University of Khartoum

Browsing Network Documentation by Issue Date

Browsing Network Documentation by Issue Date

Sort by: Order: Results:

  • Abdul Rahim, Tasneem Omer (University of Khartoum, 2016)
    1- an access control list refers to rules that are applied to port numbers or IP addresses that are available on a host or other layer 3 devices. On some types of proprietary computer hardware (in particular routers and ...
  • ali, Ali Jbraldar mohamed (University of Khartoum, 2016)
    National Security Telecommunications and Information Systems Security Committee (NSTISSC) Network security is the protection of information and systems and hardware that use, store, and transmit that information. Network ...
  • محمد حماد خوجلى; Hamad, Mohammed (University of Khartoum, 2016)
    When a device has multiple paths to reach a destination, it always selects one path by preferring it over others. This selection process is termed as Routing. Routing is done by special network devices called routers, a ...

Search DSpace


My Account