- DHCP Enforcement
- Майкрософт: обеспечение работоспособности DHCP
Универсальный англо-русский словарь. Академик.ру. 2011.
Универсальный англо-русский словарь. Академик.ру. 2011.
802.1D — 7 7 6 6 5 … Deutsch Wikipedia
Bridge (Netzwerk) — 7 7 6 6 5 … Deutsch Wikipedia
IEEE 802.1D — 7 7 6 6 5 … Deutsch Wikipedia
Netzwerkbrücke — 7 7 6 6 5 … Deutsch Wikipedia
Proxy Mobile IPv6 — (or PMIPv6, or PMIP) is a network based mobility management protocol standardized by IETF and is specified in RFC 5213. It is a protocol for building a common and access technology independent of mobile core networks, accommodating various access … Wikipedia
Section summary of the USA PATRIOT Act, Title II — President George W. Bush gestures as he addresses an audience Wednesday, July 20, 2005 at the Port of Baltimore in Baltimore, Md., encouraging the renewal of provisions of the Patriot Act. The following is a section summary of the USA PATRIOT Act … Wikipedia
Network Access Protection — (NAP) is a Microsoft technology for controlling network access of a computer host based on the system health of the host, first introduced in Windows Server 2008. With Network Access Protection, system administrators of an organization s computer … Wikipedia
Network Admission Control — (NAC) refers to Cisco s version of Network Access Control, which restricts access to the network based on identity or security posture. When a network device (switch, router, wireless access point, DHCP server, etc.) is configured for NAC, it can … Wikipedia
Security and safety features new to Windows Vista — There are a number of security and safety features new to Windows Vista, most of which are not available in any prior Microsoft Windows operating system release.Beginning in early 2002 with Microsoft s announcement of their Trustworthy Computing… … Wikipedia
Common Open Policy Service — Internet protocol suite Application layer BGP DHCP DNS FTP HTTP … Wikipedia
Captive portal — The captive portal technique forces an HTTP client on a network to see a special web page (usually for authentication purposes) before surfing the Internet normally. A captive portal turns a Web browser into an authentication device. [http://wiki … Wikipedia