Books on the topic 'Security protocol'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Security protocol.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Jones, Benjamin Edward. Improving security in the FDDI protocol. Monterey, Calif: Naval Postgraduate School, 1992.
Find full textUnited Service Institution of India, ed. Integrated maritime security: Governing the ghost protocol. New Delhi: United Service Institution of India, 2014.
Find full textMiller, Derek. The security needs assessment protocol: Improving operational effectiveness through community security. New York: United Nations Institute for Disarmament Research, 2008.
Find full text1969-, Rudnick Lisa B., and United Nations Institute for Disarmament Research, eds. The security needs assessment protocol: Improving operational effectiveness through community security. New York: United Nations, 2008.
Find full textMiller, Derek. The security needs assessment protocol: Improving operational effectiveness through community security. New York: United Nations Institute for Disarmament Research, 2008.
Find full textHehir, Stephen. A security target for the X.435 protocol. Teddington: National Physical Laboratory, 1995.
Find full textKaksonen, Rauli. A functional method for assessing protocol implementation security. Espoo [Finland]: Technical Research Centre of Finland, 2001.
Find full textHeld, Gilbert. Managing TCP/IP networks: Techniques, tools, and security considerations. Chichester: Wiley & Sons, 2000.
Find full textArmando, Alessandro, and Gavin Lowe, eds. Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16074-5.
Full textCanada. Dept. of External Affairs. Social security: Agreement between Canada and Finland (with protocol). S.l: s.n, 1989.
Find full textDarroca, Gregorio G. Framework for a Link Layer Packet Filtering (LLPF) security protocol. Monterey, Calif: Naval Postgraduate School, 1998.
Find full textUnited States. Congress. Senate. Committee on Foreign Relations. Airport security protocol: Report (to accompany Treaty Doc. 101-19). [Washington, D.C.?: U.S. G.P.O., 1989.
Find full textBishop, Matt. A security analysis of version 2 of the Network Time Protocol NPT: A report to the Privacy and Security Research Group. [Washington, DC: National Aeronautics and Space Administration, 1991.
Find full textUnited States. National Aeronautics and Space Administration., ed. A security analysis of version 2 of the Network Time Protocol NPT: A report to the Privacy and Security Research Group. [Washington, DC: National Aeronautics and Space Administration, 1991.
Find full textBelgium. Social security: Agreement with final protocol, between the United States of America and Belgium, signed at Washington February 19, 1982 and additional protocol and administrative, agreement, signed at Brussels November 23, 1982. Washington, D.C: Dept. of State, 1991.
Find full textLoeb, Larry. Secure electronic transactions: Implementing the SET protocol. Boston: International Thomson Computer Press, 1997.
Find full textCanada. Dept. of External Affairs. Social security: Convention on Social Security between the Government of Canada and the Government of Luxembourg (with Protocol). S.l: s.n, 1991.
Find full textFeit, Sidnie. TCP/IP: Architecture, protocols, and implementation with IPv6 and IP security. 2nd ed. New York: McGraw-Hill, 1997.
Find full textCanada. Dept. of External Affairs. Social security: Agreement between Canada and Norway (with Final Protocol and administrative arrangement). S.l: s.n, 1989.
Find full textIEEE Computer Society. Storage Systems Standards Committee., Institute of Electrical and Electronics Engineers., IEEE Standards Board, and IEEE Standards Association, eds. IEEE standard for Media Management System (MMS) Session Security, Authentication, Initialization Protocol (SSAIP). New York: Institute of Electrical and Electronics Engineers, 2000.
Find full textSchulzrinne, Henning, Dorgham Sisalem, John Floroiu, Jiri Kuthan, and Ulrich Abend. SIP Security. Wiley & Sons, Limited, John, 2009.
Find full textSchulzrinne, Henning, Dorgham Sisalem, John Floroiu, Ulrich Abend, and Jirí Kuthan. Sip Security. Wiley & Sons, Incorporated, John, 2009.
Find full textShoniregun, Charles A. A. Synchronizing Internet Protocol Security. Springer, 2010.
Find full textTechnology, National Institute of Standards and. Border Gateway Protocol Security. CreateSpace Independent Publishing Platform, 2014.
Find full textSynchronizing Internet Protocol Security (SIPSec). Boston, MA: Springer US, 2007. http://dx.doi.org/10.1007/978-0-387-68569-4.
Full textShoniregun, Charles A. Synchronizing Internet Protocol Security (SIPSec). Springer London, Limited, 2007.
Find full textVoice over Internet Protocol (VoIP) Security. Elsevier, 2005. http://dx.doi.org/10.1016/b978-1-55558-332-3.x5000-6.
Full textRittinghouse, PhD CISM John, and PhD, CISM, CISSP, James F. Ransome. Voice over Internet Protocol (VoIP) Security. Digital Press, 2004.
Find full textJohn, Rittinghouse CISM, and Ransome, , CISM, CISSP, James F. Voice over Internet Protocol (VoIP) Security. Elsevier Science & Technology Books, 2005.
Find full textSynchronizing Internet Protocol Security (SIPSec) (Advances in Information Security). Springer, 2007.
Find full textXie, Bin. Heterogeneous Wireless Networks- Networking Protocol to Security. VDM Verlag Dr. Mueller e.K., 2007.
Find full textGoyal, Dinesh, S. Balamurugan, Sheng‐Lung Peng, and O. P. Verma, eds. Design and Analysis of Security Protocol for Communication. Wiley, 2020. http://dx.doi.org/10.1002/9781119555759.
Full textChen, Kefei, and Ling Dong. Cryptographic Protocol: Security Analysis Based on Trusted Freshness. Springer, 2012.
Find full textCryptographic Protocol: Security Analysis Based on Trusted Freshness. Springer London, Limited, 2012.
Find full textVerma, O. P., Sheng-Lung Peng, Dinesh Goyal, and S. Balamurugan. Design and Analysis of Security Protocol for Communication. Wiley & Sons, Limited, John, 2020.
Find full textVerma, O. P., Sheng-Lung Peng, Dinesh Goyal, and S. Balamurugan. Design and Analysis of Security Protocol for Communication. Wiley & Sons, Incorporated, John, 2020.
Find full textChen, Kefei, and Ling Dong. Cryptographic Protocol: Security Analysis Based on Trusted Freshness. Springer, 2012.
Find full textVerma, O. P., Sheng-Lung Peng, Dinesh Goyal, and S. Balamurugan. Design and Analysis of Security Protocol for Communication. Wiley & Sons, Incorporated, John, 2020.
Find full textMiller, David Hunter. The Geneva Protocol. CreateSpace Independent Publishing Platform, 2017.
Find full textTCP/IP: Architecture, Protocols, and Implementation with IPv6 and IP Security. McGraw Hill Education (India) Private Limited, 2008.
Find full textTCP/IP: Architcture, protocols, and implementation with IPv6 and IP security. New York: McGraw-Hill, 1998.
Find full textSIP Handbook: Services, Technologies, and Security of Session Initiation Protocol. CRC, 2008.
Find full text