11.07.2015 Views

ก F ก ก - bls machine

ก F ก ก - bls machine

ก F ก ก - bls machine

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

H. Schulzrinne. May 2000. (Format: TXT=58711 bytes) (Status:INFORMATIONAL)2825 A Tangled Web: Issues of I18N, Domain Names, and the OtherInternet protocols. IAB, L. Daigle, Ed.. May 2000. (Format: TXT=15612bytes) (Status: INFORMATIONAL)2826 IAB Technical Comment on the Unique DNS Root. InternetArchitecture Board. May 2000. (Format: TXT=13400 bytes) (Status:INFORMATIONAL)2827 Network Ingress Filtering: Defeating Denial of Service Attackswhich employ IP Source Address Spoofing. P. Ferguson, D. Senie. May2000. (Format: TXT=21258 bytes) (Obsoletes RFC2267) (Updated byRFC3704) (Also BCP0038) (Status: BEST CURRENT PRACTICE)2828 Internet Security Glossary. R. Shirey. May 2000. (Format:TXT=489292 bytes) (Obsoleted by RFC4949) (Status: INFORMATIONAL)2829 Authentication Methods for LDAP. M. Wahl, H. Alvestrand, J.Hodges, R. Morgan. May 2000. (Format: TXT=33471 bytes) (Obsoleted byRFC4513, RFC4510) (Updated by RFC3377) (Status: PROPOSED STANDARD)2830 Lightweight Directory Access Protocol (v3): Extension forTransport Layer Security. J. Hodges, R. Morgan, M. Wahl. May 2000.(Format: TXT=24469 bytes) (Obsoleted by RFC4511, RFC4513, RFC4510)(Updated by RFC3377) (Status: PROPOSED STANDARD)2831 Using Digest Authentication as a SASL Mechanism. P. Leach, C.Newman. May 2000. (Format: TXT=58124 bytes) (Status: PROPOSEDSTANDARD)

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!