当前位置:高等教育资讯网  >  中国高校课件下载中心  >  大学文库  >  浏览文档

《计算机网络》课程教学资源(学习资料)2009MIS系网络课程材料汇编(上)

资源类别:文库,文档格式:DOC,文档页数:2,文件大小:35.5KB,团购合买
点击下载完整版文档(DOC)

网络基础知识材料汇编 (上) 胥正川编印 上海 2009年1月18日

网络基础知识材料汇编 (上) 胥正川 编 印 上 海 2009 年 1 月 18 日

目录 I. Communications of the ACM, Special Issue: Emerging technologies for homeland security Vol 47. Issue 3. 2004 dari, O.S. Cyber defense art to science, pp 52-57 Bajcsy, R etc, Cyber defense technology networking and evaluation, pp. 58-61 II. Choi, Y B, etc(2006)Corporate wireless LAN Security: threats and an effective security assessment framework for wireless information assurance, IntJ. Mobile communications, Vol 4, No. 3, pp. 266-290 Ill. Kumar, s.(2004)Mobile communications: global trends in the 21st century, Int. Mobile communication, Vol 2, No 1, pp 67-86 IV. Varshney, U, Malloy, A, Ahluwalia, P and Jain, R(2004)Wireless in the enterprise: requirements, solutions and research directions,, Int. J Mobile communications, Vol 2, No 4, pp. 354-367 V. Lim, B. and Zheng, H.(2004)A day in the life of Jini: a peek at service-oriented architecture for internet appliances, Int. J. Mobile Communication, Vol 2, No 2, pp 199-216 VI Pietro, R.D. and Mancini, LV(2003)Security and privacy issues of handheld and wearable wireless devices, Communications of the aCm. Vol 46. No 9 VIL. Wei,J, Liu, L.C. and Koong, K S(2006) An onion ring framework for develop ing and assessing mobile commerce security, IntJ mobile Communications, Vol 4, No 2, pp 128-142 VIll. Raymond R. Panko (2007) Business Data Networks and Telecommunications(Sixthedition), Prentice-Hall

目 录 I. Communications of the ACM, Special Issue: Emerging technologies for homeland security, Vol. 47, Issue 3, 2004 Saydjari, O.S. Cyber defense: art to science, pp. 52 - 57 Bajcsy, R. etc, Cyber defense technology networking and evaluation, pp. 58 - 61 II. Choi, Y.B., etc (2006) ‘Corporate wireless LAN security: threats and an effective security assessment framework for wireless information assurance’, Int. J. Mobile Communications, Vol. 4, No. 3, pp.266–290. III. Kumar, S. (2004) ‘Mobile communications: global trends in the 21st century’, Int. J. Mobile Communication, Vol. 2, No. 1, pp.67–86. IV. Varshney, U., Malloy, A., Ahluwalia, P. and Jain, R. (2004) ‘Wireless in the enterprise: requirements, solutions and research directions’, Int. J. Mobile Communications, Vol. 2, No. 4, pp. 354–367. V. Lim, B. and Zheng, H. (2004) ‘A day in the life of Jini: a peek at service-oriented architecture for internet appliances’, Int. J. Mobile Communication, Vol. 2, No. 2, pp.199–216. VI. Pietro, R.D. and Mancini, L.V. (2003) Security and privacy issues of handheld and wearable wireless devices, Communications of the ACM, Vol 46, No. 9. VII. Wei, J., Liu, L.C. and Koong, K.S. (2006) ‘An onion ring framework for developing and assessing mobile commerce security’, Int. J. Mobile Communications, Vol. 4, No. 2, pp.128–142 VIII. Raymond R. Panko (2007) ‘Business Data Networks and Telecommunications (Sixth edition), Prentice-Hall

点击下载完整版文档(DOC)VIP每日下载上限内不扣除下载券和下载次数;
按次数下载不扣除下载券;
24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
已到末页,全文结束
相关文档

关于我们|帮助中心|下载说明|相关软件|意见反馈|联系我们

Copyright © 2008-现在 cucdc.com 高等教育资讯网 版权所有