4 Access Right Types=_A58_articles_Access_Right_Types
4 Toying with Security=_A58_articles_Toying_with_Security
4 Setting Up Your Hardware=_A58_articles_Setting_Up_Your_Hardware
4 The Secret of Logging On=_A58_articles_The_Secret_of_Logging_On
4 Using the Sample Application Suite=_A58_articles_Using_the_Sample_Application_Suite
4 Server side=_A58_articles_Server_side
4 Client side=_A58_articles_Client_side
4 More Security. . .=_A58_articles_More_Security._._.
4 Summary=_A58_articles_Summary
3 Developing Transport-independent Applications Using the Windows Sockets Interface
4 Developing Transport-independent Applications Using the Windows Sockets Interface=_A59_articles_Developing_Transport_independent_Applications_Using_the_Windows_Sockets_Interface
4 Introduction=_A59_articles_Introduction
4 The Birth of Windows Sockets...=_A59_articles_The_Birth_of_Windows_Sockets...
4 Windows Sockets Architectures=_A59_articles_Windows_Sockets_Architectures
4 Windows Sockets in Windows NT=_A59_articles_Windows_Sockets_in_WindowsNT
4 Windows Sockets in Chicago=_A59_articles_Windows_Sockets_in_Chicago
4 The Sockets Paradigm=_A59_articles_The_Sockets_Paradigm
4 Stream vs. Datagram Sockets=_A59_articles_Stream_vs._Datagram_Sockets