University of Khartoum

Browsing Network Documentation by Title

Browsing Network Documentation by Title

Sort by: Order: Results:

  • Abdul Rahim, Tasneem Omer (University of Khartoum, 2016)
    1- an access control list refers to rules that are applied to port numbers or IP addresses that are available on a host or other layer 3 devices. On some types of proprietary computer hardware (in particular routers and ...
  • محمد حماد خوجلى; Hamad, Mohammed (University of Khartoum, 2016)
    When a device has multiple paths to reach a destination, it always selects one path by preferring it over others. This selection process is termed as Routing. Routing is done by special network devices called routers, a ...
  • ali, Ali Jbraldar mohamed (University of Khartoum, 2016)
    National Security Telecommunications and Information Systems Security Committee (NSTISSC) Network security is the protection of information and systems and hardware that use, store, and transmit that information. Network ...

Search DSpace


My Account