Books on the topic 'Secured transmission'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 25 books for your research on the topic 'Secured transmission.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Kotfila, David A. CCNP implementing secured converged WANs (ISCW 642-825) lab portfolio. Indianapolis, Ind: Cisco Press, 2008.
Find full textKotfila, David A. CCNP implementing secured converged WANs (ISCW 642-825) lab portfolio. Indianapolis, IN: Cisco Press, 2008.
Find full textShankar, K., and Mohamed Elhoseny. Secure Image Transmission in Wireless Sensor Network (WSN) Applications. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-20816-5.
Full textWu, Gilbert S. K. SGML support for secure document systems. Boston Spa: British Library Research and Development Department, 1994.
Find full textWade, Edwards, ed. CCSP: Secure PIX and secure VPN study guide. San Francisco, Calif: SYBEX, 2004.
Find full textK, Kokula Krishna Hari, ed. Secure Data Transmission through Trusted Node in Mantes using AODV Routing Algorithm: SATEM: ICCS 2014. Bangkok, Thailand: Association of Scientists, Developers and Faculties, 2014.
Find full text1967-, Barthe Gilles, ed. Construction and analysis of safe, secure, and interoperable smart devices: International workshop, CASSIS 2004, Marseille, France, March 10-14, 2004 : revised selected papers. Berlin: Springer, 2005.
Find full text1967-, Barthe Gilles, ed. Construction and analysis of safe, secure, and interoperable smart devices: Second international workshop, CASSIS 2005, Nice, France, March 8-11, 2005 : revised selected papers. Berlin: Springer, 2006.
Find full textCCNP Implementing Secured Converged WANs (ISCW 642-825) Lab Portfolio (Cisco Networking Academy Program) (Lab Companion). Cisco Press, 2008.
Find full textShankar, K., and Mohamed Elhoseny. Secure Image Transmission in Wireless Sensor Network Applications. Springer, 2019.
Find full textStaff, Tsinghua University Press, and Kehui Sun. Chaotic Secure Communication: Principles and Technologies. De Gruyter, Inc., 2016.
Find full textTsinghua University Tsinghua University Press and Kehui Sun. Chaotic Secure Communication: Principles and Technologies. de Gruyter GmbH, Walter, 2016.
Find full textTsinghua University Tsinghua University Press and Kehui Sun. Chaotic Secure Communication: Principles and Technologies. de Gruyter GmbH, Walter, 2016.
Find full textShankar, K., and Mohamed Elhoseny. Secure Image Transmission in Wireless Sensor Network (WSN) Applications. Springer International Publishing AG, 2020.
Find full textXu, Chang, Liehuang Zhu, and Zijian Zhang. Secure and Privacy-Preserving Data Communication in Internet of Things. Springer, 2017.
Find full textXu, Chang, Liehuang Zhu, and Zijian Zhang. Secure and Privacy-Preserving Data Communication in Internet of Things. Springer, 2017.
Find full textXu, Chang, Liehuang Zhu, and Zijian Zhang. Secure and Privacy-Preserving Data Communication in Internet of Things. Springer, 2017.
Find full textChen, Min. The Internet Hacker's Handbook: Twenty Tips for Secure Data Transmission. Casino Forum, 1994.
Find full textMishra, Charit. Wireshark 2 Quick Start Guide: Secure your network through protocol analysis. Packt Publishing, 2018.
Find full textSecure Communications: Applications and Management. Wiley, 2002.
Find full textGough, Michael. Video Conferencing Over IP: Configure, Secure, and Troubleshoot. Syngress, 2006.
Find full textEngineers, Institution of Electrical. How Secure Are Britain's Electricity Supplies?: Thursday, 13 May 2004, the Iee, Savoy Place, London Wc2r 0bl. Institution of Electrical Engineers, 2004.
Find full textEDI and the law 90: Making paperless trade legally secure : proceedingsof the conference held in London, November 1990. Pinner: Blenheim Online, 1990.
Find full textQuinn, Eric, Wade Edwards, Tom Lancaster, Jason Rohm, Bryant Tow, Wade Edwards, and Tom Lancaster. CCSP: Secure PIX and Secure VPN Study Guide (642-521 and 642-511). Sybex, 2003.
Find full text(Editor), Gilles Barthe, Lilian Burdy (Editor), Marieke Huisman (Editor), Jean-Louis Lanet (Editor), and Traian Muntean (Editor), eds. Construction and Analysis of Safe, Secure, and Interoperable Smart Devices: International Workshop, CASSIS 2004, Marseille, France, March 10-14, 2004, ... Papers (Lecture Notes in Computer Science). Springer, 2005.
Find full text