Hasil (
Bahasa Indonesia) 1:
[Salinan]Disalin!
xii CONTENTSAppendix F TCP/IP Protocol ArchitectureF.1 TCP/IP LayersF.2 TCP and UDPF.3 Operation of TCP/IPF.4 TCP/IP ApplicationsAppendix G Radix-64 ConversionAppendix H Security Policy-Related DocumentsH.1 A Company’s Physical and Environmental Security PolicyH.2 Security Policy Standard of Good PracticeH.3 Security Awareness Standard of Good PracticeH.4 Information Privacy Standard of Good PracticeH.5 Incident Handling Standard of Good PracticeAppendix I The Domain Name SystemI.1 Domain NamesI.2 The DNS DatabaseI.3 DNS OperationAppendix J The Base-Rate FallacyJ.1 Conditional Probability and IndependenceJ.2 Bayes’ TheoremJ.3 The Base-Rate Fallacy DemonstratedAppendix K Glossary
Sedang diterjemahkan, harap tunggu..
