Flylib.com
Chapter 27. Network Programming With Sockets
Previous page
Table of content
Next page
Section 27.1. Introduction
Section 27.2. Functions of the Socket API
Section 27.3. Examples
Previous page
Table of content
Next page
Linux Network Architecture
ISBN: 131777203
EAN: N/A
Year: 2004
Pages: 187
BUY ON AMAZON
Database Modeling with MicrosoftВ® Visio for Enterprise Architects (The Morgan Kaufmann Series in Data Management Systems)
Getting Started
ORM Constraints
Conceptual Model Reports
Editing Logical Models”Intermediate Aspects
Change Propagation and Round Trip Engineering
Introduction to 80x86 Assembly Language and Computer Architecture
Branching and Looping
Procedures
Bit Manipulation
Appendix B Useful MS-DOS Commands
Appendix C MASM 6.11 Reserved Words
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Understanding Intrusion Detection
Unauthorized Activity II
Policy and Procedures
Laws, Standards, and Organizations
The Future of Intrusion Detection and Prevention
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
Overview of Captology
The Functional Triad Computers in Persuasive Roles
Computers as Persuasive Media Simulation
Credibility and the World Wide Web
Increasing Persuasion through Mobility and Connectivity
Telecommunications Essentials, Second Edition: The Complete Global Source (2nd Edition)
Transmission Lines
Establishing Communications Channels
Packet-Switched Networks
Optical Networking
1G: Analog Transmission
FileMaker 8 Functions and Scripts Desk Reference
Abs()
Lower()
YearName()
About Network Ports
General Information on Relational Databases
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies