Zobrazeno 1 - 10
of 13
pro vyhledávání: '"Protocol-specific structures"'
Publikováno v:
ICCST
Safety critical, Internet of Things (IoT) and space-based applications have recently begun to adopt wireless networks based on commercial off the shelf (COTS) devices and standardized protocols, which inherently establishes the security challenge of
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::13f4a534ad794c0a918996ec94003031
https://hdl.handle.net/10468/9536
https://hdl.handle.net/10468/9536
Autor:
Ioana, Alexandru1 (AUTHOR) tm.alexandru@yahoo.com, Korodi, Adrian1 (AUTHOR) adrian.korodi@upt.ro
Publikováno v:
Sensors (14248220). Oct2020, Vol. 20 Issue 19, p5591. 1p.
Publikováno v:
PIK - Praxis der Informationsverarbeitung und Kommunikation; 2008, Vol. 31 Issue 2, p76-81, 6p
Autor:
Randal E. Bryant, David R. O'Hallaron
For courses in Computer Science and Programming Computer systems: A Programmer's Perspective explains the underlying elements common among all computer systems and how they affect general application performance. Written from the programmer's perspec
Autor:
Joseph Davies
Your essential guide to deploying IPv6 on Windows networks Get in-depth technical information to put IPv6 technology to work—including networks with hardware running Windows 8 and Windows Server 2012. Written by a networking expert, this reference
Autor:
Wolfgang Mauerer
Find an introduction to the architecture, concepts and algorithms of the Linux kernel in Professional Linux Kernel Architecture, a guide to the kernel sources and large number of connections among subsystems. Find an introduction to the relevant stru
Autor:
Davies, Joseph
Now updated for Windows Server 2008 and Windows Vista, this guide delivers in-depth technical information on Internet Protocol version 6 (IPv6). IPv6 greatly improves on IPv4, the current protocol, by vastly increasing the number of available address
Autor:
Dobromir Todorov
User identification and authentication are absolutely essential to modern security. Mechanics of User Identification and Authentication presents the general philosophy of user authentication and access control. Introducing key concepts, this text out
Autor:
Christian Benvenuti
If you've ever wondered how Linux carries out the complicated tasks assigned to it by the IP protocols -- or if you just want to learn about modern networking through real-life examples -- Understanding Linux Network Internals is for you.Like the pop
Since the start of the International Workshop on Web Caching and Content Distribution (WCW) in 1996, it has served as the premiere meeting for researchers and practitioners to exchange results and visions on all aspects of content caching, distributi