Literatura académica sobre el tema "Internet (computer network)"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Internet (computer network)".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Internet (computer network)"
Vishvakarma, Tanmya. "A Review of Modern Computer Networks." International Journal for Research in Applied Science and Engineering Technology 10, no. 9 (September 30, 2022): 368–76. http://dx.doi.org/10.22214/ijraset.2022.46637.
Texto completoAyu tiara sunja, Sunja, and Meilyana Winda Perdana. "Development of local area network (LAN) at SMK 1 belitang madang raya." International Journal Cister 1, no. 02 (August 1, 2022): 63–66. http://dx.doi.org/10.56481/cister.v1i02.150.
Texto completoSakur. "Manajemen Jaringan Internet Menggunakan Mikrotik Router di SMA Negeri 2 Bojonegoro." Jurnal Pendidikan Madrasah 7, no. 2 (November 22, 2022): 117–34. http://dx.doi.org/10.14421/jpm.2022.72.03.
Texto completoNemkova, N. V. "What is the Internet?" Kazan medical journal 78, no. 3 (June 15, 1997): 227–29. http://dx.doi.org/10.17816/kazmj81522.
Texto completoAisyah, Siti. "Computer Networking Company in Business Area." International Research Journal of Management, IT & Social Sciences 2, no. 7 (July 1, 2015): 1. http://dx.doi.org/10.21744/irjmis.v2i7.67.
Texto completoM.J, Dr Kurian, and Dr Sreekanth D. "Thwart and Safeguard of Cyber Crime & Cyber Attack in Computer Networks." International Journal of Innovative Technology and Exploring Engineering 12, no. 3 (February 28, 2023): 25–32. http://dx.doi.org/10.35940/ijitee.c9452.0212323.
Texto completoDasmen, Rahmat Novrianda, Abdur Rohman Syarif, Heru Saputra, and Rahmat Amrullah. "Perancangan Keamanan Internet Jaringan Hotspot Mikrotik pada Winbox dan Wireshark." DoubleClick: Journal of Computer and Information Technology 5, no. 2 (February 27, 2022): 71. http://dx.doi.org/10.25273/doubleclick.v5i2.11751.
Texto completoAndhika, Maulana Hafidz, Arip Solehudin, Didi Juardi, and Garno. "MANAJEMEN BANDWIDTH MENGGUNAKAN METODE HIERARCHICAL TOKEN BUCKET (HTB) DENGAN PENAMBAHAN BUCKET SIZE USAHA AJ COMP." Elkom : Jurnal Elektronika dan Komputer 15, no. 1 (June 30, 2022): 9–15. http://dx.doi.org/10.51903/elkom.v15i1.626.
Texto completoSaddam RA, Angga Pranata, Sugiono, Rizki Zulanggara, Nur Halimah, Sri Nur H, Rosdiana SM, Nurhalim, and Aprina Handayani. "Sniffing and Spoofing in Computer Security." International Journal of Integrative Sciences 2, no. 6 (June 30, 2023): 881–86. http://dx.doi.org/10.55927/ijis.v2i6.4528.
Texto completoZulfa, Ira, Hendri Syahputra, M. Abdul Rahim, and Fajrillah. "Sistem Jaringan Small Office Home Office (Soho) Menggunakan Mikrotik." Bulletin of Information Technology (BIT) 4, no. 2 (June 27, 2023): 218–25. http://dx.doi.org/10.47065/bit.v4i2.676.
Texto completoTesis sobre el tema "Internet (computer network)"
Post, David L. "Network Management: Assessing Internet Network-Element Fault Status Using Neural Networks." Ohio : Ohio University, 2008. http://www.ohiolink.edu/etd/view.cgi?ohiou1220632155.
Texto completoWells, Daniel David. "Network management for community networks." Thesis, Rhodes University, 2010. http://hdl.handle.net/10962/d1006587.
Texto completoPezaros, D. "Network traffic measurement for the next generation Internet." Thesis, Lancaster University, 2005. http://eprints.lancs.ac.uk/12698/.
Texto completoYang, Yang. "Network congestion control." Access restricted to users with UT Austin EID, 2001. http://wwwlib.umi.com/cr/utexas/fullcit?p3037028.
Texto completoRichter, John Peter Frank. "An investigation into the design and implementation of an internet-scale network simulator." Thesis, Rhodes University, 2009. http://hdl.handle.net/10962/d1004840.
Texto completoSpring, Neil Timothy. "Efficient discovery of network topology and routing policy in the Internet /." Thesis, Connect to this title online; UW restricted, 2004. http://hdl.handle.net/1773/6985.
Texto completoZhang, Zaichen, and 張在琛. "Network-supported internet multicast congestion and error control." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2002. http://hub.hku.hk/bib/B31243915.
Texto completoSung, Minho. "Scalable and efficient distributed algorithms for defending against malicious Internet activity." Diss., Available online, Georgia Institute of Technology, 2006, 2006. http://etd.gatech.edu/theses/available/etd-07172006-134741/.
Texto completoWen, Zhihua. "SIMPLIFYING END POINT NETWORK MEASUREMENT ON INTERNET." Case Western Reserve University School of Graduate Studies / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=case1244041965.
Texto completoGummadi, Krishna Phani. "Measurement-driven modeling and design of internet-scale systems /." Thesis, Connect to this title online; UW restricted, 2005. http://hdl.handle.net/1773/6964.
Texto completoLibros sobre el tema "Internet (computer network)"
Halabi, Bassam. Internet routing architectures. Indianapolis, IN: Cisco Press, 1997.
Buscar texto completoHare, Chris. Internet firewallsand network security. 2nd ed. Indianapolis, Ind: New Riders Publishing, 1996.
Buscar texto completoDanny, McPherson, and Cisco Systems Inc, eds. Internet routing architectures. 2nd ed. Indianapolis, Ind: Cisco, 2000.
Buscar texto completoMiller, Mark A. Internet Technologies Handbook. New York: John Wiley & Sons, Ltd., 2005.
Buscar texto completo"Internet yong hu ci dian" bian yi zu., ed. Internet yung hu ci dian =: Internet user's dictionary. Guangzhou: Ji nan da xue chu ban she, 1997.
Buscar texto completoMaloff, Joel. Mecklermedia's official Internet World net.profit: Expanding your business using the Internet. London: Internet World, 1995.
Buscar texto completoHare, Chris. Internet firewalls and network security. 2nd ed. Indianapolis, Ind: New Riders Pub., 1996.
Buscar texto completoHansgeorg, Schmidt-Bergmann, Liesegang Torsten, and Museum für Literatur am Oberrhein., eds. Liter@tur: Computer-Literatur-Internet. Bielefeld: Aisthesis, 2001.
Buscar texto completoWilliam, Stallings. Mecklermedia's official Internet World internet security handbook. London: Internet World, 1996.
Buscar texto completoWilliam, Stallings. Mecklermedia's official Internet world Internet security handbook. Foster City, CA: IDG Books, 1995.
Buscar texto completoCapítulos de libros sobre el tema "Internet (computer network)"
Howser, Gerry. "The Network Layer." In Computer Networks and the Internet, 55–87. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-34496-2_5.
Texto completoHowser, Gerry. "The Laboratory Network." In Computer Networks and the Internet, 151–68. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-34496-2_9.
Texto completoWei, Zhao, Yanli Lv, Chunhe Xia, Yang Luo, and Qing Wei. "A Computer Network Defense Policy Refinement Method." In Frontiers in Internet Technologies, 122–33. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-53959-6_12.
Texto completoAhmad, Muhammad Aminu, and Steve Woodhead. "Containment of Fast Scanning Computer Network Worms." In Internet and Distributed Computing Systems, 235–47. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23237-9_21.
Texto completoHowser, Gerry. "Shortest Path Through the Network." In Computer Networks and the Internet, 205–15. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-34496-2_13.
Texto completoGoertzel, Ben. "The Network is the Computer is the Mind (is the World)." In Creating Internet Intelligence, 97–113. Boston, MA: Springer US, 2002. http://dx.doi.org/10.1007/978-1-4615-0561-7_6.
Texto completoCao, Huan, Lili Wu, Yue Chen, Yongtao Su, Zhengchao Lei, and Chunping Zhao. "Analysis on the Security of Satellite Internet." In Communications in Computer and Information Science, 193–205. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-33-4922-3_14.
Texto completoKizza, Joseph Migga. "Internet of Things (IoT): Growth, Challenges, and Security." In Guide to Computer Network Security, 517–31. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-55606-2_24.
Texto completoWarren, Christopher, Eman El-Sheikh, and Nhien-An Le-Khac. "Privacy Preserving Internet Browsers: Forensic Analysis of Browzar." In Computer and Network Security Essentials, 369–88. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58424-9_21.
Texto completoMaillé, Patrick, Peter Reichl, and Bruno Tuffin. "Internet Governance and Economics of Network Neutrality." In Lecture Notes in Computer Science, 108–16. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30382-1_15.
Texto completoActas de conferencias sobre el tema "Internet (computer network)"
Das, Divyajyoti, and Somesh Nanda. "Securing computer networks by networking multiple OS kernels. Revisting network security: Protecting computer networks from malwares." In 2013 World Congress on Internet Security (WorldCIS). IEEE, 2013. http://dx.doi.org/10.1109/worldcis.2013.6751025.
Texto completoGarsva, Eimantas, Nerijus Paulauskas, Gediminas Grazulevicius, and Lech Gulbinovic. "Academic computer network traffic statistical analysis." In 2012 2nd Baltic Congress on Future Internet Communications (BCFIC). IEEE, 2012. http://dx.doi.org/10.1109/bcfic.2012.6217987.
Texto completoZhou, Yun-xia, Yue-long Zhao, and Xi Yang. "The Computer Network with Intelligent Disks." In 2010 International Conference on Internet Technology and Applications (iTAP). IEEE, 2010. http://dx.doi.org/10.1109/itapp.2010.5566576.
Texto completoZhang, Zehao, Lin Peng, He Wang, Jin Sun, Tao Chang, and Ling Zhuo. "A wearable computer wireless sensor network." In 2017 IEEE Conference on Energy Internet and Energy System Integration (EI2). IEEE, 2017. http://dx.doi.org/10.1109/ei2.2017.8245389.
Texto completoKotenko, Igor, and Alexander Ulanov. "Antagonistic Agents in the Internet: Computer Network Warfare Simulation." In 2006 9th International Conference on Information Fusion. IEEE, 2006. http://dx.doi.org/10.1109/icif.2006.301705.
Texto completoBulira, Damian, and Krzysztof Walkowiak. "Voice and video streaming in wireless computer networks - evaluation of network delays." In 2012 2nd Baltic Congress on Future Internet Communications (BCFIC). IEEE, 2012. http://dx.doi.org/10.1109/bcfic.2012.6217996.
Texto completoXianglong, Liu, Lou Yihua, Liang Yuan, and Shan Baosong. "Predicting Internet Network Distance Using ISOMAP." In 2010 Second International Workshop on Education Technology and Computer Science. IEEE, 2010. http://dx.doi.org/10.1109/etcs.2010.245.
Texto completoMatray, Peter, Peter Haga, Sandor Laki, Istvan Csabai, and Gabor Vattay. "On the network geography of the Internet." In IEEE INFOCOM 2011 - IEEE Conference on Computer Communications. IEEE, 2011. http://dx.doi.org/10.1109/infcom.2011.5934909.
Texto completoXiong, Sha. "The Application of “Internet+” Artificial Intelligence in Computer Network Technology." In 2023 2nd International Conference on Data Analytics, Computing and Artificial Intelligence (ICDACAI). IEEE, 2023. http://dx.doi.org/10.1109/icdacai59742.2023.00068.
Texto completoLiu, Qiming, and Changsong Deng. "An Computer Virus Spreading Model with Delayed Quarantine in Internet." In ICCNS '16: 6th International Conference on Communication and Network Security. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/3017971.3017972.
Texto completoInformes sobre el tema "Internet (computer network)"
Vasilenko, L. A., and A. I. Mitin. Global computer network INTERNET (history, organization, access, prospects). Educational edition, 1996. http://dx.doi.org/10.18411/vasilenko-2-9.
Texto completoVEDESHKINA, NATALIA A., and VALENTINA A. MAXIMENKO. COMPUTER GAME "THE WAY TO A SECURE INTERNET". SIB-Expertise, November 2023. http://dx.doi.org/10.12731/er0743.18112023.
Texto completoNechaev, V., Володимир Миколайович Соловйов, and A. Nagibas. Complex economic systems structural organization modelling. Politecnico di Torino, 2006. http://dx.doi.org/10.31812/0564/1118.
Texto completoSokolovsky, Dmitry, Sergey Sokolov, and Alexey Rezaykin. e-learning course "Informatics". SIB-Expertise, January 2024. http://dx.doi.org/10.12731/er0785.29012024.
Texto completoAllende López, Marcos, Diego López, Sergio Cerón, Antonio Leal, Adrián Pareja, Marcelo Da Silva, Alejandro Pardo, et al. Quantum-Resistance in Blockchain Networks. Inter-American Development Bank, June 2021. http://dx.doi.org/10.18235/0003313.
Texto completoBragdon, Sophia, Vuong Truong, and Jay Clausen. Environmentally informed buried object recognition. Engineer Research and Development Center (U.S.), November 2022. http://dx.doi.org/10.21079/11681/45902.
Texto completoModlo, Yevhenii O., Serhiy O. Semerikov, Ruslan P. Shajda, Stanislav T. Tolmachev, and Oksana M. Markova. Methods of using mobile Internet devices in the formation of the general professional component of bachelor in electromechanics competency in modeling of technical objects. [б. в.], July 2020. http://dx.doi.org/10.31812/123456789/3878.
Texto completoPatel, Reena. Complex network analysis for early detection of failure mechanisms in resilient bio-structures. Engineer Research and Development Center (U.S.), June 2021. http://dx.doi.org/10.21079/11681/41042.
Texto completoVarina, Hanna B., Viacheslav V. Osadchyi, Kateryna P. Osadcha, Svetlana V. Shevchenko, and Svitlana H. Lytvynova. Peculiarities of cloud computing use in the process of the first-year students' adaptive potential development. [б. в.], June 2021. http://dx.doi.org/10.31812/123456789/4453.
Texto completoGoncharenko, Tatiana, Nataliia Yermakova-Cherchenko, and Yelyzaveta Anedchenko. Experience in the Use of Mobile Technologies as a Physics Learning Method. [б. в.], November 2020. http://dx.doi.org/10.31812/123456789/4468.
Texto completo