Libros sobre el tema "Secured transmission"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 25 mejores mejores libros para su investigación sobre el tema "Secured transmission".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore libros sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Kotfila, David A. CCNP implementing secured converged WANs (ISCW 642-825) lab portfolio. Indianapolis, Ind: Cisco Press, 2008.
Buscar texto completoKotfila, David A. CCNP implementing secured converged WANs (ISCW 642-825) lab portfolio. Indianapolis, IN: Cisco Press, 2008.
Buscar texto completoShankar, K. y Mohamed Elhoseny. Secure Image Transmission in Wireless Sensor Network (WSN) Applications. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-20816-5.
Texto completoWu, Gilbert S. K. SGML support for secure document systems. Boston Spa: British Library Research and Development Department, 1994.
Buscar texto completoWade, Edwards, ed. CCSP: Secure PIX and secure VPN study guide. San Francisco, Calif: SYBEX, 2004.
Buscar texto completoK, Kokula Krishna Hari, ed. Secure Data Transmission through Trusted Node in Mantes using AODV Routing Algorithm: SATEM: ICCS 2014. Bangkok, Thailand: Association of Scientists, Developers and Faculties, 2014.
Buscar texto completo1967-, Barthe Gilles, ed. Construction and analysis of safe, secure, and interoperable smart devices: International workshop, CASSIS 2004, Marseille, France, March 10-14, 2004 : revised selected papers. Berlin: Springer, 2005.
Buscar texto completo1967-, Barthe Gilles, ed. Construction and analysis of safe, secure, and interoperable smart devices: Second international workshop, CASSIS 2005, Nice, France, March 8-11, 2005 : revised selected papers. Berlin: Springer, 2006.
Buscar texto completoCCNP Implementing Secured Converged WANs (ISCW 642-825) Lab Portfolio (Cisco Networking Academy Program) (Lab Companion). Cisco Press, 2008.
Buscar texto completoShankar, K. y Mohamed Elhoseny. Secure Image Transmission in Wireless Sensor Network Applications. Springer, 2019.
Buscar texto completoStaff, Tsinghua University Press y Kehui Sun. Chaotic Secure Communication: Principles and Technologies. De Gruyter, Inc., 2016.
Buscar texto completoTsinghua University Tsinghua University Press y Kehui Sun. Chaotic Secure Communication: Principles and Technologies. de Gruyter GmbH, Walter, 2016.
Buscar texto completoTsinghua University Tsinghua University Press y Kehui Sun. Chaotic Secure Communication: Principles and Technologies. de Gruyter GmbH, Walter, 2016.
Buscar texto completoShankar, K. y Mohamed Elhoseny. Secure Image Transmission in Wireless Sensor Network (WSN) Applications. Springer International Publishing AG, 2020.
Buscar texto completoXu, Chang, Liehuang Zhu y Zijian Zhang. Secure and Privacy-Preserving Data Communication in Internet of Things. Springer, 2017.
Buscar texto completoXu, Chang, Liehuang Zhu y Zijian Zhang. Secure and Privacy-Preserving Data Communication in Internet of Things. Springer, 2017.
Buscar texto completoXu, Chang, Liehuang Zhu y Zijian Zhang. Secure and Privacy-Preserving Data Communication in Internet of Things. Springer, 2017.
Buscar texto completoChen, Min. The Internet Hacker's Handbook: Twenty Tips for Secure Data Transmission. Casino Forum, 1994.
Buscar texto completoMishra, Charit. Wireshark 2 Quick Start Guide: Secure your network through protocol analysis. Packt Publishing, 2018.
Buscar texto completoSecure Communications: Applications and Management. Wiley, 2002.
Buscar texto completoGough, Michael. Video Conferencing Over IP: Configure, Secure, and Troubleshoot. Syngress, 2006.
Buscar texto completoEngineers, Institution of Electrical. How Secure Are Britain's Electricity Supplies?: Thursday, 13 May 2004, the Iee, Savoy Place, London Wc2r 0bl. Institution of Electrical Engineers, 2004.
Buscar texto completoEDI and the law 90: Making paperless trade legally secure : proceedingsof the conference held in London, November 1990. Pinner: Blenheim Online, 1990.
Buscar texto completoQuinn, Eric, Wade Edwards, Tom Lancaster, Jason Rohm, Bryant Tow, Wade Edwards y Tom Lancaster. CCSP: Secure PIX and Secure VPN Study Guide (642-521 and 642-511). Sybex, 2003.
Buscar texto completo(Editor), Gilles Barthe, Lilian Burdy (Editor), Marieke Huisman (Editor), Jean-Louis Lanet (Editor) y Traian Muntean (Editor), eds. Construction and Analysis of Safe, Secure, and Interoperable Smart Devices: International Workshop, CASSIS 2004, Marseille, France, March 10-14, 2004, ... Papers (Lecture Notes in Computer Science). Springer, 2005.
Buscar texto completo