default search action
International Journal of Network Management, Volume 5
Volume 5, Number 1, January / February 1995
- Warren S. Meyers:
The Evolution of a Network - A Case Study of Network Development at John Wiley & Sons. 3-12 - Jesper Nilausen:
Token ring network management: Change management. 13-18 - Lew Shepherdson:
Empowering Net Ware With REXX. 19-24 - Olga Havel, Ahmed Patel:
Design and Implementation of a Composite Performance Evaluation Model for Heterogeneous Network Management Applications. 25-46 - Jesper Nilausen:
Token ring network management: Performance management. 47-53
- Gilbert Held:
Hardware Test Drive. 54-55
Volume 5, Number 2, March / April 1995
- William R. McCarthy:
Cableless LANs: An emerging technology. 59-65 - U. Heister, Ulrich Killat:
Private and Authentic Communication in Passive Optical Networks. 66-76 - Katherine Jones:
Contingency Planning in LAN/WAN Environments. 77-81 - Saad Haj Bakry, Abdullah Al-Dhelaan, Abdulaziz Al-Muammar:
A Mathematical Model for the Investigations of Access Demands on Information Networks with Applications. 82-94 - Matthew Bauer:
International virtual private networks: Background and tariff survey. 95-99 - Nathan J. Muller:
Managing Desktop Assets. 100-111
Volume 5, Number 3, May / June 1995
- Hasan Taher, Saad Haj Bakry, Abdullah Al-Dhelaan, Abdulaziz Al-Muammar:
Information networks awareness and utilization issues: The case of gulfnet. 115-120 - Bob Jackson:
Do You Know Where Your Networks Are? 121-126 - Alexander Clemm:
Adding value to MIBs: A relationship layer for management platforms. 127-137 - Katharine Jones:
Managing Diverse Environments with CA-UNICENTER for UNIX. 138-156 - Gilbert Held:
Considering Equipment and Transmission Availability Levels. 157-170
Volume 5, Number 4, July / August 1995
- Ray Sarch:
From the Associate Editor. 173
- Hal Byron Becker:
Disaster recovery long-range planning: A mandatory evolution for protecting data. 174-180 - Cynthia K. Nachsin:
The World Trade Center Disaster and the Lessons Learned. 181-184 - John E. Nevola:
How Safe is Your Data Center? 185-187
- Rebecca Herold:
A Corporate Anti-Virus Strategy. 189-192
- Steven J. Ross:
Is It Security or Disaster Recovery? Who Cares? 193-197 - David Banes:
Security and the Enterprise Network. 198-206 - Al Berman:
Planning Disaster Recovery Protection. 207-213 - Dale G. Peterson:
A new era in data network security: Protocol-sensitive encryption. 214-218 - Richard E. Smith:
Sidewinder: Defense in depth using type enforcement. 219-229 - Gregory P. Cline:
Internet Firewall Servers Address Burning Corporate Security Issues. 230-232
Volume 5, Number 5, September / October 1995
- Gilbert Held:
Considering Cyberliability. 233-234
- Nathan J. Muller:
Managing the Enterprise Network with LightWatch/Open. 235-248 - Jesper Nilausen:
APPN - An Introduction. 249-256 - Anno Haca, Veronique Yur:
Architecture and Performance Comparison of High-speed Switch Networks. 257-273 - Hamad Al-Sulaiym, Abdulaziz Al-Muammar, Saad Haj Bakry:
GULFNET: The academic network of the arab gulf countries. 274-284
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.