Libros sobre el tema "Mesures de réseau"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores mejores libros para su investigación sobre el tema "Mesures de réseau".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore libros sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Prum, Bernard. Processus sur un réseau et mesures de Gibbs: Applications. Paris: Masson, 1986.
Buscar texto completoLlorens, Cédric. Tableaux de bord de la sécurité réseau. 2a ed. Paris: Eyrolles, 2006.
Buscar texto completoWald und Landschaft Schweiz. Bundesamt für Umwelt. La pollution de l'air: Mesures exécutées à l'aide du Réseau national d'observation des polluants atmosphériques (NABEL). Berne: commande: Office fédéral de l'environnement, des forêts et du paysage, Documentation, 2000.
Buscar texto completoNamin, Catherine. Mesures des effets de réseau sur la contribution individuelle des représentants du personnel à l'intelligence économique du comité d'entreprise européen. Grenoble: A.N.R.T, Université Pierre Mendes France (Grenoble II), 2000.
Buscar texto completoKuruhongsa, Prakan. Optimisation d'un spectomètre de RPE permettant des mesures de T1: Application à la relaxation spin-réseau de Fe³⁺, Co²⁺ et Mn²⁺. Grenoble: A.N.R.T. Université Pierre Mendès France Grenoble 2, 1986.
Buscar texto completoDordoigne, José. Réseaux informatiques: Notions fondamentales : protocoles, architectures, réseaux sans fil, virtualisation, sécurité, IP v6 ... 6a ed. St-Herblain: Éd. ENI, 2015.
Buscar texto completoKartalopoulos, Stamatios V. Security of information and communication networks. Hoboken, N.J: Wiley, 2009.
Buscar texto completoCharles, Miller. Microcomputer and LAN security =: La sécurité des micro-ordinateurs et des réseaux locaux. Hull, Qué: Minister of Government Services Canada = Ministre des services gouvernementaux Canada, 1993.
Buscar texto completoBoutherin, Bernard. Se curiser un re seau Linux. 3a ed. Paris: Eyrolles, 2006.
Buscar texto completoSchneier, Bruce. Cryptographie appliquée: Protocoles, algorithmes et codes sources en C. 2a ed. Paris: Vuibert, 2001.
Buscar texto completoMatthew, McFadden, ed. Defense against the black arts: How hackers do what they do and how to protect against it. Boca Raton, FL: Auerbach Publications, 2011.
Buscar texto completoVinatier, Emmanuel. Hacking. Micro Application, 2003.
Buscar texto completoSecrets and lies: Digital security in a networked world. New York: John Wiley, 2000.
Buscar texto completoMastering Network Security: Protect Your Network Against Advanced Threats, Wi-Fi Attacks, Exploits, and Trackers. Packt Publishing, Limited, 2020.
Buscar texto completoRéseau national de surveillance de la pollution atmosphérique (RNSPA), la qualitde l'air au Canada: Sommaire pour 2001 et analyse des tendances pour 1990-2001. Ottawa, Ont: Environnement Canada, 2004.
Buscar texto completoERIC, A. B. Sécurité Routeur et Commutateur: La Sécurité des Réseaux Informatiques, Besoins de Sécurité et Solutions, Quelque Attaques Sur les Routeurs et Contre-Mesures. Independently Published, 2020.
Buscar texto completoDeLaet, Gert y Gert Schauwers. Network Security Fundamentals. Pearson Education, Limited, 2011.
Buscar texto completoKosiur, David R. Understanding Policy-Based Networking. John Wiley & Sons, 2001.
Buscar texto completoBella, Giampaolo. Formal Correctness of Security Protocols (Information Security and Cryptography). Springer, 2007.
Buscar texto completoPrasad, Ramjee y Leo P. Ligthart. Security Within CONASENSE Paragon. River Publishers, 2022.
Buscar texto completoSimpson, William, Kevin Foltz y Institute For Institute For Defense Analyses. Enterprise Level Security 2: Advanced Topics in an Uncertain World. Taylor & Francis Group, 2020.
Buscar texto completoSimpson, William, Kevin Foltz y Institute For Institute For Defense Analyses. Enterprise Level Security 2: Advanced Topics in an Uncertain World. Taylor & Francis Group, 2020.
Buscar texto completoPrasad, Ramjee y Leo P. Ligthart. Security Within CONASENSE Paragon. River Publishers, 2022.
Buscar texto completoSimpson, William, Kevin Foltz y Institute For Institute For Defense Analyses. Enterprise Level Security 2: Advanced Topics in an Uncertain World. Taylor & Francis Group, 2020.
Buscar texto completoSimpson, William, Kevin Foltz y Institute For Institute For Defense Analyses. Enterprise Level Security 2: Advanced Topics in an Uncertain World. Taylor & Francis Group, 2020.
Buscar texto completoPrasad, Ramjee y Leo P. Ligthart. Security Within CONASENSE Paragon. River Publishers, 2019.
Buscar texto completoPrasad, Ramjee y Leo P. Ligthart. Security Within CONASENSE Paragon. River Publishers, 2022.
Buscar texto completoEnterprise Level Security 2. Taylor & Francis Group, 2020.
Buscar texto completoSecurity Within CONASENSE Paragon. River Publishers, 2019.
Buscar texto completoStephens, Brian y Eric Larson. Administrating Web Servers, Security, & Maintenance Interactive Workbook. Prentice Hall PTR, 1999.
Buscar texto completoStephens, Brian y Eric Larson. Administrating Web Servers, Security, & Maintenance Interactive Workbook. Prentice Hall PTR, 1999.
Buscar texto completoWylder, John. Strategic Information Security. Taylor & Francis Group, 2019.
Buscar texto completoZero Trust Networks: Building Secure Systems in Untrusted Networks. O'Reilly Media, 2017.
Buscar texto completoSecuring Systems: Applied Security Architecture and Threat Models. Taylor & Francis Group, 2015.
Buscar texto completoSchoenfield, Brook S. E. Securing Systems: Applied Security Architecture and Threat Models. Taylor & Francis Group, 2015.
Buscar texto completoSchoenfield, Brook S. E. Securing Systems: Applied Security Architecture and Threat Models. Taylor & Francis Group, 2015.
Buscar texto completoSecurity in Sensor Networks. AUERBACH, 2006.
Buscar texto completoNetwork and Data Security for Non-Engineers. Taylor & Francis Group, 2016.
Buscar texto completoGroom, Frank M. Network and Data Security for Non-Engineers. Taylor & Francis Group, 2017.
Buscar texto completoJones, Stephan S., Frank M. Groom y Kevin Groom. Network and Data Security for Non-Engineers. Auerbach Publishers, Incorporated, 2016.
Buscar texto completoJones, Stephan S., Frank M. Groom y Kevin Groom. Network and Data Security for Non-Engineers. Auerbach Publishers, Incorporated, 2016.
Buscar texto completoKhan, Shafiullah. Security for Multihop Wireless Networks. Taylor & Francis Group, 2014.
Buscar texto completoMauri, Jaime Lloret y Shafiullah Khan. Security for Multihop Wireless Networks. Taylor & Francis Group, 2016.
Buscar texto completoSecurity for Multihop Wireless Networks. Taylor & Francis Group, 2014.
Buscar texto completoNetwork Attacks And Defenses A Handson Approach. Taylor & Francis Ltd, 2012.
Buscar texto completoInsider's Guide to Cyber Security Architecture. Taylor & Francis Group, 2019.
Buscar texto completoSecurity, Privacy and Reliability in Computer Communications and Networks. River Publishers, 2017.
Buscar texto completoPathan, Al-Sakib Khan y Kutub Thakur. Cybersecurity Fundamentals: A Real-World Perspective. Taylor & Francis Group, 2020.
Buscar texto completoPathan, Al-Sakib Khan y Kutub Thakur. Cybersecurity Fundamentals: A Real-World Perspective. Taylor & Francis Group, 2020.
Buscar texto completoSong, Min, Kewei Sha y Aaron Striegel. Security, Privacy and Reliability in Computer Communications and Networks. River Publishers, 2022.
Buscar texto completo