Flylib.com
index_V
Previous page
Table of content
Next page
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]
Variable Length Subnet Masks (VLSM)
VLSM (Variable Length Subnet Masks)
VBR
VBRnrt
VBRrt
VCs (virtual circuits)
VDSL (Very-High-Data-Rate Digital Subscriber Line)
virtual addresses
logical addresses 2nd 3rd
virtual circuits:DLCIs:global addresses
global DLCI addresses
universal significance;DLCIs:universal significance
virtual circuits:SVCs:DLCIs
DLCIs
Frame Relay:SVCs:DLCIs;SVCs:DLCIs 2nd
virtual circuits:SVCs:E.164 addressing
DLCIs
Frame Relay:SVCs:E.164 addressing;SVCs:E.164 addressing;E.164 addressing
virtual circuits:SVCs:X.121 addressing
DLCIs
Frame Relay:SVCs:X.121 addressing;SVCs:X.121 addressing;X.121 addressing
viruses
VLANs
VLANs (Virtual LANs)
VLANs:WAN integration
WANs:VLAN integration
VoFr (Voice over Frame Relay)
voice networks:lines
lines
CO:lines;PBX (private branch exchange):lines;lines
voice networks:PSTN:dedicated access
PSTN:dedicated access
dedicated PSTN access
voice networks:PSTN:switched access
PSTN:switched access
switched PSTN access
VPNs:tunneling protocols
tunneling protocols
remote access:VPNs:tunneling protocols
VPNs:tunneling protocols:L2F
tunneling protocols:L2F
remote access:VPNs:L2F;L2F (Layer 2 Forwarding)
VPNs:tunneling protocols:L2TP
tunneling protocols:L2TP
remote access:VPNs:L2TP;L2TP (Layer 2 Tunneling Protocol)
VPNs:tunneling protocols:PPTP
tunneling protocols:PPTP
remote access:VPNs:PPTP;PPTP
VRML (Virtual Reality Modeling Language)
vulnerability to WinNuke attack:testing
WinNuke attack
Previous page
Table of content
Next page
Network Sales and Services Handbook (Cisco Press Networking Technology)
ISBN: 1587050900
EAN: 2147483647
Year: 2005
Pages: 269
Authors:
Matthew J Castelli
BUY ON AMAZON
Agile Project Management: Creating Innovative Products (2nd Edition)
Encourage Exploration
Build Adaptive (Self Organizing, Self Disciplined) Teams
Practice: Customer Team-Developer Team Interface
Practice: Performance Requirements Cards
Speculate Summary
Absolute Beginner[ap]s Guide to Project Management
15 Common Mistakes of Project Managers
Reasons for Estimating Woes
Leading a Project
Value of Reviewing Stakeholder Expectation Management
Special Situations
Oracle Developer Forms Techniques
Tracking QUERY_ONLY Mode
Taking Advantage of PL/SQL 2.x in Forms
Does Subclassing Exhibit Intelligence?
Operations on a Tree Item
Techniques for Querying and Updating New Data Sources in Forms Based on Objects
Java for RPG Programmers, 2nd Edition
The Java Onion
Arrays And Vectors
Exceptions
Threads
Appendix C Obtaining The Code Samples
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 14. Control Your Bluetooth Phone with FMA
Hack 46. Proxy Web Traffic over SSH
Hacks 6382: Introduction
Hack 94. Analyze Elevation Profiles for Better Long-Range Wireless Networking
Hack 96. Establish Line of Sight
Python Programming for the Absolute Beginner, 3rd Edition
Standard Streams
Python/Tkinter for Tcl/Tk Converts
Where to Go from Here
JPython ( Jython): Python for Java
Embedding Python
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies