Mostrando 2,041 - 2,060 Resultados de 3,243 Para Buscar '"streaming"', tiempo de consulta: 0.11s Limitar resultados
  1. 2041
    por Das, Lyla B.
    Publicado 2014
    Tabla de Contenidos: “…Beyond Pentium - More Advanced Processors -- 17.1 | Processors Based on the P6 Microarchitecture -- 17.2 | Features of Pentium Pro -- 17.3 | Pentium-II and Pentium-III -- 17.4 | Streaming SIMD Extensions (SSE) -- 17.5 | Pentium-IV -- 17.6 | The Continued Dominance of x86 -- 17.7 | 'Core' Microarchitecture -- 17.8 | Multicore Processors -- 17.9 | Nehalem Microarchitecture -- 17.10 | Sandy Bridge and IvyBridge -- 17.11 | Fourth-Generation Core Processor Family -- 17.12 | Important Technological Features in IA Processors -- 17.13 | Nanometer Technology -- 17.14 | Difference Between Core i3, i5 and i7 Processors -- Key Points of this chapter -- Questions -- Exercises -- 18. …”
    Libro electrónico
  2. 2042
    Publicado 2015
    Tabla de Contenidos: “…MODELOS DE SISTEMAS DE AUTOEDICION Y LECTURA EN STREAMING -- 11.8. CONCLUSION -- CAPITULO XII - ESCENARIOS FUTUROS DEL LIBRO ELECTRONICO EN BIBLIOTECAS -- BIBLIOGRAFIA -- APENDICE -- BUSCADORES DE LIBROS ELECTRONICOS -- BIBLIOTECAS DIGITALES -- INICIATIVAS -- TESIS DOCTORALES -- SOFTWARE LIBRE PARA E-BOOKS…”
    Libro electrónico
  3. 2043
    por Flanagan, William A.
    Publicado 2012
    Tabla de Contenidos: “…-- Preface xiii -- Acknowledgments xv -- 1 IP Technology Disrupts Voice Telephony 1 -- 1.1 Introduction to the Public Switched Telephone Network 1 -- 1.2 The Digital PSTN 2 -- 1.3 The Packet Revolution in Telephony 8 -- 1.3.1 Summary of Packet Switching 9 -- 1.3.2 Link Capacity: TDM versus Packets 11 -- 1.3.3 VoIP and “The Cloud” 13 -- IN SHORT: Reading Network Drawings 14 -- 2 Traditional Telephones Still Set Expectations 17 -- 2.1 Availability: How the Bell System Ensured Service 18 -- 2.2 Call Completion 19 -- 2.3 Sound Quality: Encoding for Recognizable Voices 20 -- 2.4 Low Latency 23 -- 2.5 Call Setup Delays 24 -- 2.6 Impairments Controlled: Echo, Singing, Distortion, Noise 25 -- 3 From Circuits to Packets 27 -- 3.1 Data and Signaling Preceded Voice 27 -- 3.1.1 X.25 Packet Data Service 27 -- 3.1.2 SS7: PSTN Signaling on Packets 28 -- 3.1.3 ISDN 29 -- 3.2 Putting Voice into Packets 30 -- 3.2.1 Voice Encoding 31 -- 3.2.2 Dicing and Splicing Voice Streams 32 -- 3.2.3 The Latency Budget 33 -- 4 Packet Transmission and Switching 37 -- 4.1 The Physical Layer: Transmission 39 -- IN SHORT: The Endian Wars 40 -- 4.2 Data Link Protocols 41 -- 4.3 IP, the Network Protocol 43 -- 4.4 Layer 4 Transport Protocols 47 -- 4.4.1 Transmission Control Protocol 47 -- 4.4.2 User Datagram Protocol 50 -- 4.4.3 Stream Control Transmission Protocol 51 -- 4.5 Higher Layer Processes 54 -- 4.5.1 RTP 54 -- 4.5.2 RTCP 57 -- 4.5.3 Multiplexing RTP and RTCP on One UDP Port 58 -- 4.5.4 RTP Mixers and Translators 59 -- 4.5.5 Layered Encoding 60 -- 4.5.6 Profiles for Audio and Video Conferences 60 -- 4.5.7 Security via Encryption 61 -- IN SHORT: Public Key Infrastructure (PKI) 62 -- 4.6 Saving Bandwidth 64 -- 4.6.1 Voice Compression 64 -- 4.6.2 Header Compression 66 -- 4.6.3 Silence Suppression, VAD 67 -- 4.6.4 Sub-Packet Multiplexing 69 -- 4.6.5 Protocol and Codec Selection 70 -- 4.7 Differences: Circuit versus Packet Switched 71 -- 4.7.1 Power to the Desktop Phone 71 -- 4.7.2 Phone as Computer and Computer as Phone 72.…”
    Libro electrónico
  4. 2044
    Publicado 2017
    Tabla de Contenidos: “…Moving sources -- 5.4. Sources in a free stream -- 5.5. Ffowcs Williams and Hawkings surfaces -- 5.6. …”
    Libro electrónico
  5. 2045
    por Cline, Marshall P.
    Publicado 1999
    Tabla de Contenidos: “…-- FAQ 2.12: What are the basics of stream output? -- FAQ 2.13: What are the basics of stream input? …”
    Libro electrónico
  6. 2046
    Publicado 2017
    Tabla de Contenidos: “…-- The electrical lines -- Video on the BeagleBone Black -- Video on the SAMA5D3 Xplained -- Video on the Wandboard -- Video in Linux -- The video tools -- The USB video class device -- Managing video devices -- Streaming video over the Web -- Capturing motion -- Summary -- Chapter 17: Analog-to-Digital Converters - ADC -- What is an analog-to-digital converter device? …”
    Libro electrónico
  7. 2047
    Publicado 2018
    Tabla de Contenidos: “…6.1.2 Managing permissions between GitHub and CircleCI -- 6.1.3 Signing commits and tags with Git -- 6.2 Access control for container storage -- 6.2.1 Managing permissions between Docker Hub and CircleCI -- 6.2.2 Signing containers with Docker Content Trust -- 6.3 Access control for infrastructure management -- 6.3.1 Managing permissions using AWS roles and policies -- 6.3.2 Distributing secrets to production systems -- Summary -- Part 2: Watching for anomalies and protecting services against attacks -- Chapter 7: Collecting and storing logs -- 7.1 Collecting logs from systems and applications -- 7.1.1 Collecting logs from systems -- 7.1.2 Collecting application logs -- 7.1.3 Infrastructure logging -- 7.1.4 Collecting logs from GitHub -- 7.2 Streaming log events through message brokers -- 7.3 Processing events in log consumers -- 7.4 Storing and archiving logs -- 7.5 Accessing logs -- Summary -- Chapter 8: Analyzing logs for fraud and attacks -- 8.1 Architecture of a log-analysis layer -- 8.2 Detecting attacks using string signatures -- 8.3 Statistical models for fraud detection -- 8.3.1 Sliding windows and circular buffers -- 8.3.2 Moving averages -- 8.4 Using geographic data to find abuses -- 8.4.1 Geoprofiling users -- 8.4.2 Calculating distances -- 8.4.3 Finding a user's normal connection area -- 8.5 Detecting anomalies in known patterns -- 8.5.1 User-agent signature -- 8.5.2 Anomalous browser -- 8.5.3 Interaction patterns -- 8.6 Raising alerts to operators and end users -- 8.6.1 Escalating security events to operators -- 8.6.2 How and when to notify end users -- Summary -- Chapter 9: Detecting intrusions -- 9.1 The seven phases of an intrusion: the kill chain -- 9.2 What are indicators of compromise? …”
    Libro electrónico
  8. 2048
    Publicado 2012
    Tabla de Contenidos: “…-- Going Connection Shopping -- Objective 8.03 Using Remote Access -- Dial-up to the Internet -- Private Dial-Up -- Dedicated Connection -- DSL and Cable -- Cable Issues -- Remote Terminal -- VoIP -- RTP -- SIP and H.323 -- Skype -- Streaming Media with RSTP -- Checkpoint -- Review Questions -- Review Answers -- Chapter 9: Network Security -- Objective 9.01 Common Threats -- System Crash/Hardware Failure -- Administrative Access Control -- Malware -- Virus -- Worm -- Macro Virus -- Trojan -- Rootkit -- Adware/Spyware -- Dealing with Malware -- Antimalware Programs -- Social Engineering -- Phishing -- Man in the Middle -- Denial of Service -- Physical Intrusion -- Attacks on Wireless Connections -- Leeching -- Cracking Wireless Encryption -- Rogue Access Points -- Evil Twin -- Objective 9.02 Securing User Accounts -- Authentication -- Authentication Principles -- Authentication Protocols -- Authorization -- Logon and Access Security -- Implementing Share-Level Security -- Implementing User-Level Security -- Using Passwords -- Objective 9.03 Firewalls -- Hiding the IPs -- Port Filtering -- Packet Filtering -- MAC Filtering -- Personal Firewalls -- Network Zones -- Vulnerability Scanners -- Objective 9.04 Securing Remote Connections -- IPsec -- Virtual Private Networks -- PPTP VPNs -- L2TP VPNs -- SSL VPNs -- Checkpoint -- Review Questions -- Review Answers -- Chapter 10: The Complete Network -- Objective 10.01 Designing and Implementing a SOHO Network -- Define the Network Needs -- Network Design -- Compatibility Issues…”
    Libro electrónico
  9. 2049
    Publicado 2023
    Tabla de Contenidos: “…-- 14.2 Authentication and Authorization -- 14.3 Choosing Where to Cut the Application -- 14.4 URL Path Layout -- 14.5 Quickly Transitioning to a Microservice Architecture -- 14.6 Summary -- Chapter 15: Enterprise Message Queues -- 15.1 Basic Message Queue Components and Terminology -- 15.2 Working with Work Queues -- 15.3 Decoupling Systems with Publish/Subscribe -- 15.4 Event Bus Architecture -- 15.5 Message Streaming for Permanent Replayability -- 15.6 Two-Way Messaging -- 15.7 The Job of the Cloud Architect -- 15.8 Getting Started with Message Queueing -- 15.9 Summary -- Chapter 16: Architecting Data Stores -- 16.1 Types of Data Stores -- 16.1.1 Relational Databases -- 16.1.2 Key/Value Stores -- 16.1.3 Document Databases -- 16.1.4 Full-Text Databases -- 16.1.5 Object/File Stores -- 16.1.6 Specialized Persistent Stores -- 16.2 Implementing Stores Using a Relational Database -- 16.2.1 Document Databases -- 16.2.2 Full-Text Search -- 16.2.3 Object/File Stores -- 16.2.4 Key/Value Stores -- 16.3 Database Topologies -- 16.4 Database Partitioning -- 16.5 Using UUIDs for Primary Keys -- 16.6 Thinking About Sources of Truth -- 16.7 Summary -- Chapter 17: Extended Cloud Topologies -- 17.1 Terminology -- 17.2 How Kubernetes Handles Extended Topologies -- 17.3 Considerations for Multiregion Deployments -- 17.4 Summary -- Chapter 18: Architecture Values -- 18.1 Scalability…”
    Libro electrónico
  10. 2050
    Publicado 2017
    Tabla de Contenidos: “…FLOW PERFORMANCE CURVES -- CONDENSATE BACK-UP IN CONDENSERS-THE EFFECT OF SUB-COOLING -- DISTILLATION TRAY DOWNCOMER BACK-UP AND LIQUID FLOODING -- EFFECT OF FOAM ON LEVEL INDICATION IN DISTILLATION TOWERS -- SPLIT LIQUID LEVELS IN VERTICAL VAPOR LIQUID SEPARATORS -- OPTIMIZING EXCESS AIR IN A FIRED HEATER TO MINIMIZE FUEL CONSUMPTION -- DISTILLATION TRAY DUMPING OR WEEPING WITH VALVE CAP TRAY DECKS -- FIRED HEATER TUBE FAILURES -- LOW AIR FLOW IN A FIN FAN FORCED DRAFT AIR COOLER -- MEASURING AIR FLOW FOR AN AERIAL FIN FAN AERIAL COOLER -- MEASURING COOLING TOWER EFFICIENCY APPROACH TO WET BULB TEMPERATURE -- ADJUSTING HEATER STACK DAMPER FOR OPTIMUM ENERGY EFFICIENCY -- PREVENTING TRAY DUMPING BY USE OF BUBBLE CAP TRAYS -- DEMISTER FOULING IN VAPOR-LIQUID SEPERATOR VESSELS -- EFFECT OF TEMPERATURE ON LIQUID LEVEL INDICATION -- DRAW-OFF NOZZLE CAPACITY LIMITS -- ON-STREAM REPAIR OF TUBE LEAKS IN SURFACE CONDENSER -- WHEN ARE VORTEX BREAKERS REQUIRED? …”
    Libro electrónico
  11. 2051
    Tabla de Contenidos: “…Wong, Sorin Istrail -- Extracting significant sample-specific cancer mutations using their protein interactions / Liviu Badea -- The stream algorithm: Computationally efficient ridge-regression via Bayesian model averaging, and applications to pharmacogenomic prediction of cancer cell line sensitivity / Elias Chaibub Neto ... …”
    Libro electrónico
  12. 2052
    Publicado 2016
    Tabla de Contenidos: “…Ten Versions of `O Lied' -- POEMS AND TRANSLATIONS -- Poems in chronological order (*previously unpublished translation) -- 1848 -- De Mandelbeke -- The Mandel Stream (fragment, Swepstone) -- 1852 -- Aanroepinge -- Reply in Verses (Van Eyken)* -- 1855 -- Boodschap van de vogels en andere opgezette dieren -- Message from the Birds and Other Stuffed Animals (Van Eyken)* -- De averulle en de blomme -- The Cockchafer and the Flower (Vincent)* -- Timpe, tompe, terelink -- Hyder Iddle Diddle Dum (Lovelock)* -- 1857 -- Het schrijverke (Gyrinus natans) -- The Watter-Scriever (Gyrinus natans) (Morgan) -- O'truischen van het ranke riet -- Oh! …”
    Libro electrónico
  13. 2053
    Publicado 2018
    Tabla de Contenidos: “…-- Design patterns -- Dependency Inversion Principle -- Inversion of Control -- Implementing DIP through IoC -- Inverting the interface -- Inverting object creation -- Different ways to invert object creation -- Inversion of object creation through the factory pattern -- Inversion of object creation through service locator -- Dependency injection -- Dependency injection types -- Constructor injection -- Setter injection -- Interface injection -- IoC containers -- Summary -- Chapter 2: Dependency Injection in Java 9 -- Java 9 introduction -- Key features -- Java Platform Module System -- JShell (REPL) - The Java Shell -- JLink - Module Linker -- Multi-release JAR files -- Stream API enhancements -- Stack-walking API -- Immutable collections with convenient factory methods -- HTTP/2.0 support -- Modular Framework in Java 9 -- What is modularity? …”
    Libro electrónico
  14. 2054
    Publicado 2018
    Tabla de Contenidos: “…-- Elixir and Erlang -- Elixir's data types -- Integers -- Floats -- Atoms -- Booleans -- Tuples -- Lists -- Maps -- Binaries -- Strings and charlists -- Other types -- Keyword lists -- Ranges -- MapSets -- Pattern matching -- Pattern matching on tuples -- Pattern matching on lists -- Pattern matching on maps -- Pattern matching on binaries and strings -- Functions and Modules -- Anonymous functions -- Modules and Named Functions -- Module attributes, directives, and uses -- Working with collections -- Looping through recursion -- Eager processing with the Enum module -- Comprehensions -- Lazy processing with the stream module -- Control flow -- if and unless -- cond -- case -- with -- Exceptions -- Typespecs and behaviours -- Typespecs -- Dialyzer -- Behaviours -- Protocols -- Structs -- Bringing structs and protocols together -- Tooling and ecosystems -- IEx -- Mix -- ExUnit -- Erlang interoperability -- Summary -- Chapter 2: Innards of an Elixir Project -- Elixir applications -- Elixir project structure -- Project dependencies -- Umbrella projects -- ElixirDrip - our showcase application -- Using behaviours -- Viewing cross references with xref -- Adopting a consistent coding style -- Summary -- Chapter 3: Processes - The Bedrock of Concurrency and Fault Tolerance -- Inside the BEAM -- Working with processes -- Creating processes -- Message passing between processes -- Building a cache worker -- Detecting errors by linking and monitoring processes -- Using links -- Using monitors -- Recovering from errors with supervisors and supervision trees -- Defining and starting a supervisor -- Streamlined child specs…”
    Libro electrónico
  15. 2055
    Publicado 2018
    Tabla de Contenidos: “…-- Summary -- Chapter 2: Managing EC2 with Systems Manager -- Introducing EC2 Systems Manager -- Getting started with the SSM agent -- Configuring IAM Roles and policies for SSM -- Installing the SSM agent -- Configuring the SSM agent to stream logs to CloudWatch -- Introducing Run Command -- Working with State Manager -- Simplifying instance maintenance using System Manager Automation -- Working with automation documents -- Patching instances using automation -- Triggering automation using CloudWatch schedules and events -- Managing instance patches using patch baseline and compliance -- Getting started with Inventory Management -- Planning your next steps -- Summary -- Chapter 3: Introducing Elastic Beanstalk and Elastic File System -- Introducing Amazon Elastic Beanstalk -- Concepts and terminologies -- Getting started with Elastic Beanstalk -- Creating the Dev environment -- Working with the Elastic Beanstalk CLI -- Understanding the environment dashboard -- Cloning environments -- Configuring the production environment -- Introducing Amazon Elastic File System -- How does it work? …”
    Libro electrónico
  16. 2056
    Publicado 2021
    Tabla de Contenidos: “…Getting hands-on with AWS Glue ETL components -- Querying S3 data using Athena -- Processing real-time data using Kinesis data streams -- Storing and transforming real-time data using Kinesis Data Firehose -- Different ways of ingesting data from on-premises into AWS -- AWS Storage Gateway -- Snowball, Snowball Edge, and Snowmobile -- AWS DataSync -- Processing stored data on AWS -- AWS EMR -- AWS Batch -- Summary -- Questions -- Answers -- Section 3: Data Modeling -- Chapter 7: Applying Machine Learning Algorithms -- Introducing this chapter -- Storing the training data -- A word about ensemble models -- Supervised learning -- Working with regression models -- Working with classification models -- Forecasting models -- Object2Vec -- Unsupervised learning -- Clustering -- Anomaly detection -- Dimensionality reduction -- IP Insights -- Textual analysis -- Blazing Text algorithm -- Sequence-to-sequence algorithm -- Neural Topic Model (NTM) algorithm -- Image processing -- Image classification algorithm -- Semantic segmentation algorithm -- Object detection algorithm -- Summary -- Questions -- Chapter 8: Evaluating and Optimizing Models -- Introducing model evaluation -- Evaluating classification models -- Extracting metrics from a confusion matrix -- Summarizing precision and recall -- Evaluating regression models -- Exploring other regression metrics -- Model optimization -- Grid search -- Summary -- Questions -- Chapter 9: Amazon SageMaker Modeling -- Technical requirements -- Creating notebooks in Amazon SageMaker -- What is Amazon SageMaker? …”
    Libro electrónico
  17. 2057
    Publicado 2017
    Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Author -- About the Reviewers -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: The All New PHP -- Scalar type hints -- Return type hints -- Anonymous classes -- Generator delegation -- Generator return expressions -- The null coalesce operator -- The spaceship operator -- Constant arrays -- Uniform variable syntax -- Throwables -- Group use declarations -- Catching multiple exceptions types -- Class constant visibility modifiers -- Iterable pseudo-type -- Nullable types -- Void return types -- Summary -- Chapter 2: Embracing Standards -- PSR-1 - basic coding standard -- PSR-2 - coding style guide -- PSR-3 - logger interface -- PSR-4 - autoloading standard -- PSR-6 - caching interface -- PSR-7 - HTTP message interface -- PSR-13 - hypermedia links -- Summary -- Chapter 3: Error Handling and Logging -- Error handling -- Error -- ArithmeticError -- DivisionByZeroError -- AssertionError -- ParseError -- TypeError -- Uncaught error handler -- Triggering errors -- Exception -- Creating a custom exception handler -- Rethrowing exceptions -- Uncaught Exception handler -- Logging -- Native logging -- Logging with Monolog -- Summary -- Chapter 4: Magic Behind Magic Methods -- Using __construct() -- Using __destruct() -- Using __call() -- Using __callStatic() -- Using __set() -- Using __get() -- Using __isset() -- Using __unset() -- Using __sleep() -- Using __wakeup() -- Using __toString() -- Using __invoke() -- Using __set_state() -- Using __clone() -- Using __debugInfo() -- Usage statistics across popular platforms -- Summary -- Chapter 5: The Realm of CLI -- Understanding PHP CLI -- The Console component -- Setting up the Console component -- Creating a console command -- Dealing with inputs -- Using Console component helpers -- Input/output streams -- Process control…”
    Libro electrónico
  18. 2058
    Publicado 2017
    Tabla de Contenidos: “…-- Reasons to adapt functional reactive programming -- Reactive Manifesto -- Reactive Streams standard specifications -- Reactive Frameworks for Kotlin -- Getting started with RxKotlin -- Downloading and setting up RxKotlin -- Comparing the pull mechanism with the RxJava push mechanism -- The ReactiveEvenOdd program -- The ReactiveCalculator project -- Summary -- Chapter 2: Functional Programming with Kotlin and RxKotlin -- Introducing functional programming -- Fundamentals of functional programming -- Lambda expressions -- Pure function -- High-order functions -- Inline functions -- Applying functional programming to the ReactiveCalculator class -- Coroutines -- Getting started with coroutines -- Building sequences -- The ReactiveCalculator class with coroutines -- Functional programming - monads -- Single monad -- Summary -- Chapter 3: Observables, Observers, and Subjects -- Observables -- How Observable works -- Understanding the Observable.create method -- Understanding the Observable.from methods -- Understanding the toObservable extension function -- Understanding the Observable.just method -- Other Observable factory methods -- Subscribers - the Observer interface -- Subscribing and disposing -- Hot and Cold Observables -- Cold Observables -- Hot Observables -- Introducing the ConnectableObservable object -- Subjects -- Varieties of Subject -- Understanding AsyncSubject -- Understanding PublishSubject -- Understanding BehaviorSubject -- Understanding ReplaySubject -- Summary -- Chapter 4: Introduction to Backpressure and Flowables -- Understanding backpressure -- Flowable…”
    Libro electrónico
  19. 2059
    Publicado 2017
    Tabla de Contenidos: “…-- Installation of tools -- Node.js -- bacon.js -- RxJS -- Your first code using reactive programming -- Summary -- Chapter 2: Reacting for the First Time -- The bacon.js observables -- Creating our first observable -- Observables from DOM events (asEventStream) -- Observables from promises (fromPromise) -- Observable node event emitter (fromEvent) -- Observables from an array (fromArray) -- Observables from an array (sequentially) -- Observables from an interval (interval) -- Observables from other sources -- Properties -- Changes in an observable -- Reacting to changes -- Subscribing -- Subscribing using the onValue() method -- Subscribing using the log method -- Subscribing using the assign method -- Acting when an error occurs -- Reading how an operator works -- Transforming events using bacon.js -- Reusing observables -- Observables' lazy evaluation -- Summary -- Chapter 3: A World Full of Changes - Reactive Extensions to the Rescue -- RxJS observables -- Difference between bacon.js and RxJS observables -- Hot and cold observables -- Installing RxJS -- Creating an observable -- Creating an observable from iterable objects -- Creating an observable from a sequence factory -- Creating an observable using range () -- Creating an observable using period of time -- Creating an observable from callbacks -- Creating an observable from a promise -- Creating empty observables -- Creating an observable from a single value -- Creating an observable from a factory function -- Creating an observable from arbitrary arguments -- Creating an observable from an error -- Creating observables from DOM events (or EventEmitter)…”
    Libro electrónico
  20. 2060
    Publicado 2012
    Tabla de Contenidos: “…TCP/IP -- Object Exchange Protocol -- vCard/vCal -- Architecture -- Frame Relay Layers -- Architecture of ATM Network -- Physical Layer -- ATM Layer -- Application Adaptation Layer -- AAL1 -- AAL2 -- AAL3/4 -- AAL5 -- Multiple Choice Questions -- Answers -- Unit IV: Network Layer -- Chapter 10: Routing and Congestion Control -- Classful Addressing -- Classless Addressing -- Unicast Routing -- Multicast Routing -- Backpressure -- Choke Packet -- Implicit Congestion Signalling -- Explicit Congestion Signalling -- Multiple choice questions -- Answers -- Chapter 11: Quality of Service and Protocols -- Packet Format of Ipv6 -- Error-reporting Messages -- Query Messages -- Multiple Choice Questions -- Answers -- Unit V: Transport Layer -- Chapter 12: Internet Transport Protocols -- Uses of UDP -- Three-Way Handshaking -- Multiple Choice Questions -- Answers -- Unit VI: Application Layer -- Chapter 13: Application Layer Protocols -- Name Space -- Resource Records -- Name Servers -- Client (Browser) -- Server -- Uniform Resource Locator -- Cookies -- Multiple Choice Questions -- Answers -- Chapter 14: Multimedia -- Using a Web Server -- Using a Web Server with Metafile -- Using a Media Server -- Using a Media Server and Real Time Streaming Protocol (RTSP) -- Multiple Choice Questions -- Answers -- Unit VII: Security -- Chapter 15: Network Security -- Secret Key Cryptography -- Public Key Cryptography -- Substitution Cipher -- Transposition Cipher -- Password Authentication -- Physical Characteristics of User -- Smart Card -- Multiple Choice Questions -- Answers -- Index…”
    Libro electrónico