Books on the topic 'Security protocol'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Security protocol.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Dorgham, Sisalem, ed. SIP security. Chichester, West Sussex, U.K: Wiley, 2009.
Find full textJones, Benjamin Edward. Improving security in the FDDI protocol. Monterey, Calif: Naval Postgraduate School, 1992.
Find full textEric, Vyncke, ed. IPv6 security. Indianapolis, IN: Cisco Systems, 2009.
Find full textUnited Service Institution of India, ed. Integrated maritime security: Governing the ghost protocol. New Delhi: United Service Institution of India, 2014.
Find full textMiller, Derek. The security needs assessment protocol: Improving operational effectiveness through community security. New York: United Nations Institute for Disarmament Research, 2008.
Find full textMiller, Derek. The security needs assessment protocol: Improving operational effectiveness through community security. New York: United Nations Institute for Disarmament Research, 2008.
Find full text1969-, Rudnick Lisa B., and United Nations Institute for Disarmament Research, eds. The security needs assessment protocol: Improving operational effectiveness through community security. New York: United Nations, 2008.
Find full textHehir, Stephen. A security target for the X.435 protocol. Teddington: National Physical Laboratory, 1995.
Find full textKaksonen, Rauli. A functional method for assessing protocol implementation security. Espoo [Finland]: Technical Research Centre of Finland, 2001.
Find full textArmando, Alessandro, and Gavin Lowe, eds. Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16074-5.
Full textCanada. Dept. of External Affairs. Social security: Agreement between Canada and Finland (with protocol). S.l: s.n, 1989.
Find full textTCP/IP: Architcture, protocols, and implementation with IPv6 and IP security. New York: McGraw-Hill, 1998.
Find full textHost Identity Protocol (HIP): Towards the secure mobile Internet. Chichester, West Sussex, England: Wiley, 2008.
Find full textHeld, Gilbert. Managing TCP/IP networks: Techniques, tools, and security considerations. Chichester: Wiley & Sons, 2000.
Find full textK, Gurbani Vijay, ed. Internet and TCP/IP network security: Securing protocols and applications. New York: McGraw-Hill, 1996.
Find full textInternet security protocols: Protecting IP traffic. Upper Saddle River, N.J: Prentice Hall PRT, 2000.
Find full textJake, Kouns, ed. Security in an IPv6 environment. Boca Raton: Auerbach, 2009.
Find full textSecuring storage: A practical guide to SAN and NAS security. Indianapolis, IN: Addison-Wesley, 2005.
Find full textDarroca, Gregorio G. Framework for a Link Layer Packet Filtering (LLPF) security protocol. Monterey, Calif: Naval Postgraduate School, 1998.
Find full textUnited States. Congress. Senate. Committee on Foreign Relations. Airport security protocol: Report (to accompany Treaty Doc. 101-19). [Washington, D.C.?: U.S. G.P.O., 1989.
Find full textRouter Security Strategies: Securing IP Network Traffic Planes. Indianapolis: Cisco Press, 2008.
Find full textThe resurrection protocol: A Jake Ankyer adventure. North Charleston, SC: CreateSpace, 2014.
Find full textBelgium. Social security: Agreement with final protocol, between the United States of America and Belgium, signed at Washington February 19, 1982 and additional protocol and administrative, agreement, signed at Brussels November 23, 1982. Washington, D.C: Dept. of State, 1991.
Find full textBishop, Matt. A security analysis of version 2 of the Network Time Protocol NPT: A report to the Privacy and Security Research Group. [Washington, DC: National Aeronautics and Space Administration, 1991.
Find full textUnited States. National Aeronautics and Space Administration., ed. A security analysis of version 2 of the Network Time Protocol NPT: A report to the Privacy and Security Research Group. [Washington, DC: National Aeronautics and Space Administration, 1991.
Find full textSecuring converged IP networks. Boca Raton, FL: Auerbach Publications, 2007.
Find full textProtocol and security. [Owerri]: IMO State Commission for Women, 1994.
Find full textAutomating Security Protocol Analysis. Storming Media, 2004.
Find full textShoniregun, Charles A. A. Synchronizing Internet Protocol Security. Springer, 2010.
Find full textTechnology, National Institute of Standards and. Border Gateway Protocol Security. CreateSpace Independent Publishing Platform, 2014.
Find full textSchulzrinne, Henning, Dorgham Sisalem, John Floroiu, Jiri Kuthan, and Ulrich Abend. SIP Security. Wiley & Sons, Limited, John, 2009.
Find full textSchulzrinne, Henning, Dorgham Sisalem, John Floroiu, Ulrich Abend, and Jirí Kuthan. Sip Security. Wiley & Sons, Incorporated, John, 2009.
Find full textSynchronizing Internet Protocol Security (SIPSec). Boston, MA: Springer US, 2007. http://dx.doi.org/10.1007/978-0-387-68569-4.
Full textShoniregun, Charles A. Synchronizing Internet Protocol Security (SIPSec). Springer London, Limited, 2007.
Find full textVoice over Internet Protocol (VoIP) Security. Elsevier, 2005. http://dx.doi.org/10.1016/b978-1-55558-332-3.x5000-6.
Full textRittinghouse, PhD CISM John, and PhD, CISM, CISSP, James F. Ransome. Voice over Internet Protocol (VoIP) Security. Digital Press, 2004.
Find full textJohn, Rittinghouse CISM, and Ransome, , CISM, CISSP, James F. Voice over Internet Protocol (VoIP) Security. Elsevier Science & Technology Books, 2005.
Find full textSynchronizing Internet Protocol Security (SIPSec) (Advances in Information Security). Springer, 2007.
Find full textVyncke, Eric, and Scott Hogg. IPv6 Security. Cisco Press, 2008.
Find full textXie, Bin. Heterogeneous Wireless Networks- Networking Protocol to Security. VDM Verlag Dr. Mueller e.K., 2007.
Find full textGoyal, Dinesh, S. Balamurugan, Sheng‐Lung Peng, and O. P. Verma, eds. Design and Analysis of Security Protocol for Communication. Wiley, 2020. http://dx.doi.org/10.1002/9781119555759.
Full textChen, Kefei, and Ling Dong. Cryptographic Protocol: Security Analysis Based on Trusted Freshness. Springer, 2012.
Find full textCryptographic Protocol: Security Analysis Based on Trusted Freshness. Springer London, Limited, 2012.
Find full textChen, Kefei, and Ling Dong. Cryptographic Protocol: Security Analysis Based on Trusted Freshness. Springer, 2012.
Find full textVerma, O. P., Sheng-Lung Peng, Dinesh Goyal, and S. Balamurugan. Design and Analysis of Security Protocol for Communication. Wiley & Sons, Incorporated, John, 2020.
Find full textVerma, O. P., Sheng-Lung Peng, Dinesh Goyal, and S. Balamurugan. Design and Analysis of Security Protocol for Communication. Wiley & Sons, Incorporated, John, 2020.
Find full textDenial of Service Attacks on 802.1X Security Protocol. Storming Media, 2004.
Find full textVerma, O. P., Sheng-Lung Peng, Dinesh Goyal, and S. Balamurugan. Design and Analysis of Security Protocol for Communication. Wiley & Sons, Limited, John, 2020.
Find full textDemystifying the Ipsec Puzzle (Artech House Computer Security Series). Artech House Publishers, 2001.
Find full textAhmed, Sabbir. Vehicle Safety Communication Protocol for Co-Operative Collision Warning : Vehicle Safety Communications : Protocols, Security, and Privacy - Vehicle Safety Communications: Protocols, Security, Privacy. Independently Published, 2019.
Find full text