Libros sobre el tema "Mesure du réseau"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores mejores libros para su investigación sobre el tema "Mesure du réseau".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore libros sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Prum, Bernard. Processus sur un réseau et mesures de Gibbs: Applications. Paris: Masson, 1986.
Buscar texto completoLlorens, Cédric. Tableaux de bord de la sécurité réseau. 2a ed. Paris: Eyrolles, 2006.
Buscar texto completoDordoigne, José. Réseaux informatiques: Notions fondamentales : protocoles, architectures, réseaux sans fil, virtualisation, sécurité, IP v6 ... 6a ed. St-Herblain: Éd. ENI, 2015.
Buscar texto completoWald und Landschaft Schweiz. Bundesamt für Umwelt. La pollution de l'air: Mesures exécutées à l'aide du Réseau national d'observation des polluants atmosphériques (NABEL). Berne: commande: Office fédéral de l'environnement, des forêts et du paysage, Documentation, 2000.
Buscar texto completoPaiements électroniques sécurisés. 2a ed. Lausanne: Presses polytechniques et universitaires romanes, 2007.
Buscar texto completoSerge, Springinsfeld, ed. Le guide anti hacker. Paris: Micro Application, 2001.
Buscar texto completo1968-, Blundo Carlo y Cimato Stelvio, eds. Security in communication networks: 4th international conference, SCN 2004, Amalfi, Italy, September 8-10, 2004 : revised selected papers. Berlin: Springer, 2005.
Buscar texto completoI, Ahson S., ed. Information security: A practical approach. Oxford, UK: Alpha Science, 2008.
Buscar texto completoCharles, Miller. Microcomputer and LAN security =: La sécurité des micro-ordinateurs et des réseaux locaux. Hull, Qué: Minister of Government Services Canada = Ministre des services gouvernementaux Canada, 1993.
Buscar texto completoKartalopoulos, Stamatios V. Security of information and communication networks. Hoboken, N.J: Wiley, 2009.
Buscar texto completoSecrets and lies: Digital security in a networked world. New York: John Wiley, 2000.
Buscar texto completoComputer network security: Theory and practice. Berlin: Springer, 2009.
Buscar texto completoExpert Workshop on the Measurement of Social Capital for Public Policy (2004 Ottawa, Ont.). Expert Workshop on the Measurement of Social Capital for Public Policy: Synthesis report = Atelier d'experts sur la mesure de capital social pour des fins de politiques publiques [ressource électronique] : rapport de synthèse. [Ottawa]: Policy Research Initiative = Projet de recherche sur les politiques, 2004.
Buscar texto completoBoutherin, Bernard. Se curiser un re seau Linux. 3a ed. Paris: Eyrolles, 2006.
Buscar texto completoBrian, Stephens, ed. Administrating Web servers, security & maintenance. Upper Saddle River, NJ: Prentice Hall PTR, 2000.
Buscar texto completoPartners, Certification y CIW -- Certified Internet Web Professional, eds. Network technology associate: Student guide. Tempe, AZ: Certification Partners, 2014.
Buscar texto completoSecurity of information and communication networks. Hoboken, N.J: Wiley, 2009.
Buscar texto completoCloud design fundamentals: Cloud design and security for network engineers. Charleston, SC: [CreateSpace], 2015.
Buscar texto completoUnofficial guide to ethical hacking. [S.l.]: Premier Press, 2002.
Buscar texto completoJudy, Novak, ed. Network intrusion detection. 3a ed. Indianapolis, Ind: New Riders Pub., 2002.
Buscar texto completoNetwork intrusion detection: An analyst's handbook. Indianapolis, Ind: New Riders, 1999.
Buscar texto completoJudy, Novak y McLachlan Donald, eds. Network intrusion detection: An analyst's handbook. 2a ed. Indianapolis, Ind: New Riders, 2001.
Buscar texto completoThe parent's handbook for talking with your teens about social media: The right words and effective techniques to get your kids safely on board. Place of publication not identified]: Art of Behavior Change Publications, 2013.
Buscar texto completoSecurity of self-organizing networks: MANET, WSN, WMN, VANET. Boca Raton: Auerbach Publications, 2011.
Buscar texto completoMatthew, McFadden, ed. Defense against the black arts: How hackers do what they do and how to protect against it. Boca Raton, FL: Auerbach Publications, 2011.
Buscar texto completoRéseau national de surveillance de la pollution atmosphérique (RNSPA), la qualitde l'air au Canada: Sommaire pour 2001 et analyse des tendances pour 1990-2001. Ottawa, Ont: Environnement Canada, 2004.
Buscar texto completoVinatier, Emmanuel. Hacking. Micro Application, 2003.
Buscar texto completoKosiur, David R. Understanding Policy-Based Networking. John Wiley & Sons, 2001.
Buscar texto completoDeLaet, Gert y Gert Schauwers. Network Security Fundamentals. Pearson Education, Limited, 2011.
Buscar texto completoNetwork Security Fundamentals. Cisco Press, 2004.
Buscar texto completoSpringer, Claude y Frédérique Longuet. Autour du CECR - Volume complémentaire (2018) : médiation et collaboration. Editions des archives contemporaines, 2021. http://dx.doi.org/10.17184/eac.9782813004055.
Texto completoSurfing Anonymously. Data Becker, 2002.
Buscar texto completoBella, Giampaolo. Formal Correctness of Security Protocols (Information Security and Cryptography). Springer, 2007.
Buscar texto completoPrasad, Ramjee y Leo P. Ligthart. Security Within CONASENSE Paragon. River Publishers, 2022.
Buscar texto completoSimpson, William, Kevin Foltz y Institute For Institute For Defense Analyses. Enterprise Level Security 2: Advanced Topics in an Uncertain World. Taylor & Francis Group, 2020.
Buscar texto completoSimpson, William, Kevin Foltz y Institute For Institute For Defense Analyses. Enterprise Level Security 2: Advanced Topics in an Uncertain World. Taylor & Francis Group, 2020.
Buscar texto completoPrasad, Ramjee y Leo P. Ligthart. Security Within CONASENSE Paragon. River Publishers, 2022.
Buscar texto completoSimpson, William, Kevin Foltz y Institute For Institute For Defense Analyses. Enterprise Level Security 2: Advanced Topics in an Uncertain World. Taylor & Francis Group, 2020.
Buscar texto completoSimpson, William, Kevin Foltz y Institute For Institute For Defense Analyses. Enterprise Level Security 2: Advanced Topics in an Uncertain World. Taylor & Francis Group, 2020.
Buscar texto completoSecurity Within CONASENSE Paragon. River Publishers, 2019.
Buscar texto completoPrasad, Ramjee y Leo P. Ligthart. Security Within CONASENSE Paragon. River Publishers, 2019.
Buscar texto completoPrasad, Ramjee y Leo P. Ligthart. Security Within CONASENSE Paragon. River Publishers, 2022.
Buscar texto completoWylder, John. Strategic Information Security. Taylor & Francis Group, 2019.
Buscar texto completoComputer Network Security. Springer, 2005.
Buscar texto completoSchoenfield, Brook S. E. Securing Systems: Applied Security Architecture and Threat Models. Taylor & Francis Group, 2015.
Buscar texto completoSchoenfield, Brook S. E. Securing Systems: Applied Security Architecture and Threat Models. Taylor & Francis Group, 2015.
Buscar texto completoZero Trust Networks: Building Secure Systems in Untrusted Networks. O'Reilly Media, 2017.
Buscar texto completoSecuring Systems: Applied Security Architecture and Threat Models. Taylor & Francis Group, 2015.
Buscar texto completoStephens, Brian y Eric Larson. Administrating Web Servers, Security, & Maintenance Interactive Workbook. Prentice Hall PTR, 1999.
Buscar texto completoStephens, Brian y Eric Larson. Administrating Web Servers, Security, & Maintenance Interactive Workbook. Prentice Hall PTR, 1999.
Buscar texto completo