The Internet Encyclopedia: G-OHossein Bidgoli John Wiley & Sons, 2004 - Internet The definitive, three-volume Internet Encyclopedia covers every aspect of the Internet for professionals. This up-to-date compendium offers a broad perspective on the Internet as a business tool, an IT platform, and a medium for communications and commerce. It presents leading-edge theory and recent developments as described by global experts from such prestigious institutions as Stanford University and Harvard University, and such leading corporations as Microsoft and Sun Microsystems. Key features include: Detailed cross-referencing and extensive references to additional reading More than 200 articles vigorously peer-reviewed by more than 800 academics and practitioners from around the world More than 1,000 illustrations and tables for in-depth understanding of complex subjects Eleven major subject categories that address key issues in design, utilization, and management of Internet-based systems. |
From inside the book
Results 1-3 of 79
Page 324
... layer during transit . L2TP is a pure tunneling protocol , not a security protocol . Adding Security at the Internet Layer The Internet layer ( or network layer ) is the core layer in TCP / IP internetworking . The Internet Protocol ...
... layer during transit . L2TP is a pure tunneling protocol , not a security protocol . Adding Security at the Internet Layer The Internet layer ( or network layer ) is the core layer in TCP / IP internetworking . The Internet Protocol ...
Page 325
... layer traffic at the transport and application layers automati- cally , without requiring higher - layer protocols to do any work or even be aware of this protection . In some applications , dialogues are limited to World Wide Web or at ...
... layer traffic at the transport and application layers automati- cally , without requiring higher - layer protocols to do any work or even be aware of this protection . In some applications , dialogues are limited to World Wide Web or at ...
Page 329
... layer protection , most commonly TLS at the trans- port layer . This ensures that eavesdroppers will not be able to read the user name and password . LDAP version 3 also supports the simple authenti- cation security layer ( SASL ) ...
... layer protection , most commonly TLS at the trans- port layer . This ensures that eavesdroppers will not be able to read the user name and password . LDAP version 3 also supports the simple authenti- cation security layer ( SASL ) ...
Contents
Bruce R Maxim University of MichiganDearborn | 2 |
2223 | 8 |
Travel and Tourism | 17 |
Copyright | |
68 other sections not shown
Other editions - View all
Common terms and phrases
agents allows applications ARPANET behavior browser client communication components connection costs create database datagram digital signatures distributed document e-business e-commerce e-customers e-mail electronic commerce elements employees encryption environment example format functions global groupware host implement interaction interface International Internet Internet protocol intranet inventory IP address IPsec ISDN issues Java JavaBeans JavaScript JavaServer Pages JDBC knowledge language law enforcement Linux ment messages multimedia National netiquette operating system organization packet portals protection protocol References Retrieved router script search engines server servlet specific standards supply chain TCP/IP ternet tion types University UNIX users virtual Web-based World Wide Web XHTML