英語 での Network protocols の使用例とその 日本語 への翻訳
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
-
Programming
Rationale: Broken network protocols can easily stand-out in IDS filters and network analysis.
Network protocols implemented with NetBIOS are IPX from Novell™(NetBIOS via TCP/IP) and TCP/IP.
One or more network protocols are missing on this computer”.
It says something like“One or more network protocols are missing from this computer.”.
Fully transparent to Ethernet, IP and other network protocols, it provides the very highest levels of performance and security in combination.
These network protocols do not provide the direct disk access required by Disk Drill.
As with a conventional Ethernet interface, this is done using standard network protocols.
It is not a single network protocol, but a family of network protocols that offer various services.
Like with the usual Ethernet interface, this is done using standard network protocols.
Applications that send information via XML documents use the same Internet network protocols that traditional security products monitor.
The two components communicate with one another using the TCP and/or UDP network protocols.
Some of the communication domains supported by the socket IPC mechanism provide access to network protocols.
The course is suitable for IT or Industrial Automation professionals who have knowledge of operating systems, network protocols, programming languages, hardware and software.
Although the NetBIOS naming protocol can be used with network protocols other than TCP/IP(such as NetBEUI or IPX/SPX), WINS was designed specifically to support NetBIOS over TCP/IP(NetBT).
Although the NetBIOS naming protocol can be used with network protocols other than TCP/IP, WINS was designed specifically to support NetBIOS over TCP/IP(NetBT).
Although NetBIOS and NetBIOS names can be used with network protocols other than TCP/IP, WINS was designed specifically to support NetBIOS over TCP/IP(NetBT).
If a package primarily serves to interoperate with hardware or network protocols, and the interface changes, then a package may be rebased if necessary.
INTRODUCTION The authentication requirements of computing systems and network protocols vary greatly with their intended use, accessibility, and their network connectivity.
Identity Management covers issues such as how users gain an identity, the protection of that identity and the technologies supporting that protection(e.g. network protocols, digital certificates, passwords, etc.).
Identity and Access Management covers issues such as how users gain an Digital Identity, the protection of that identity and the technologies supporting that protection(e.g., network protocols, digital certificates, passwords, etc.).