Libros sobre el tema "Security protocol"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores mejores libros para su investigación sobre el tema "Security protocol".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore libros sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Dorgham, Sisalem, ed. SIP security. Chichester, West Sussex, U.K: Wiley, 2009.
Buscar texto completoJones, Benjamin Edward. Improving security in the FDDI protocol. Monterey, Calif: Naval Postgraduate School, 1992.
Buscar texto completoEric, Vyncke, ed. IPv6 security. Indianapolis, IN: Cisco Systems, 2009.
Buscar texto completoUnited Service Institution of India, ed. Integrated maritime security: Governing the ghost protocol. New Delhi: United Service Institution of India, 2014.
Buscar texto completoMiller, Derek. The security needs assessment protocol: Improving operational effectiveness through community security. New York: United Nations Institute for Disarmament Research, 2008.
Buscar texto completoMiller, Derek. The security needs assessment protocol: Improving operational effectiveness through community security. New York: United Nations Institute for Disarmament Research, 2008.
Buscar texto completo1969-, Rudnick Lisa B. y United Nations Institute for Disarmament Research, eds. The security needs assessment protocol: Improving operational effectiveness through community security. New York: United Nations, 2008.
Buscar texto completoHehir, Stephen. A security target for the X.435 protocol. Teddington: National Physical Laboratory, 1995.
Buscar texto completoKaksonen, Rauli. A functional method for assessing protocol implementation security. Espoo [Finland]: Technical Research Centre of Finland, 2001.
Buscar texto completoArmando, Alessandro y Gavin Lowe, eds. Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16074-5.
Texto completoCanada. Dept. of External Affairs. Social security: Agreement between Canada and Finland (with protocol). S.l: s.n, 1989.
Buscar texto completoTCP/IP: Architcture, protocols, and implementation with IPv6 and IP security. New York: McGraw-Hill, 1998.
Buscar texto completoHost Identity Protocol (HIP): Towards the secure mobile Internet. Chichester, West Sussex, England: Wiley, 2008.
Buscar texto completoHeld, Gilbert. Managing TCP/IP networks: Techniques, tools, and security considerations. Chichester: Wiley & Sons, 2000.
Buscar texto completoK, Gurbani Vijay, ed. Internet and TCP/IP network security: Securing protocols and applications. New York: McGraw-Hill, 1996.
Buscar texto completoInternet security protocols: Protecting IP traffic. Upper Saddle River, N.J: Prentice Hall PRT, 2000.
Buscar texto completoJake, Kouns, ed. Security in an IPv6 environment. Boca Raton: Auerbach, 2009.
Buscar texto completoSecuring storage: A practical guide to SAN and NAS security. Indianapolis, IN: Addison-Wesley, 2005.
Buscar texto completoDarroca, Gregorio G. Framework for a Link Layer Packet Filtering (LLPF) security protocol. Monterey, Calif: Naval Postgraduate School, 1998.
Buscar texto completoUnited States. Congress. Senate. Committee on Foreign Relations. Airport security protocol: Report (to accompany Treaty Doc. 101-19). [Washington, D.C.?: U.S. G.P.O., 1989.
Buscar texto completoRouter Security Strategies: Securing IP Network Traffic Planes. Indianapolis: Cisco Press, 2008.
Buscar texto completoThe resurrection protocol: A Jake Ankyer adventure. North Charleston, SC: CreateSpace, 2014.
Buscar texto completoBelgium. Social security: Agreement with final protocol, between the United States of America and Belgium, signed at Washington February 19, 1982 and additional protocol and administrative, agreement, signed at Brussels November 23, 1982. Washington, D.C: Dept. of State, 1991.
Buscar texto completoBishop, Matt. A security analysis of version 2 of the Network Time Protocol NPT: A report to the Privacy and Security Research Group. [Washington, DC: National Aeronautics and Space Administration, 1991.
Buscar texto completoUnited States. National Aeronautics and Space Administration., ed. A security analysis of version 2 of the Network Time Protocol NPT: A report to the Privacy and Security Research Group. [Washington, DC: National Aeronautics and Space Administration, 1991.
Buscar texto completoSecuring converged IP networks. Boca Raton, FL: Auerbach Publications, 2007.
Buscar texto completoProtocol and security. [Owerri]: IMO State Commission for Women, 1994.
Buscar texto completoAutomating Security Protocol Analysis. Storming Media, 2004.
Buscar texto completoShoniregun, Charles A. A. Synchronizing Internet Protocol Security. Springer, 2010.
Buscar texto completoTechnology, National Institute of Standards and. Border Gateway Protocol Security. CreateSpace Independent Publishing Platform, 2014.
Buscar texto completoSchulzrinne, Henning, Dorgham Sisalem, John Floroiu, Jiri Kuthan y Ulrich Abend. SIP Security. Wiley & Sons, Limited, John, 2009.
Buscar texto completoSchulzrinne, Henning, Dorgham Sisalem, John Floroiu, Ulrich Abend y Jirí Kuthan. Sip Security. Wiley & Sons, Incorporated, John, 2009.
Buscar texto completoSynchronizing Internet Protocol Security (SIPSec). Boston, MA: Springer US, 2007. http://dx.doi.org/10.1007/978-0-387-68569-4.
Texto completoShoniregun, Charles A. Synchronizing Internet Protocol Security (SIPSec). Springer London, Limited, 2007.
Buscar texto completoVoice over Internet Protocol (VoIP) Security. Elsevier, 2005. http://dx.doi.org/10.1016/b978-1-55558-332-3.x5000-6.
Texto completoRittinghouse, PhD CISM John y PhD, CISM, CISSP, James F. Ransome. Voice over Internet Protocol (VoIP) Security. Digital Press, 2004.
Buscar texto completoJohn, Rittinghouse CISM y Ransome, , CISM, CISSP, James F. Voice over Internet Protocol (VoIP) Security. Elsevier Science & Technology Books, 2005.
Buscar texto completoSynchronizing Internet Protocol Security (SIPSec) (Advances in Information Security). Springer, 2007.
Buscar texto completoVyncke, Eric y Scott Hogg. IPv6 Security. Cisco Press, 2008.
Buscar texto completoXie, Bin. Heterogeneous Wireless Networks- Networking Protocol to Security. VDM Verlag Dr. Mueller e.K., 2007.
Buscar texto completoGoyal, Dinesh, S. Balamurugan, Sheng‐Lung Peng y O. P. Verma, eds. Design and Analysis of Security Protocol for Communication. Wiley, 2020. http://dx.doi.org/10.1002/9781119555759.
Texto completoChen, Kefei y Ling Dong. Cryptographic Protocol: Security Analysis Based on Trusted Freshness. Springer, 2012.
Buscar texto completoCryptographic Protocol: Security Analysis Based on Trusted Freshness. Springer London, Limited, 2012.
Buscar texto completoChen, Kefei y Ling Dong. Cryptographic Protocol: Security Analysis Based on Trusted Freshness. Springer, 2012.
Buscar texto completoVerma, O. P., Sheng-Lung Peng, Dinesh Goyal y S. Balamurugan. Design and Analysis of Security Protocol for Communication. Wiley & Sons, Incorporated, John, 2020.
Buscar texto completoVerma, O. P., Sheng-Lung Peng, Dinesh Goyal y S. Balamurugan. Design and Analysis of Security Protocol for Communication. Wiley & Sons, Incorporated, John, 2020.
Buscar texto completoDenial of Service Attacks on 802.1X Security Protocol. Storming Media, 2004.
Buscar texto completoVerma, O. P., Sheng-Lung Peng, Dinesh Goyal y S. Balamurugan. Design and Analysis of Security Protocol for Communication. Wiley & Sons, Limited, John, 2020.
Buscar texto completoDemystifying the Ipsec Puzzle (Artech House Computer Security Series). Artech House Publishers, 2001.
Buscar texto completoAhmed, Sabbir. Vehicle Safety Communication Protocol for Co-Operative Collision Warning : Vehicle Safety Communications : Protocols, Security, and Privacy - Vehicle Safety Communications: Protocols, Security, Privacy. Independently Published, 2019.
Buscar texto completo