Livros sobre o tema "Mesures de réseau"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores livros para estudos sobre o assunto "Mesures de réseau".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os livros das mais diversas áreas científicas e compile uma bibliografia correta.
Prum, Bernard. Processus sur un réseau et mesures de Gibbs: Applications. Paris: Masson, 1986.
Encontre o texto completo da fonteLlorens, Cédric. Tableaux de bord de la sécurité réseau. 2a ed. Paris: Eyrolles, 2006.
Encontre o texto completo da fonteWald und Landschaft Schweiz. Bundesamt für Umwelt. La pollution de l'air: Mesures exécutées à l'aide du Réseau national d'observation des polluants atmosphériques (NABEL). Berne: commande: Office fédéral de l'environnement, des forêts et du paysage, Documentation, 2000.
Encontre o texto completo da fonteNamin, Catherine. Mesures des effets de réseau sur la contribution individuelle des représentants du personnel à l'intelligence économique du comité d'entreprise européen. Grenoble: A.N.R.T, Université Pierre Mendes France (Grenoble II), 2000.
Encontre o texto completo da fonteKuruhongsa, Prakan. Optimisation d'un spectomètre de RPE permettant des mesures de T1: Application à la relaxation spin-réseau de Fe³⁺, Co²⁺ et Mn²⁺. Grenoble: A.N.R.T. Université Pierre Mendès France Grenoble 2, 1986.
Encontre o texto completo da fonteDordoigne, José. Réseaux informatiques: Notions fondamentales : protocoles, architectures, réseaux sans fil, virtualisation, sécurité, IP v6 ... 6a ed. St-Herblain: Éd. ENI, 2015.
Encontre o texto completo da fonteKartalopoulos, Stamatios V. Security of information and communication networks. Hoboken, N.J: Wiley, 2009.
Encontre o texto completo da fonteCharles, Miller. Microcomputer and LAN security =: La sécurité des micro-ordinateurs et des réseaux locaux. Hull, Qué: Minister of Government Services Canada = Ministre des services gouvernementaux Canada, 1993.
Encontre o texto completo da fonteBoutherin, Bernard. Se curiser un re seau Linux. 3a ed. Paris: Eyrolles, 2006.
Encontre o texto completo da fonteSchneier, Bruce. Cryptographie appliquée: Protocoles, algorithmes et codes sources en C. 2a ed. Paris: Vuibert, 2001.
Encontre o texto completo da fonteMatthew, McFadden, ed. Defense against the black arts: How hackers do what they do and how to protect against it. Boca Raton, FL: Auerbach Publications, 2011.
Encontre o texto completo da fonteVinatier, Emmanuel. Hacking. Micro Application, 2003.
Encontre o texto completo da fonteSecrets and lies: Digital security in a networked world. New York: John Wiley, 2000.
Encontre o texto completo da fonteMastering Network Security: Protect Your Network Against Advanced Threats, Wi-Fi Attacks, Exploits, and Trackers. Packt Publishing, Limited, 2020.
Encontre o texto completo da fonteRéseau national de surveillance de la pollution atmosphérique (RNSPA), la qualitde l'air au Canada: Sommaire pour 2001 et analyse des tendances pour 1990-2001. Ottawa, Ont: Environnement Canada, 2004.
Encontre o texto completo da fonteERIC, A. B. Sécurité Routeur et Commutateur: La Sécurité des Réseaux Informatiques, Besoins de Sécurité et Solutions, Quelque Attaques Sur les Routeurs et Contre-Mesures. Independently Published, 2020.
Encontre o texto completo da fonteDeLaet, Gert, e Gert Schauwers. Network Security Fundamentals. Pearson Education, Limited, 2011.
Encontre o texto completo da fonteKosiur, David R. Understanding Policy-Based Networking. John Wiley & Sons, 2001.
Encontre o texto completo da fonteBella, Giampaolo. Formal Correctness of Security Protocols (Information Security and Cryptography). Springer, 2007.
Encontre o texto completo da fontePrasad, Ramjee, e Leo P. Ligthart. Security Within CONASENSE Paragon. River Publishers, 2022.
Encontre o texto completo da fonteSimpson, William, Kevin Foltz e Institute For Institute For Defense Analyses. Enterprise Level Security 2: Advanced Topics in an Uncertain World. Taylor & Francis Group, 2020.
Encontre o texto completo da fonteSimpson, William, Kevin Foltz e Institute For Institute For Defense Analyses. Enterprise Level Security 2: Advanced Topics in an Uncertain World. Taylor & Francis Group, 2020.
Encontre o texto completo da fontePrasad, Ramjee, e Leo P. Ligthart. Security Within CONASENSE Paragon. River Publishers, 2022.
Encontre o texto completo da fonteSimpson, William, Kevin Foltz e Institute For Institute For Defense Analyses. Enterprise Level Security 2: Advanced Topics in an Uncertain World. Taylor & Francis Group, 2020.
Encontre o texto completo da fonteSimpson, William, Kevin Foltz e Institute For Institute For Defense Analyses. Enterprise Level Security 2: Advanced Topics in an Uncertain World. Taylor & Francis Group, 2020.
Encontre o texto completo da fontePrasad, Ramjee, e Leo P. Ligthart. Security Within CONASENSE Paragon. River Publishers, 2019.
Encontre o texto completo da fontePrasad, Ramjee, e Leo P. Ligthart. Security Within CONASENSE Paragon. River Publishers, 2022.
Encontre o texto completo da fonteEnterprise Level Security 2. Taylor & Francis Group, 2020.
Encontre o texto completo da fonteSecurity Within CONASENSE Paragon. River Publishers, 2019.
Encontre o texto completo da fonteStephens, Brian, e Eric Larson. Administrating Web Servers, Security, & Maintenance Interactive Workbook. Prentice Hall PTR, 1999.
Encontre o texto completo da fonteStephens, Brian, e Eric Larson. Administrating Web Servers, Security, & Maintenance Interactive Workbook. Prentice Hall PTR, 1999.
Encontre o texto completo da fonteWylder, John. Strategic Information Security. Taylor & Francis Group, 2019.
Encontre o texto completo da fonteZero Trust Networks: Building Secure Systems in Untrusted Networks. O'Reilly Media, 2017.
Encontre o texto completo da fonteSecuring Systems: Applied Security Architecture and Threat Models. Taylor & Francis Group, 2015.
Encontre o texto completo da fonteSchoenfield, Brook S. E. Securing Systems: Applied Security Architecture and Threat Models. Taylor & Francis Group, 2015.
Encontre o texto completo da fonteSchoenfield, Brook S. E. Securing Systems: Applied Security Architecture and Threat Models. Taylor & Francis Group, 2015.
Encontre o texto completo da fonteSecurity in Sensor Networks. AUERBACH, 2006.
Encontre o texto completo da fonteNetwork and Data Security for Non-Engineers. Taylor & Francis Group, 2016.
Encontre o texto completo da fonteGroom, Frank M. Network and Data Security for Non-Engineers. Taylor & Francis Group, 2017.
Encontre o texto completo da fonteJones, Stephan S., Frank M. Groom e Kevin Groom. Network and Data Security for Non-Engineers. Auerbach Publishers, Incorporated, 2016.
Encontre o texto completo da fonteJones, Stephan S., Frank M. Groom e Kevin Groom. Network and Data Security for Non-Engineers. Auerbach Publishers, Incorporated, 2016.
Encontre o texto completo da fonteKhan, Shafiullah. Security for Multihop Wireless Networks. Taylor & Francis Group, 2014.
Encontre o texto completo da fonteMauri, Jaime Lloret, e Shafiullah Khan. Security for Multihop Wireless Networks. Taylor & Francis Group, 2016.
Encontre o texto completo da fonteSecurity for Multihop Wireless Networks. Taylor & Francis Group, 2014.
Encontre o texto completo da fonteNetwork Attacks And Defenses A Handson Approach. Taylor & Francis Ltd, 2012.
Encontre o texto completo da fonteInsider's Guide to Cyber Security Architecture. Taylor & Francis Group, 2019.
Encontre o texto completo da fonteSecurity, Privacy and Reliability in Computer Communications and Networks. River Publishers, 2017.
Encontre o texto completo da fontePathan, Al-Sakib Khan, e Kutub Thakur. Cybersecurity Fundamentals: A Real-World Perspective. Taylor & Francis Group, 2020.
Encontre o texto completo da fontePathan, Al-Sakib Khan, e Kutub Thakur. Cybersecurity Fundamentals: A Real-World Perspective. Taylor & Francis Group, 2020.
Encontre o texto completo da fonteSong, Min, Kewei Sha e Aaron Striegel. Security, Privacy and Reliability in Computer Communications and Networks. River Publishers, 2022.
Encontre o texto completo da fonte