正在加载图片...
目录 I. Communications of the ACM, Special Issue: Emerging technologies for homeland security Vol 47. Issue 3. 2004 dari, O.S. Cyber defense art to science, pp 52-57 Bajcsy, R etc, Cyber defense technology networking and evaluation, pp. 58-61 II. Choi, Y B, etc(2006)Corporate wireless LAN Security: threats and an effective security assessment framework for wireless information assurance, IntJ. Mobile communications, Vol 4, No. 3, pp. 266-290 Ill. Kumar, s.(2004)Mobile communications: global trends in the 21st century, Int. Mobile communication, Vol 2, No 1, pp 67-86 IV. Varshney, U, Malloy, A, Ahluwalia, P and Jain, R(2004)Wireless in the enterprise: requirements, solutions and research directions,, Int. J Mobile communications, Vol 2, No 4, pp. 354-367 V. Lim, B. and Zheng, H.(2004)A day in the life of Jini: a peek at service-oriented architecture for internet appliances, Int. J. Mobile Communication, Vol 2, No 2, pp 199-216 VI Pietro, R.D. and Mancini, LV(2003)Security and privacy issues of handheld and wearable wireless devices, Communications of the aCm. Vol 46. No 9 VIL. Wei,J, Liu, L.C. and Koong, K S(2006) An onion ring framework for develop ing and assessing mobile commerce security, IntJ mobile Communications, Vol 4, No 2, pp 128-142 VIll. Raymond R. Panko (2007) Business Data Networks and Telecommunications(Sixthedition), Prentice-Hall目 录 I. Communications of the ACM, Special Issue: Emerging technologies for homeland security, Vol. 47, Issue 3, 2004 Saydjari, O.S. Cyber defense: art to science, pp. 52 - 57 Bajcsy, R. etc, Cyber defense technology networking and evaluation, pp. 58 - 61 II. Choi, Y.B., etc (2006) ‘Corporate wireless LAN security: threats and an effective security assessment framework for wireless information assurance’, Int. J. Mobile Communications, Vol. 4, No. 3, pp.266–290. III. Kumar, S. (2004) ‘Mobile communications: global trends in the 21st century’, Int. J. Mobile Communication, Vol. 2, No. 1, pp.67–86. IV. Varshney, U., Malloy, A., Ahluwalia, P. and Jain, R. (2004) ‘Wireless in the enterprise: requirements, solutions and research directions’, Int. J. Mobile Communications, Vol. 2, No. 4, pp. 354–367. V. Lim, B. and Zheng, H. (2004) ‘A day in the life of Jini: a peek at service-oriented architecture for internet appliances’, Int. J. Mobile Communication, Vol. 2, No. 2, pp.199–216. VI. Pietro, R.D. and Mancini, L.V. (2003) Security and privacy issues of handheld and wearable wireless devices, Communications of the ACM, Vol 46, No. 9. VII. Wei, J., Liu, L.C. and Koong, K.S. (2006) ‘An onion ring framework for developing and assessing mobile commerce security’, Int. J. Mobile Communications, Vol. 4, No. 2, pp.128–142 VIII. Raymond R. Panko (2007) ‘Business Data Networks and Telecommunications (Sixth edition), Prentice-Hall
<<向上翻页
©2008-现在 cucdc.com 高等教育资讯网 版权所有