To see the other types of publications on this topic, follow the link: Security protocol.

Books on the topic 'Security protocol'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Security protocol.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Jones, Benjamin Edward. Improving security in the FDDI protocol. Monterey, Calif: Naval Postgraduate School, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

United Service Institution of India, ed. Integrated maritime security: Governing the ghost protocol. New Delhi: United Service Institution of India, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Miller, Derek. The security needs assessment protocol: Improving operational effectiveness through community security. New York: United Nations Institute for Disarmament Research, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

1969-, Rudnick Lisa B., and United Nations Institute for Disarmament Research, eds. The security needs assessment protocol: Improving operational effectiveness through community security. New York: United Nations, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Miller, Derek. The security needs assessment protocol: Improving operational effectiveness through community security. New York: United Nations Institute for Disarmament Research, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hehir, Stephen. A security target for the X.435 protocol. Teddington: National Physical Laboratory, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kaksonen, Rauli. A functional method for assessing protocol implementation security. Espoo [Finland]: Technical Research Centre of Finland, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Held, Gilbert. Managing TCP/IP networks: Techniques, tools, and security considerations. Chichester: Wiley & Sons, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Armando, Alessandro, and Gavin Lowe, eds. Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16074-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Canada. Dept. of External Affairs. Social security: Agreement between Canada and Finland (with protocol). S.l: s.n, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Jake, Kouns, ed. Security in an IPv6 environment. Boca Raton: Auerbach, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Darroca, Gregorio G. Framework for a Link Layer Packet Filtering (LLPF) security protocol. Monterey, Calif: Naval Postgraduate School, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

United States. Congress. Senate. Committee on Foreign Relations. Airport security protocol: Report (to accompany Treaty Doc. 101-19). [Washington, D.C.?: U.S. G.P.O., 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Bishop, Matt. A security analysis of version 2 of the Network Time Protocol NPT: A report to the Privacy and Security Research Group. [Washington, DC: National Aeronautics and Space Administration, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

United States. National Aeronautics and Space Administration., ed. A security analysis of version 2 of the Network Time Protocol NPT: A report to the Privacy and Security Research Group. [Washington, DC: National Aeronautics and Space Administration, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Oppliger, Rolf. Internet and Intranet security. Boston: Artech House, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Belgium. Social security: Agreement with final protocol, between the United States of America and Belgium, signed at Washington February 19, 1982 and additional protocol and administrative, agreement, signed at Brussels November 23, 1982. Washington, D.C: Dept. of State, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Loeb, Larry. Secure electronic transactions: Implementing the SET protocol. Boston: International Thomson Computer Press, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Canada. Dept. of External Affairs. Social security: Convention on Social Security between the Government of Canada and the Government of Luxembourg (with Protocol). S.l: s.n, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Feit, Sidnie. TCP/IP: Architecture, protocols, and implementation with IPv6 and IP security. 2nd ed. New York: McGraw-Hill, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Canada. Dept. of External Affairs. Social security: Agreement between Canada and Norway (with Final Protocol and administrative arrangement). S.l: s.n, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

IEEE Computer Society. Storage Systems Standards Committee., Institute of Electrical and Electronics Engineers., IEEE Standards Board, and IEEE Standards Association, eds. IEEE standard for Media Management System (MMS) Session Security, Authentication, Initialization Protocol (SSAIP). New York: Institute of Electrical and Electronics Engineers, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Protocol and security. [Owerri]: IMO State Commission for Women, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Schulzrinne, Henning, Dorgham Sisalem, John Floroiu, Jiri Kuthan, and Ulrich Abend. SIP Security. Wiley & Sons, Limited, John, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Schulzrinne, Henning, Dorgham Sisalem, John Floroiu, Ulrich Abend, and Jirí Kuthan. Sip Security. Wiley & Sons, Incorporated, John, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Automating Security Protocol Analysis. Storming Media, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Shoniregun, Charles A. A. Synchronizing Internet Protocol Security. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Technology, National Institute of Standards and. Border Gateway Protocol Security. CreateSpace Independent Publishing Platform, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Synchronizing Internet Protocol Security (SIPSec). Boston, MA: Springer US, 2007. http://dx.doi.org/10.1007/978-0-387-68569-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Shoniregun, Charles A. Synchronizing Internet Protocol Security (SIPSec). Springer London, Limited, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Voice over Internet Protocol (VoIP) Security. Elsevier, 2005. http://dx.doi.org/10.1016/b978-1-55558-332-3.x5000-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Rittinghouse, PhD CISM John, and PhD, CISM, CISSP, James F. Ransome. Voice over Internet Protocol (VoIP) Security. Digital Press, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

John, Rittinghouse CISM, and Ransome, , CISM, CISSP, James F. Voice over Internet Protocol (VoIP) Security. Elsevier Science & Technology Books, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Synchronizing Internet Protocol Security (SIPSec) (Advances in Information Security). Springer, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Vyncke, Eric, and Scott Hogg. IPv6 Security. Cisco Press, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Xie, Bin. Heterogeneous Wireless Networks- Networking Protocol to Security. VDM Verlag Dr. Mueller e.K., 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

NTP Security: A Quick-Start Guide. Apress, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Goyal, Dinesh, S. Balamurugan, Sheng‐Lung Peng, and O. P. Verma, eds. Design and Analysis of Security Protocol for Communication. Wiley, 2020. http://dx.doi.org/10.1002/9781119555759.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Chen, Kefei, and Ling Dong. Cryptographic Protocol: Security Analysis Based on Trusted Freshness. Springer, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Cryptographic Protocol: Security Analysis Based on Trusted Freshness. Springer London, Limited, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Verma, O. P., Sheng-Lung Peng, Dinesh Goyal, and S. Balamurugan. Design and Analysis of Security Protocol for Communication. Wiley & Sons, Limited, John, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Verma, O. P., Sheng-Lung Peng, Dinesh Goyal, and S. Balamurugan. Design and Analysis of Security Protocol for Communication. Wiley & Sons, Incorporated, John, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Denial of Service Attacks on 802.1X Security Protocol. Storming Media, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Chen, Kefei, and Ling Dong. Cryptographic Protocol: Security Analysis Based on Trusted Freshness. Springer, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Verma, O. P., Sheng-Lung Peng, Dinesh Goyal, and S. Balamurugan. Design and Analysis of Security Protocol for Communication. Wiley & Sons, Incorporated, John, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Miller, David Hunter. The Geneva Protocol. Benediction Classics, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Miller, David Hunter. The Geneva Protocol. CreateSpace Independent Publishing Platform, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

TCP/IP: Architecture, Protocols, and Implementation with IPv6 and IP Security. McGraw Hill Education (India) Private Limited, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

TCP/IP: Architcture, protocols, and implementation with IPv6 and IP security. New York: McGraw-Hill, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

SIP Handbook: Services, Technologies, and Security of Session Initiation Protocol. CRC, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography