Libri sul tema "Security protocol"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 libri per l'attività di ricerca sul tema "Security protocol".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi i libri di molte aree scientifiche e compila una bibliografia corretta.
Dorgham, Sisalem, a cura di. SIP security. Chichester, West Sussex, U.K: Wiley, 2009.
Cerca il testo completoJones, Benjamin Edward. Improving security in the FDDI protocol. Monterey, Calif: Naval Postgraduate School, 1992.
Cerca il testo completoEric, Vyncke, a cura di. IPv6 security. Indianapolis, IN: Cisco Systems, 2009.
Cerca il testo completoUnited Service Institution of India, a cura di. Integrated maritime security: Governing the ghost protocol. New Delhi: United Service Institution of India, 2014.
Cerca il testo completoMiller, Derek. The security needs assessment protocol: Improving operational effectiveness through community security. New York: United Nations Institute for Disarmament Research, 2008.
Cerca il testo completoMiller, Derek. The security needs assessment protocol: Improving operational effectiveness through community security. New York: United Nations Institute for Disarmament Research, 2008.
Cerca il testo completo1969-, Rudnick Lisa B., e United Nations Institute for Disarmament Research, a cura di. The security needs assessment protocol: Improving operational effectiveness through community security. New York: United Nations, 2008.
Cerca il testo completoHehir, Stephen. A security target for the X.435 protocol. Teddington: National Physical Laboratory, 1995.
Cerca il testo completoKaksonen, Rauli. A functional method for assessing protocol implementation security. Espoo [Finland]: Technical Research Centre of Finland, 2001.
Cerca il testo completoArmando, Alessandro, e Gavin Lowe, a cura di. Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16074-5.
Testo completoCanada. Dept. of External Affairs. Social security: Agreement between Canada and Finland (with protocol). S.l: s.n, 1989.
Cerca il testo completoTCP/IP: Architcture, protocols, and implementation with IPv6 and IP security. New York: McGraw-Hill, 1998.
Cerca il testo completoHost Identity Protocol (HIP): Towards the secure mobile Internet. Chichester, West Sussex, England: Wiley, 2008.
Cerca il testo completoHeld, Gilbert. Managing TCP/IP networks: Techniques, tools, and security considerations. Chichester: Wiley & Sons, 2000.
Cerca il testo completoK, Gurbani Vijay, a cura di. Internet and TCP/IP network security: Securing protocols and applications. New York: McGraw-Hill, 1996.
Cerca il testo completoInternet security protocols: Protecting IP traffic. Upper Saddle River, N.J: Prentice Hall PRT, 2000.
Cerca il testo completoJake, Kouns, a cura di. Security in an IPv6 environment. Boca Raton: Auerbach, 2009.
Cerca il testo completoSecuring storage: A practical guide to SAN and NAS security. Indianapolis, IN: Addison-Wesley, 2005.
Cerca il testo completoDarroca, Gregorio G. Framework for a Link Layer Packet Filtering (LLPF) security protocol. Monterey, Calif: Naval Postgraduate School, 1998.
Cerca il testo completoUnited States. Congress. Senate. Committee on Foreign Relations. Airport security protocol: Report (to accompany Treaty Doc. 101-19). [Washington, D.C.?: U.S. G.P.O., 1989.
Cerca il testo completoRouter Security Strategies: Securing IP Network Traffic Planes. Indianapolis: Cisco Press, 2008.
Cerca il testo completoThe resurrection protocol: A Jake Ankyer adventure. North Charleston, SC: CreateSpace, 2014.
Cerca il testo completoBelgium. Social security: Agreement with final protocol, between the United States of America and Belgium, signed at Washington February 19, 1982 and additional protocol and administrative, agreement, signed at Brussels November 23, 1982. Washington, D.C: Dept. of State, 1991.
Cerca il testo completoBishop, Matt. A security analysis of version 2 of the Network Time Protocol NPT: A report to the Privacy and Security Research Group. [Washington, DC: National Aeronautics and Space Administration, 1991.
Cerca il testo completoUnited States. National Aeronautics and Space Administration., a cura di. A security analysis of version 2 of the Network Time Protocol NPT: A report to the Privacy and Security Research Group. [Washington, DC: National Aeronautics and Space Administration, 1991.
Cerca il testo completoSecuring converged IP networks. Boca Raton, FL: Auerbach Publications, 2007.
Cerca il testo completoProtocol and security. [Owerri]: IMO State Commission for Women, 1994.
Cerca il testo completoAutomating Security Protocol Analysis. Storming Media, 2004.
Cerca il testo completoShoniregun, Charles A. A. Synchronizing Internet Protocol Security. Springer, 2010.
Cerca il testo completoTechnology, National Institute of Standards and. Border Gateway Protocol Security. CreateSpace Independent Publishing Platform, 2014.
Cerca il testo completoSchulzrinne, Henning, Dorgham Sisalem, John Floroiu, Jiri Kuthan e Ulrich Abend. SIP Security. Wiley & Sons, Limited, John, 2009.
Cerca il testo completoSchulzrinne, Henning, Dorgham Sisalem, John Floroiu, Ulrich Abend e Jirí Kuthan. Sip Security. Wiley & Sons, Incorporated, John, 2009.
Cerca il testo completoSynchronizing Internet Protocol Security (SIPSec). Boston, MA: Springer US, 2007. http://dx.doi.org/10.1007/978-0-387-68569-4.
Testo completoShoniregun, Charles A. Synchronizing Internet Protocol Security (SIPSec). Springer London, Limited, 2007.
Cerca il testo completoVoice over Internet Protocol (VoIP) Security. Elsevier, 2005. http://dx.doi.org/10.1016/b978-1-55558-332-3.x5000-6.
Testo completoRittinghouse, PhD CISM John, e PhD, CISM, CISSP, James F. Ransome. Voice over Internet Protocol (VoIP) Security. Digital Press, 2004.
Cerca il testo completoJohn, Rittinghouse CISM, e Ransome, , CISM, CISSP, James F. Voice over Internet Protocol (VoIP) Security. Elsevier Science & Technology Books, 2005.
Cerca il testo completoSynchronizing Internet Protocol Security (SIPSec) (Advances in Information Security). Springer, 2007.
Cerca il testo completoVyncke, Eric, e Scott Hogg. IPv6 Security. Cisco Press, 2008.
Cerca il testo completoXie, Bin. Heterogeneous Wireless Networks- Networking Protocol to Security. VDM Verlag Dr. Mueller e.K., 2007.
Cerca il testo completoGoyal, Dinesh, S. Balamurugan, Sheng‐Lung Peng e O. P. Verma, a cura di. Design and Analysis of Security Protocol for Communication. Wiley, 2020. http://dx.doi.org/10.1002/9781119555759.
Testo completoChen, Kefei, e Ling Dong. Cryptographic Protocol: Security Analysis Based on Trusted Freshness. Springer, 2012.
Cerca il testo completoCryptographic Protocol: Security Analysis Based on Trusted Freshness. Springer London, Limited, 2012.
Cerca il testo completoChen, Kefei, e Ling Dong. Cryptographic Protocol: Security Analysis Based on Trusted Freshness. Springer, 2012.
Cerca il testo completoVerma, O. P., Sheng-Lung Peng, Dinesh Goyal e S. Balamurugan. Design and Analysis of Security Protocol for Communication. Wiley & Sons, Incorporated, John, 2020.
Cerca il testo completoVerma, O. P., Sheng-Lung Peng, Dinesh Goyal e S. Balamurugan. Design and Analysis of Security Protocol for Communication. Wiley & Sons, Incorporated, John, 2020.
Cerca il testo completoDenial of Service Attacks on 802.1X Security Protocol. Storming Media, 2004.
Cerca il testo completoVerma, O. P., Sheng-Lung Peng, Dinesh Goyal e S. Balamurugan. Design and Analysis of Security Protocol for Communication. Wiley & Sons, Limited, John, 2020.
Cerca il testo completoDemystifying the Ipsec Puzzle (Artech House Computer Security Series). Artech House Publishers, 2001.
Cerca il testo completoAhmed, Sabbir. Vehicle Safety Communication Protocol for Co-Operative Collision Warning : Vehicle Safety Communications : Protocols, Security, and Privacy - Vehicle Safety Communications: Protocols, Security, Privacy. Independently Published, 2019.
Cerca il testo completo