Libri sul tema "Mesures de réseau"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 libri per l'attività di ricerca sul tema "Mesures de réseau".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi i libri di molte aree scientifiche e compila una bibliografia corretta.
Prum, Bernard. Processus sur un réseau et mesures de Gibbs: Applications. Paris: Masson, 1986.
Cerca il testo completoLlorens, Cédric. Tableaux de bord de la sécurité réseau. 2a ed. Paris: Eyrolles, 2006.
Cerca il testo completoWald und Landschaft Schweiz. Bundesamt für Umwelt. La pollution de l'air: Mesures exécutées à l'aide du Réseau national d'observation des polluants atmosphériques (NABEL). Berne: commande: Office fédéral de l'environnement, des forêts et du paysage, Documentation, 2000.
Cerca il testo completoNamin, Catherine. Mesures des effets de réseau sur la contribution individuelle des représentants du personnel à l'intelligence économique du comité d'entreprise européen. Grenoble: A.N.R.T, Université Pierre Mendes France (Grenoble II), 2000.
Cerca il testo completoKuruhongsa, Prakan. Optimisation d'un spectomètre de RPE permettant des mesures de T1: Application à la relaxation spin-réseau de Fe³⁺, Co²⁺ et Mn²⁺. Grenoble: A.N.R.T. Université Pierre Mendès France Grenoble 2, 1986.
Cerca il testo completoDordoigne, José. Réseaux informatiques: Notions fondamentales : protocoles, architectures, réseaux sans fil, virtualisation, sécurité, IP v6 ... 6a ed. St-Herblain: Éd. ENI, 2015.
Cerca il testo completoKartalopoulos, Stamatios V. Security of information and communication networks. Hoboken, N.J: Wiley, 2009.
Cerca il testo completoCharles, Miller. Microcomputer and LAN security =: La sécurité des micro-ordinateurs et des réseaux locaux. Hull, Qué: Minister of Government Services Canada = Ministre des services gouvernementaux Canada, 1993.
Cerca il testo completoBoutherin, Bernard. Se curiser un re seau Linux. 3a ed. Paris: Eyrolles, 2006.
Cerca il testo completoSchneier, Bruce. Cryptographie appliquée: Protocoles, algorithmes et codes sources en C. 2a ed. Paris: Vuibert, 2001.
Cerca il testo completoMatthew, McFadden, a cura di. Defense against the black arts: How hackers do what they do and how to protect against it. Boca Raton, FL: Auerbach Publications, 2011.
Cerca il testo completoVinatier, Emmanuel. Hacking. Micro Application, 2003.
Cerca il testo completoSecrets and lies: Digital security in a networked world. New York: John Wiley, 2000.
Cerca il testo completoMastering Network Security: Protect Your Network Against Advanced Threats, Wi-Fi Attacks, Exploits, and Trackers. Packt Publishing, Limited, 2020.
Cerca il testo completoRéseau national de surveillance de la pollution atmosphérique (RNSPA), la qualitde l'air au Canada: Sommaire pour 2001 et analyse des tendances pour 1990-2001. Ottawa, Ont: Environnement Canada, 2004.
Cerca il testo completoERIC, A. B. Sécurité Routeur et Commutateur: La Sécurité des Réseaux Informatiques, Besoins de Sécurité et Solutions, Quelque Attaques Sur les Routeurs et Contre-Mesures. Independently Published, 2020.
Cerca il testo completoDeLaet, Gert, e Gert Schauwers. Network Security Fundamentals. Pearson Education, Limited, 2011.
Cerca il testo completoKosiur, David R. Understanding Policy-Based Networking. John Wiley & Sons, 2001.
Cerca il testo completoBella, Giampaolo. Formal Correctness of Security Protocols (Information Security and Cryptography). Springer, 2007.
Cerca il testo completoPrasad, Ramjee, e Leo P. Ligthart. Security Within CONASENSE Paragon. River Publishers, 2022.
Cerca il testo completoSimpson, William, Kevin Foltz e Institute For Institute For Defense Analyses. Enterprise Level Security 2: Advanced Topics in an Uncertain World. Taylor & Francis Group, 2020.
Cerca il testo completoSimpson, William, Kevin Foltz e Institute For Institute For Defense Analyses. Enterprise Level Security 2: Advanced Topics in an Uncertain World. Taylor & Francis Group, 2020.
Cerca il testo completoPrasad, Ramjee, e Leo P. Ligthart. Security Within CONASENSE Paragon. River Publishers, 2022.
Cerca il testo completoSimpson, William, Kevin Foltz e Institute For Institute For Defense Analyses. Enterprise Level Security 2: Advanced Topics in an Uncertain World. Taylor & Francis Group, 2020.
Cerca il testo completoSimpson, William, Kevin Foltz e Institute For Institute For Defense Analyses. Enterprise Level Security 2: Advanced Topics in an Uncertain World. Taylor & Francis Group, 2020.
Cerca il testo completoPrasad, Ramjee, e Leo P. Ligthart. Security Within CONASENSE Paragon. River Publishers, 2019.
Cerca il testo completoPrasad, Ramjee, e Leo P. Ligthart. Security Within CONASENSE Paragon. River Publishers, 2022.
Cerca il testo completoEnterprise Level Security 2. Taylor & Francis Group, 2020.
Cerca il testo completoSecurity Within CONASENSE Paragon. River Publishers, 2019.
Cerca il testo completoStephens, Brian, e Eric Larson. Administrating Web Servers, Security, & Maintenance Interactive Workbook. Prentice Hall PTR, 1999.
Cerca il testo completoStephens, Brian, e Eric Larson. Administrating Web Servers, Security, & Maintenance Interactive Workbook. Prentice Hall PTR, 1999.
Cerca il testo completoWylder, John. Strategic Information Security. Taylor & Francis Group, 2019.
Cerca il testo completoZero Trust Networks: Building Secure Systems in Untrusted Networks. O'Reilly Media, 2017.
Cerca il testo completoSecuring Systems: Applied Security Architecture and Threat Models. Taylor & Francis Group, 2015.
Cerca il testo completoSchoenfield, Brook S. E. Securing Systems: Applied Security Architecture and Threat Models. Taylor & Francis Group, 2015.
Cerca il testo completoSchoenfield, Brook S. E. Securing Systems: Applied Security Architecture and Threat Models. Taylor & Francis Group, 2015.
Cerca il testo completoSecurity in Sensor Networks. AUERBACH, 2006.
Cerca il testo completoNetwork and Data Security for Non-Engineers. Taylor & Francis Group, 2016.
Cerca il testo completoGroom, Frank M. Network and Data Security for Non-Engineers. Taylor & Francis Group, 2017.
Cerca il testo completoJones, Stephan S., Frank M. Groom e Kevin Groom. Network and Data Security for Non-Engineers. Auerbach Publishers, Incorporated, 2016.
Cerca il testo completoJones, Stephan S., Frank M. Groom e Kevin Groom. Network and Data Security for Non-Engineers. Auerbach Publishers, Incorporated, 2016.
Cerca il testo completoKhan, Shafiullah. Security for Multihop Wireless Networks. Taylor & Francis Group, 2014.
Cerca il testo completoMauri, Jaime Lloret, e Shafiullah Khan. Security for Multihop Wireless Networks. Taylor & Francis Group, 2016.
Cerca il testo completoSecurity for Multihop Wireless Networks. Taylor & Francis Group, 2014.
Cerca il testo completoNetwork Attacks And Defenses A Handson Approach. Taylor & Francis Ltd, 2012.
Cerca il testo completoInsider's Guide to Cyber Security Architecture. Taylor & Francis Group, 2019.
Cerca il testo completoSecurity, Privacy and Reliability in Computer Communications and Networks. River Publishers, 2017.
Cerca il testo completoPathan, Al-Sakib Khan, e Kutub Thakur. Cybersecurity Fundamentals: A Real-World Perspective. Taylor & Francis Group, 2020.
Cerca il testo completoPathan, Al-Sakib Khan, e Kutub Thakur. Cybersecurity Fundamentals: A Real-World Perspective. Taylor & Francis Group, 2020.
Cerca il testo completoSong, Min, Kewei Sha e Aaron Striegel. Security, Privacy and Reliability in Computer Communications and Networks. River Publishers, 2022.
Cerca il testo completo