAN: 2147483647
Year: 1998
Pages: 159
Authors:
William von Hagen
,
Brian K. Jones
BUY ON AMAZON
Cover
LOC
Dedication
Acknowledgments
Introduction
How to Use This Book
How to Use the Companion CD-ROM
Support
Part I: Legacy Networking APIs
Chapter 1 -- NetBIOS
Microsoft NetBIOS
NetBIOS Programming Basics
Common NetBIOS Routines
Datagram Operations
Miscellaneous NetBIOS Commands
Platform Considerations
Conclusion
Chapter 2 -- The Redirector
Universal Naming Convention
Multiple UNC Provider
Network Providers
Redirector
Server Message Block
Security
Network Security
A Practical Example
Conclusion
Chapter 3 -- Mailslots
Mailslot Implementation Details
Basic ClientServer
Additional Mailslot APIs
Platform and Performance Considerations
Conclusion
Chapter 4 -- Named Pipes
Named Pipe Implementation Details
Basic Server and Client
Other API Calls
Platform and Performance Considerations
Conclusion
Part II: The Winsock API
Chapter 5 -- Network Principles and Protocols
Protocol Characteristics
Supported Protocols
Winsock 2 Protocol Information
Windows Sockets
Platform-Specific Information
Selecting the Right Protocol
Conclusion
Chapter 6 -- Address Families and Name Resolution
IP
Infrared Sockets
IPXSPX
NetBIOS
AppleTalk
ATM
Additional Winsock 2 Support Functions
Conclusion
Chapter 7 -- Winsock Basics
Initializing Winsock
Error Checking and Handling
Connection-Oriented Protocols
Connectionless Protocols
Miscellaneous API Functions
Windows CE
Other Address Families
Conclusion
Chapter 8 -- Winsock IO Methods
Socket Modes
Socket IO Models
IO Model Consideration
Conclusion
Chapter 9 -- Socket Options and Ioctls
Socket Options
IOCTLSOCKET and WSAIOCTL
Conclusion
Chapter 10 -- Registration and Name Resolution
Background
Name Space Models
Registering a Service
Querying a Service
Conclusion
Chapter 11 -- Multicasting
Multicast Semantics
IP Multicasting
ATM Multicasting
Multicasting with Winsock
Conclusion
Chapter 12 -- Generic Quality of Service
Background
QOS and Winsock
Terminating QOS
Programming QOS
Examples
ATM and QOS
Conclusion
Chapter 13 -- Raw Sockets
Raw Socket Creation
Internet Control Message Protocol
Internet Group Management Protocol
Using IP_HDRINCL
Conclusion
Chapter 14 -- Winsock 2 Service Provider Interface
SPI Basics
Transport Service Providers
Name Space Service Providers
Debug Tracing Winsock 2 SPI Functions
Conclusion
Chapter 15 -- The Microsoft Visual Basic Winsock Control
Properties
Methods
Events
UDP Example
TCP Example
Limitations
Common Errors
The Windows CE Winsock Control
Conclusion
Part III: Remote Access Service (RAS)
Chapter 16 -- Remote Access Service Client
Compiling and Linking
Data Structures and Platform Compatibility Issues
DUN 1.3 Upgrade and Windows 95
RasDial
Phonebook
Connection Management
Conclusion
Appendix A -- NetBIOS Command Reference
NCBADDGRNAME
NCBADDNAME
NCBASTAT
NCBCALL
NCBCANCEL
NCBCHAINSEND
NCBCHAINSENDNA
NCBDELNAME
NCBDGRECV
NCBDGRECVBC
NCBDGSEND
NCBDGSENDBC
NCBENUM
NCBFINDNAME
NCBHANGUP
NCBLANSTALERT
NCBLISTEN
NCBRECV
NCBRECVANY
NCBRESET
NCBSEND
NCBSENDNA
NCBSSTAT
NCBUNLINK
Appendix B -- IP Helper Functions
Ipconfig
Netstat
Route
ARP
Appendix C -- Winsock Error Codes
About the Authors
Linux Server Hacks, Volume Two: Tips & Tools for Connecting, Monitoring, and Troubleshooting
ISBN: 735615799
EAN: 2147483647
Year: 1998
Pages: 159
Authors:
William von Hagen
,
Brian K. Jones
BUY ON AMAZON
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
Step 3.3 Use WinSCP as a Graphical Replacement for FTP and RCP
Step 4.4 How to Generate a Key Using PuTTY
Step 4.5 How to use OpenSSH Passphrase Agents
Step 5.1 General Troubleshooting
Step 6.3 X11 Forwarding
WebLogic: The Definitive Guide
JSP Tag Libraries
Overview
Monitoring a WebLogic Domain
Programmatic SSL
Datatypes
Network Security Architectures
Attack Results
FTP
Small Network Edge Security Design
Expected Threats
Organizational Realities
MySQL Cookbook
Controlling mysqls Verbosity Level
The Effect of ALTER TABLE on Null and Default Value Attributes
Validating and Transforming Data
Using Dates with Missing Components
Sequencing an Unsequenced Table
Competency-Based Human Resource Management
Why a Focus on Jobs Is Not Enough
Competency-Based Employee Rewards
The Transformation to Competency-Based HR Management
Appendix A Frequently Asked Questions About Competency-Based HR Management
Appendix D Employee Development and Succession Management
Logistics and Retail Management: Emerging Issues and New Challenges in the Retail Supply Chain
The Internationalization of the Retail Supply Chain
Market Orientation and Supply Chain Management in the Fashion Industry
Logistics in Tesco: Past, Present and Future
Temperature-Controlled Supply Chains
Transforming Technologies: Retail Exchanges and RFID
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies