BOOKS - NETWORK TECHNOLOGIES - Security, Privacy and Reliability in Computer Communic...
Security, Privacy and Reliability in Computer Communications and Networks - Kewei Sha 2017 PDF River Publishers BOOKS NETWORK TECHNOLOGIES
ECO~14 kg CO²

1 TON

Views
76342

Telegram
 
Security, Privacy and Reliability in Computer Communications and Networks
Author: Kewei Sha
Year: 2017
Pages: 200
Format: PDF
File size: 37 MB
Language: ENG



Pay with Telegram STARS
''

You may also be interested in:

UNIX System Security A Guide for Users and System Administrators
The Hitwoman vs The Security Guard (Confessions of a Slightly Neurotic Hitwoman, #32)
When He|s Wild (Walker Security: Adrian|s Trilogy, #3)
Cloud Native Security Cookbook Recipes for a Secure Cloud
Mastering Linux Security Step by Step Practical Guide
The case for the welfare state: From social security to social equality
Hacking Exposed Web 2.0 Web 2.0 Security Secrets and Solutions
The Hybrid Age: International Security in the Era of Hybrid Warfare
The Routledge Handbook of Transatlantic Security (Routledge Handbooks) (2010-07-30)
When He|s Bad (Walker Security: Adrian|s Trilogy, #2)
The Network Security Test Lab A Step-by-Step Guide
Hacking Exposed Linux Linux Security Secrets and Solutions
International Relations Theory of War (Praeger Security International)
How to Code in Python 3 A Step-by-Step guide to Computer Coding on Python for Beginners and Experts
MCQ for Python Users Get Ready for Computer Science Examinations with 5000+ Python MCQ
MCQ for Python Users Get Ready for Computer Science Examinations with 5000+ Python MCQ
Digital Image Processing and Analysis Computer Vision and Image Analysis, 4th Edition
Digital Image Processing and Analysis Computer Vision and Image Analysis, 4th Edition
Parallel and Distributed Computing, Applications and Technologies: 23rd International Conference, PDCAT 2022, Sendai, Japan, December 7-9, 2022, Proceedings … Notes in Computer Science Book 1379
Artificial Intelligence and Machine Learning: 34th Joint Benelux Conference, BNAIC Benelearn 2022, Mechelen, Belgium, November 7-9, 2022, Revised … in Computer and Information Science, 1805)
Artificial Life and Evolutionary Computation: 15th Italian Workshop, WIVACE 2021, Winterthur, Switzerland, September 15-17, 2021, Revised Selected Papers … Computer and Information Science Book
Database Systems for Advanced Applications: 28th International Conference, DASFAA 2023, Tianjin, China, April 17-20, 2023, Proceedings, Part III (Lecture Notes in Computer Science Book 13945)
Mathematical Optimization Theory and Operations Research: Recent Trends: 22nd International Conference, MOTOR 2023, Ekaterinburg, Russia, July 2-8, 2023, … Computer and Information Science Book
Universal Access in Human-Computer Interaction: Design Methods, Tools, and Interaction Techniques for eInclusion: 7th International Conference, UAHCI … Applications, incl. Internet Web, and HCI)
Recent Trends in Analysis of Images, Social Networks and Texts: 10th International Conference, AIST 2021, Tbilisi, Georgia, December 16-18, 2021, … in Computer and Information Science, 1573)
Machine Learning and Knowledge Discovery in Databases: European Conference, ECML PKDD 2020, Ghent, Belgium, September 14-18, 2020, Proceedings, Part I (Lecture Notes in Computer Science Book 12457)
Tourism Security: Strategies for Effectively Managing Travel Risk and Safety by Tarlow Ph.D. in Sociology Texas A and M University, Peter 1st edition (2014) Paperback
New Foundations for Asian and Pacific Security. Based on the Addresses, Papers, Reports, and Discussion Sessions of an International Conference Held at Pattaya, Thailand, December 12-16, 1979 .
Pro Spring Security Securing Spring Framework 6 and Boot 3-based Java Applications, 3rd Edition
Security for Cloud Native Applications The practical guide for securing modern applications using AWS, Azure, and GCP
A New Approach to the Nuclear Fuel Cycle: Best Practices for Security, Nonproliferation, and Sustainable Nuclear Energy (CSIS Reports)
The Russian Secret Police Muscovite, Imperial Russian and Soviet Political Security Operations, 1565-1970
Handbook of Systems Engineering and Risk Management in Control Systems, Communication, Space Technology, Missile, Security
IoT Technologies in Smart-Cities From sensors to big data, security and trust (Control, Robotics and Sensors)
Ultimate Penetration Testing with Nmap Master Cybersecurity Assessments for Network Security, Monitoring, and Scanning Using Nmap
Pro Spring Security Securing Spring Framework 6 and Boot 3-based Java Applications, 3rd Edition
Criminality, Public Security, and the Challenge to Democracy in Latin America (Kellogg Institute Series on Democracy and Development)
Industrial Network Security Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control
The Offences Against the State Act 1939 at 80: A Model Counter-Terrorism Act? (Hart Studies in Security and Justice)
Security for Cloud Native Applications The practical guide for securing modern applications using AWS, Azure, and GCP