Libri sul tema "Security protocol"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 libri per l'attività di ricerca sul tema "Security protocol".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi i libri di molte aree scientifiche e compila una bibliografia corretta.
Jones, Benjamin Edward. Improving security in the FDDI protocol. Naval Postgraduate School, 1992.
Cerca il testo completoUnited Service Institution of India, ed. Integrated maritime security: Governing the ghost protocol. United Service Institution of India, 2014.
Cerca il testo completoMiller, Derek. The security needs assessment protocol: Improving operational effectiveness through community security. United Nations Institute for Disarmament Research, 2008.
Cerca il testo completo1969-, Rudnick Lisa B., and United Nations Institute for Disarmament Research, eds. The security needs assessment protocol: Improving operational effectiveness through community security. United Nations, 2008.
Cerca il testo completoMiller, Derek. The security needs assessment protocol: Improving operational effectiveness through community security. United Nations Institute for Disarmament Research, 2008.
Cerca il testo completoHehir, Stephen. A security target for the X.435 protocol. National Physical Laboratory, 1995.
Cerca il testo completoKaksonen, Rauli. A functional method for assessing protocol implementation security. Technical Research Centre of Finland, 2001.
Cerca il testo completoHeld, Gilbert. Managing TCP/IP networks: Techniques, tools, and security considerations. Wiley & Sons, 2000.
Cerca il testo completoArmando, Alessandro, and Gavin Lowe, eds. Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16074-5.
Testo completoCanada. Dept. of External Affairs. Social security: Agreement between Canada and Finland (with protocol). s.n, 1989.
Cerca il testo completoDarroca, Gregorio G. Framework for a Link Layer Packet Filtering (LLPF) security protocol. Naval Postgraduate School, 1998.
Cerca il testo completoUnited States. Congress. Senate. Committee on Foreign Relations. Airport security protocol: Report (to accompany Treaty Doc. 101-19). U.S. G.P.O., 1989.
Cerca il testo completoBishop, Matt. A security analysis of version 2 of the Network Time Protocol NPT: A report to the Privacy and Security Research Group. National Aeronautics and Space Administration, 1991.
Cerca il testo completoUnited States. National Aeronautics and Space Administration., ed. A security analysis of version 2 of the Network Time Protocol NPT: A report to the Privacy and Security Research Group. National Aeronautics and Space Administration, 1991.
Cerca il testo completoBelgium. Social security: Agreement with final protocol, between the United States of America and Belgium, signed at Washington February 19, 1982 and additional protocol and administrative, agreement, signed at Brussels November 23, 1982. Dept. of State, 1991.
Cerca il testo completoLoeb, Larry. Secure electronic transactions: Implementing the SET protocol. International Thomson Computer Press, 1997.
Cerca il testo completoCanada. Dept. of External Affairs. Social security: Convention on Social Security between the Government of Canada and the Government of Luxembourg (with Protocol). s.n, 1991.
Cerca il testo completoFeit, Sidnie. TCP/IP: Architecture, protocols, and implementation with IPv6 and IP security. 2nd ed. McGraw-Hill, 1997.
Cerca il testo completoCanada. Dept. of External Affairs. Social security: Agreement between Canada and Norway (with Final Protocol and administrative arrangement). s.n, 1989.
Cerca il testo completoIEEE Computer Society. Storage Systems Standards Committee., Institute of Electrical and Electronics Engineers., IEEE Standards Board, and IEEE Standards Association, eds. IEEE standard for Media Management System (MMS) Session Security, Authentication, Initialization Protocol (SSAIP). Institute of Electrical and Electronics Engineers, 2000.
Cerca il testo completoSchulzrinne, Henning, Dorgham Sisalem, John Floroiu, Jiri Kuthan, and Ulrich Abend. SIP Security. Wiley & Sons, Limited, John, 2009.
Cerca il testo completoSchulzrinne, Henning, Dorgham Sisalem, John Floroiu, Ulrich Abend, and Jirí Kuthan. Sip Security. Wiley & Sons, Incorporated, John, 2009.
Cerca il testo completoShoniregun, Charles A. A. Synchronizing Internet Protocol Security. Springer, 2010.
Cerca il testo completoTechnology, National Institute of Standards and. Border Gateway Protocol Security. CreateSpace Independent Publishing Platform, 2014.
Cerca il testo completoSynchronizing Internet Protocol Security (SIPSec). Springer US, 2007. http://dx.doi.org/10.1007/978-0-387-68569-4.
Testo completoShoniregun, Charles A. Synchronizing Internet Protocol Security (SIPSec). Springer London, Limited, 2007.
Cerca il testo completoVoice over Internet Protocol (VoIP) Security. Elsevier, 2005. http://dx.doi.org/10.1016/b978-1-55558-332-3.x5000-6.
Testo completoRittinghouse, PhD CISM John, and PhD, CISM, CISSP, James F. Ransome. Voice over Internet Protocol (VoIP) Security. Digital Press, 2004.
Cerca il testo completoJohn, Rittinghouse CISM, and Ransome, , CISM, CISSP, James F. Voice over Internet Protocol (VoIP) Security. Elsevier Science & Technology Books, 2005.
Cerca il testo completoSynchronizing Internet Protocol Security (SIPSec) (Advances in Information Security). Springer, 2007.
Cerca il testo completoXie, Bin. Heterogeneous Wireless Networks- Networking Protocol to Security. VDM Verlag Dr. Mueller e.K., 2007.
Cerca il testo completoGoyal, Dinesh, S. Balamurugan, Sheng‐Lung Peng, and O. P. Verma, eds. Design and Analysis of Security Protocol for Communication. Wiley, 2020. http://dx.doi.org/10.1002/9781119555759.
Testo completoChen, Kefei, and Ling Dong. Cryptographic Protocol: Security Analysis Based on Trusted Freshness. Springer, 2012.
Cerca il testo completoCryptographic Protocol: Security Analysis Based on Trusted Freshness. Springer London, Limited, 2012.
Cerca il testo completoVerma, O. P., Sheng-Lung Peng, Dinesh Goyal, and S. Balamurugan. Design and Analysis of Security Protocol for Communication. Wiley & Sons, Limited, John, 2020.
Cerca il testo completoVerma, O. P., Sheng-Lung Peng, Dinesh Goyal, and S. Balamurugan. Design and Analysis of Security Protocol for Communication. Wiley & Sons, Incorporated, John, 2020.
Cerca il testo completoDenial of Service Attacks on 802.1X Security Protocol. Storming Media, 2004.
Cerca il testo completoChen, Kefei, and Ling Dong. Cryptographic Protocol: Security Analysis Based on Trusted Freshness. Springer, 2012.
Cerca il testo completoVerma, O. P., Sheng-Lung Peng, Dinesh Goyal, and S. Balamurugan. Design and Analysis of Security Protocol for Communication. Wiley & Sons, Incorporated, John, 2020.
Cerca il testo completoMiller, David Hunter. The Geneva Protocol. CreateSpace Independent Publishing Platform, 2017.
Cerca il testo completoTCP/IP: Architecture, Protocols, and Implementation with IPv6 and IP Security. McGraw Hill Education (India) Private Limited, 2008.
Cerca il testo completoTCP/IP: Architcture, protocols, and implementation with IPv6 and IP security. McGraw-Hill, 1998.
Cerca il testo completoSIP Handbook: Services, Technologies, and Security of Session Initiation Protocol. CRC, 2008.
Cerca il testo completo