Microsoft

10. 3.1.5 Timer Events. 11. 3.1.6 Other Local Events. 11. 4 Protocol Examples 12. 5 Security 13. 5.1 Security Considerations for Implementers. 13. 5.2 Index of Security Parameters. 13. 6 Appendix A: Full IDL 14. 7 Appendix B: Product Behavior 15. 8 Change Tracking 17. 9 Index 20 1 Introduction. This document describes the . address book ................
................