Books on the topic 'Security protocol'

To see the other types of publications on this topic, follow the link: Security protocol.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Security protocol.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Dorgham, Sisalem, ed. SIP security. Chichester, West Sussex, U.K: Wiley, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jones, Benjamin Edward. Improving security in the FDDI protocol. Monterey, Calif: Naval Postgraduate School, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Eric, Vyncke, ed. IPv6 security. Indianapolis, IN: Cisco Systems, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

United Service Institution of India, ed. Integrated maritime security: Governing the ghost protocol. New Delhi: United Service Institution of India, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Miller, Derek. The security needs assessment protocol: Improving operational effectiveness through community security. New York: United Nations Institute for Disarmament Research, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Miller, Derek. The security needs assessment protocol: Improving operational effectiveness through community security. New York: United Nations Institute for Disarmament Research, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

1969-, Rudnick Lisa B., and United Nations Institute for Disarmament Research, eds. The security needs assessment protocol: Improving operational effectiveness through community security. New York: United Nations, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hehir, Stephen. A security target for the X.435 protocol. Teddington: National Physical Laboratory, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kaksonen, Rauli. A functional method for assessing protocol implementation security. Espoo [Finland]: Technical Research Centre of Finland, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Armando, Alessandro, and Gavin Lowe, eds. Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16074-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Canada. Dept. of External Affairs. Social security: Agreement between Canada and Finland (with protocol). S.l: s.n, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

TCP/IP: Architcture, protocols, and implementation with IPv6 and IP security. New York: McGraw-Hill, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Host Identity Protocol (HIP): Towards the secure mobile Internet. Chichester, West Sussex, England: Wiley, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Held, Gilbert. Managing TCP/IP networks: Techniques, tools, and security considerations. Chichester: Wiley & Sons, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

K, Gurbani Vijay, ed. Internet and TCP/IP network security: Securing protocols and applications. New York: McGraw-Hill, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Internet security protocols: Protecting IP traffic. Upper Saddle River, N.J: Prentice Hall PRT, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Jake, Kouns, ed. Security in an IPv6 environment. Boca Raton: Auerbach, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Securing storage: A practical guide to SAN and NAS security. Indianapolis, IN: Addison-Wesley, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Darroca, Gregorio G. Framework for a Link Layer Packet Filtering (LLPF) security protocol. Monterey, Calif: Naval Postgraduate School, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

United States. Congress. Senate. Committee on Foreign Relations. Airport security protocol: Report (to accompany Treaty Doc. 101-19). [Washington, D.C.?: U.S. G.P.O., 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Router Security Strategies: Securing IP Network Traffic Planes. Indianapolis: Cisco Press, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

The resurrection protocol: A Jake Ankyer adventure. North Charleston, SC: CreateSpace, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Belgium. Social security: Agreement with final protocol, between the United States of America and Belgium, signed at Washington February 19, 1982 and additional protocol and administrative, agreement, signed at Brussels November 23, 1982. Washington, D.C: Dept. of State, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Bishop, Matt. A security analysis of version 2 of the Network Time Protocol NPT: A report to the Privacy and Security Research Group. [Washington, DC: National Aeronautics and Space Administration, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

United States. National Aeronautics and Space Administration., ed. A security analysis of version 2 of the Network Time Protocol NPT: A report to the Privacy and Security Research Group. [Washington, DC: National Aeronautics and Space Administration, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Securing converged IP networks. Boca Raton, FL: Auerbach Publications, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Protocol and security. [Owerri]: IMO State Commission for Women, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Automating Security Protocol Analysis. Storming Media, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Shoniregun, Charles A. A. Synchronizing Internet Protocol Security. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Technology, National Institute of Standards and. Border Gateway Protocol Security. CreateSpace Independent Publishing Platform, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Schulzrinne, Henning, Dorgham Sisalem, John Floroiu, Jiri Kuthan, and Ulrich Abend. SIP Security. Wiley & Sons, Limited, John, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Schulzrinne, Henning, Dorgham Sisalem, John Floroiu, Ulrich Abend, and Jirí Kuthan. Sip Security. Wiley & Sons, Incorporated, John, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Synchronizing Internet Protocol Security (SIPSec). Boston, MA: Springer US, 2007. http://dx.doi.org/10.1007/978-0-387-68569-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Shoniregun, Charles A. Synchronizing Internet Protocol Security (SIPSec). Springer London, Limited, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Voice over Internet Protocol (VoIP) Security. Elsevier, 2005. http://dx.doi.org/10.1016/b978-1-55558-332-3.x5000-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Rittinghouse, PhD CISM John, and PhD, CISM, CISSP, James F. Ransome. Voice over Internet Protocol (VoIP) Security. Digital Press, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

John, Rittinghouse CISM, and Ransome, , CISM, CISSP, James F. Voice over Internet Protocol (VoIP) Security. Elsevier Science & Technology Books, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Synchronizing Internet Protocol Security (SIPSec) (Advances in Information Security). Springer, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Vyncke, Eric, and Scott Hogg. IPv6 Security. Cisco Press, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Xie, Bin. Heterogeneous Wireless Networks- Networking Protocol to Security. VDM Verlag Dr. Mueller e.K., 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Goyal, Dinesh, S. Balamurugan, Sheng‐Lung Peng, and O. P. Verma, eds. Design and Analysis of Security Protocol for Communication. Wiley, 2020. http://dx.doi.org/10.1002/9781119555759.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Chen, Kefei, and Ling Dong. Cryptographic Protocol: Security Analysis Based on Trusted Freshness. Springer, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Cryptographic Protocol: Security Analysis Based on Trusted Freshness. Springer London, Limited, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Chen, Kefei, and Ling Dong. Cryptographic Protocol: Security Analysis Based on Trusted Freshness. Springer, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Verma, O. P., Sheng-Lung Peng, Dinesh Goyal, and S. Balamurugan. Design and Analysis of Security Protocol for Communication. Wiley & Sons, Incorporated, John, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Verma, O. P., Sheng-Lung Peng, Dinesh Goyal, and S. Balamurugan. Design and Analysis of Security Protocol for Communication. Wiley & Sons, Incorporated, John, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Denial of Service Attacks on 802.1X Security Protocol. Storming Media, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Verma, O. P., Sheng-Lung Peng, Dinesh Goyal, and S. Balamurugan. Design and Analysis of Security Protocol for Communication. Wiley & Sons, Limited, John, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Demystifying the Ipsec Puzzle (Artech House Computer Security Series). Artech House Publishers, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Ahmed, Sabbir. Vehicle Safety Communication Protocol for Co-Operative Collision Warning : Vehicle Safety Communications : Protocols, Security, and Privacy - Vehicle Safety Communications: Protocols, Security, Privacy. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography