A partir de cette page vous pouvez :
Retourner au premier écran avec les catégories... |
RĂ©sultat de la recherche
9 résultat(s) recherche sur le mot-clé 'TCP%2FIP%28Computer network protocol%29'
Affiner la recherche
IP for 3G Networking technologies for Mobile Communications / Wisely DAVE
Titre : IP for 3G Networking technologies for Mobile Communications Type de document : texte imprimé Auteurs : Wisely DAVE, Auteur; Philip EARDLEY, Auteur; Louise BURNESS, Auteur Année de publication : 2002 Importance : ix, 295 p. Présentation : ill. Format : 24 cm ISBN/ISSN/EAN : 978-0-471-48697-8 Note générale : Includes bibliographical references and index Langues : Anglais (eng) Catégories : 600 Techniques (Sciences appliquées):621 Applied physics:621.406 Turbines:621.382 Technique des communications Mots-clés : Wireless internet Global system for mobile communications TCP/IP(Computer network protocol) Index. décimale : 621.382 IP for 3G Networking technologies for Mobile Communications [texte imprimé] / Wisely DAVE, Auteur; Philip EARDLEY, Auteur; Louise BURNESS, Auteur . - 2002 . - ix, 295 p. : ill. ; 24 cm.
ISBN : 978-0-471-48697-8
Includes bibliographical references and index
Langues : Anglais (eng)RĂ©servation
RĂ©server ce document
Exemplaires
Code-barres Cote Support Localisation Section Disponibilité 104370 621.382 WIS Livre Library Shelf Disponible 115129 621.382 WIS-1 Livre Library Shelf Disponible 115130 621.382 WIS-2 Livre Library Shelf Disponible 115131 621.382 WIS-3 Livre Library Shelf Disponible AI and Machine Learning for Network and Security Management / Yulei Wu
Titre : AI and Machine Learning for Network and Security Management Type de document : texte imprimé Auteurs : Yulei Wu, Auteur Editeur : Wiley-IEEE Press Année de publication : 2023 Importance : xix, 263 pages Présentation : illustrations (graph), diagram Format : 24 cm ISBN/ISSN/EAN : 978-1-11-983587-5 Langues : Anglais (eng) Catégories : 006 Special computer methods Mots-clés : AI and Machine Learning for Network and Security Management Index. décimale : 006.76 Résumé : Al and Machine Learning for Network and Security Management covers a range of key topics of
network automation for network and security management, including resource allocation and
scheduling, network planning and routing, encrypted traffic classification, anomaly detection,
and security operations. In addition, the authors introduce their large-scale intelligent network
management and operation system and elaborate on how the aforementioned areas can be
integrated into this system, plus how the network service can benefit.AI and Machine Learning for Network and Security Management [texte imprimé] / Yulei Wu, Auteur . - [S.l.] : Wiley-IEEE Press, 2023 . - xix, 263 pages : illustrations (graph), diagram ; 24 cm.
ISBN : 978-1-11-983587-5
Langues : Anglais (eng)
Catégories : 006 Special computer methods Mots-clés : AI and Machine Learning for Network and Security Management Index. décimale : 006.76 Résumé : Al and Machine Learning for Network and Security Management covers a range of key topics of
network automation for network and security management, including resource allocation and
scheduling, network planning and routing, encrypted traffic classification, anomaly detection,
and security operations. In addition, the authors introduce their large-scale intelligent network
management and operation system and elaborate on how the aforementioned areas can be
integrated into this system, plus how the network service can benefit.Exemplaires
Code-barres Cote Support Localisation Section DisponibilitĂ© 125094 006.76 WUY Livre Library Repository Exclu du prĂȘt Cryptography and network security : principles and practice / William STALLINGS
Titre : Cryptography and network security : principles and practice Type de document : texte imprimé Auteurs : William STALLINGS, Auteur; Mohit P. Tahiliani, Auteur Mention d'édition : Fourth Edition Editeur : Pearson Education International Année de publication : 2006 Importance : 680 Pages Présentation : ill Format : 24cm ISBN/ISSN/EAN : 978-0-13-202322-1 Langues : Anglais (eng) Catégories : 005.8 Public key infrastructure (Computer security) Mots-clés : Cryptography and network security : principles and practice' ' Index. décimale : 005.8 Cryptography and network security : principles and practice [texte imprimé] / William STALLINGS, Auteur; Mohit P. Tahiliani, Auteur . - Fourth Edition . - [S.l.] : Pearson Education International, 2006 . - 680 Pages : ill ; 24cm.
ISBN : 978-0-13-202322-1
Langues : Anglais (eng)
Catégories : 005.8 Public key infrastructure (Computer security) Mots-clés : Cryptography and network security : principles and practice' ' Index. décimale : 005.8 Exemplaires
Code-barres Cote Support Localisation Section DisponibilitĂ© 0-120338 005.8 STA Livre Library Shelf Exclu du prĂȘt Engineering circuit analysis (sith.Ed.) / William H.Hayt,Jr.
Titre : Engineering circuit analysis (sith.Ed.) Type de document : texte imprimé Auteurs : William H.Hayt,Jr., Auteur; Jack E.Kemmerly, Auteur; Steven M. Durbin, Auteur Editeur : MC GRAW-HILL Année de publication : 2002 Importance : 781p. ISBN/ISSN/EAN : 978-0-07-121068-3 Langues : Anglais (eng) Mots-clés : Electri circuit analysis. Electric network analysis Index. décimale : 621.319 Engineering circuit analysis (sith.Ed.) [texte imprimé] / William H.Hayt,Jr., Auteur; Jack E.Kemmerly, Auteur; Steven M. Durbin, Auteur . - [S.l.] : MC GRAW-HILL, 2002 . - 781p..
ISBN : 978-0-07-121068-3
Langues : Anglais (eng)
Mots-clés : Electri circuit analysis. Electric network analysis Index. décimale : 621.319 Réservation
RĂ©server ce document
Exemplaires
Code-barres Cote Support Localisation Section Disponibilité 112867 621.319 WIL -1 Livre Library Shelf Disponible 112868 621.319 WIL -2 Livre Library Shelf Disponible 112869 621.319 WIL -3 Livre Library Shelf Disponible 112870 621.319 WIL -4 Livre Library Shelf Disponible Network security / Radia Perlman
Titre : Network security Type de document : texte imprimé Auteurs : Radia Perlman, Auteur Mention d'édition : Third edition Editeur : Pearson Education, Inc Année de publication : 2023 Importance : xx, 455, G15, M26, B14, I10 pages Présentation : illustrations Format : 24 cm ISBN/ISSN/EAN : 978-0-13-664360-9 Langues : Anglais (eng) Catégories : 005.8 Data security Mots-clés : Network security Index. décimale : 005.8 Résumé : Widely regarded as the most comprehensive yet comprehensible guide to network security and cryptography, the previous editions of Network Security received critical acclaim for lucid and witty explanations of the inner workings of cryptography and network security protocols. In this edition, the authors have significantly updated and revised the previous content, and added new topics that have become important. This book explains sophisticated concepts in a friendly and intuitive manner. For protocol standards, it explains the various constraints and committee decisions that led to the current designs. For cryptographic algorithms, it explains the intuition behind the designs, as well as the types of attacks the algorithms are designed to avoid. It explains implementation techniques that can cause vulnerabilities even if the cryptography itself is sound. Homework problems deepen your understanding of concepts and technologies, and an updated glossary demystifies the field's jargon. Network Security, Third Edition will appeal to a wide range of professionals, from those who design and evaluate security systems to system administrators and programmers who want a better understanding of this important field. It can also be used as a textbook at the graduate or advanced undergraduate level. Coverage includes * Network security protocol and cryptography basics * Design considerations and techniques for secret key and hash algorithms (AES, DES, SHA-1, SHA-2, SHA-3) * First-generation public key algorithms (RSA, Diffie-Hellman, ECC) * How quantum computers work, and why they threaten the first-generation public key algorithms * Quantum computers: how they work, and why they threaten the first-generation public key algorithms * Multi-factor authentication of people * Real-time communication (SSL/TLS, SSH, IPsec) * New applications (electronic money, blockchains) * New cryptographic techniques (homomorphic encryption, secure multiparty computation) Network security [texte imprimé] / Radia Perlman, Auteur . - Third edition . - [S.l.] : Pearson Education, Inc, 2023 . - xx, 455, G15, M26, B14, I10 pages : illustrations ; 24 cm.
ISBN : 978-0-13-664360-9
Langues : Anglais (eng)
Catégories : 005.8 Data security Mots-clés : Network security Index. décimale : 005.8 Résumé : Widely regarded as the most comprehensive yet comprehensible guide to network security and cryptography, the previous editions of Network Security received critical acclaim for lucid and witty explanations of the inner workings of cryptography and network security protocols. In this edition, the authors have significantly updated and revised the previous content, and added new topics that have become important. This book explains sophisticated concepts in a friendly and intuitive manner. For protocol standards, it explains the various constraints and committee decisions that led to the current designs. For cryptographic algorithms, it explains the intuition behind the designs, as well as the types of attacks the algorithms are designed to avoid. It explains implementation techniques that can cause vulnerabilities even if the cryptography itself is sound. Homework problems deepen your understanding of concepts and technologies, and an updated glossary demystifies the field's jargon. Network Security, Third Edition will appeal to a wide range of professionals, from those who design and evaluate security systems to system administrators and programmers who want a better understanding of this important field. It can also be used as a textbook at the graduate or advanced undergraduate level. Coverage includes * Network security protocol and cryptography basics * Design considerations and techniques for secret key and hash algorithms (AES, DES, SHA-1, SHA-2, SHA-3) * First-generation public key algorithms (RSA, Diffie-Hellman, ECC) * How quantum computers work, and why they threaten the first-generation public key algorithms * Quantum computers: how they work, and why they threaten the first-generation public key algorithms * Multi-factor authentication of people * Real-time communication (SSL/TLS, SSH, IPsec) * New applications (electronic money, blockchains) * New cryptographic techniques (homomorphic encryption, secure multiparty computation) Exemplaires
Code-barres Cote Support Localisation Section DisponibilitĂ© 125082 005.8 PER Livre Library Repository Exclu du prĂȘt TCP-IP administration de rĂ©seau / Craig Hunt
Titre : TCP-IP administration de réseau Type de document : texte imprimé Auteurs : Craig Hunt, Auteur; éric Dumas, Traducteur Mention d'édition : 2e éd. Editeur : Paris : O'Reilly Année de publication : 1999 Importance : XXIV-628 p. Présentation : ill., couv. ill. Format : 24 cm ISBN/ISSN/EAN : 978-2-84177-051-9 Prix : 320 F Note générale : Index Langues : Français (fre) Langues originales : Anglais (eng) Catégories : 000 Généralités:Traitement des données. Informatique:Interfaces et communication Mots-clés : TCP/IP ( protocole de réseaux d'ordinateurs) Index. décimale : 004.6 TCP-IP administration de réseau [texte imprimé] / Craig Hunt, Auteur; éric Dumas, Traducteur . - 2e éd. . - Paris : O'Reilly, 1999 . - XXIV-628 p. : ill., couv. ill. ; 24 cm.
ISBN : 978-2-84177-051-9 : 320 F
Index
Langues : Français (fre) Langues originales : Anglais (eng)
Catégories : 000 Généralités:Traitement des données. Informatique:Interfaces et communication Mots-clés : TCP/IP ( protocole de réseaux d'ordinateurs) Index. décimale : 004.6 Exemplaires
Code-barres Cote Support Localisation Section DisponibilitĂ© 110154 004.6 HUN Livre Library Shelf Exclu du prĂȘt TCP-IP et les services rĂ©seaux / Sylvain Caicoya
Titre : TCP-IP et les services rĂ©seaux : La formation pour devenir opĂ©rationnel Type de document : texte imprimĂ© Auteurs : Sylvain Caicoya, Auteur; Jean-Georges Saury, Auteur Editeur : Paris : Micro application AnnĂ©e de publication : 2006 Collection : Ateliers techniques Importance : 1 vol. (407 p.) PrĂ©sentation : ill., couv. ill. en coul. Format : 23 cm ISBN/ISSN/EAN : 978-2-7429-6965-4 Prix : 44,95 EUR Note gĂ©nĂ©rale : La couv. porte en plus : "la formation pour devenir opérationnel"
IndexLangues : Anglais (eng) Catégories : 000 Généralités:Traitement des données. Informatique:Interfaces et communication Mots-clés : TCP/IP (protocole de réseaux d'ordinateurs) Index. décimale : 004.62 TCP-IP et les services réseaux [texte imprimé] : La formation pour devenir opérationnel / Sylvain Caicoya, Auteur; Jean-Georges Saury, Auteur . - Micro application, 2006 . - 1 vol. (407 p.) : ill., couv. ill. en coul. ; 23 cm. - (Ateliers techniques) .
ISBN : 978-2-7429-6965-4 : 44,95 EUR
La couv. porte en plus : "la formation pour devenir opérationnel"
Index
Langues : Anglais (eng)
Catégories : 000 Généralités:Traitement des données. Informatique:Interfaces et communication Mots-clés : TCP/IP (protocole de réseaux d'ordinateurs) Index. décimale : 004.62 Réservation
RĂ©server ce document
Exemplaires
Code-barres Cote Support Localisation Section DisponibilitĂ© 101070 004.62 CAI Livre Library Repository Exclu du prĂȘt 102216 004.62 CAI-1 Livre Library Shelf Disponible 102217 004.62 CAI-2 Livre Library Shelf Disponible The tangled Web / ZALEWSKI, Michal.
Titre : The tangled Web : a guide to securing modern Web applications Type de document : texte imprimé Auteurs : ZALEWSKI, Michal., Auteur Editeur : San Francisco : No Starch Press Année de publication : 2012 Importance : xix, 299 p Présentation : ill. Format : 24cm. ISBN/ISSN/EAN : 978-1-593-27388-0 Note générale : Includes bibliographical references (p. 267-282) and index. Langues : Anglais (eng) Catégories : 000 Généralités:Data security Mots-clés : Computer networks--Security measures.
Browsers (Computer programs)
Computer security.
COMPUTERS / Internet / Security.
COMPUTERS / Security / Viruses.
COMPUTERS / Networking / General.
COMPUTERS / Networking / Network Protocols.
COMPUTERS / Security / General.
COMPUTERS / Security / Cryptography.
COMPUTERS / Networking / Security.
COMPUTERS / Web / Web Programming.
COMPUTERS / Web / Browsers.Index. décimale : 005.8 Résumé : "'Thorough and comprehensive coverage from one of the foremost experts in browser security.' --Tavis Ormandy, Google Inc. Modern web applications are built on a tangle of technologies that have been developed over time and then haphazardly pieced together. Every piece of the web application stack, from HTTP requests to browser-side scripts, comes with important yet subtle security consequences. To keep users safe, it is essential for developers to confidently navigate this landscape.In The Tangled Web, Michal Zalewski, one of the world's top browser security experts, offers a compelling narrative that explains exactly how browsers work and why they're fundamentally insecure. Rather than dispense simplistic advice on vulnerabilities, Zalewski examines the entire browser security model, revealing weak points and providing crucial information for shoring up web application security. You'll learn how to: Perform common but surprisingly complex tasks such as URL parsing and HTML sanitization Use modern security features like Strict Transport Security, CSP, and CORS Leverage many variants of the same-origin policy to safely compartmentalize complex web applications and protect user credentials in case of XSS bugs Build mashups and embed gadgets without getting stung by the tricky frame navigation policy Embed or host user-supplied content without running into the trap of content sniffing For quick reference, "Security Engineering Cheat Sheets' at the end of each chapter offer ready solutions to problems you're most likely to encounter. With coverage extending as far as planned HTML5 features, The Tangled Web will help you create secure web applications to stand the test of time"-- Provided by publisher. The tangled Web [texte imprimé] : a guide to securing modern Web applications / ZALEWSKI, Michal., Auteur . - San Francisco : No Starch Press, 2012 . - xix, 299 p : ill. ; 24cm..
ISBN : 978-1-593-27388-0
Includes bibliographical references (p. 267-282) and index.
Langues : Anglais (eng)
Catégories : 000 Généralités:Data security Mots-clés : Computer networks--Security measures.
Browsers (Computer programs)
Computer security.
COMPUTERS / Internet / Security.
COMPUTERS / Security / Viruses.
COMPUTERS / Networking / General.
COMPUTERS / Networking / Network Protocols.
COMPUTERS / Security / General.
COMPUTERS / Security / Cryptography.
COMPUTERS / Networking / Security.
COMPUTERS / Web / Web Programming.
COMPUTERS / Web / Browsers.Index. décimale : 005.8 Résumé : "'Thorough and comprehensive coverage from one of the foremost experts in browser security.' --Tavis Ormandy, Google Inc. Modern web applications are built on a tangle of technologies that have been developed over time and then haphazardly pieced together. Every piece of the web application stack, from HTTP requests to browser-side scripts, comes with important yet subtle security consequences. To keep users safe, it is essential for developers to confidently navigate this landscape.In The Tangled Web, Michal Zalewski, one of the world's top browser security experts, offers a compelling narrative that explains exactly how browsers work and why they're fundamentally insecure. Rather than dispense simplistic advice on vulnerabilities, Zalewski examines the entire browser security model, revealing weak points and providing crucial information for shoring up web application security. You'll learn how to: Perform common but surprisingly complex tasks such as URL parsing and HTML sanitization Use modern security features like Strict Transport Security, CSP, and CORS Leverage many variants of the same-origin policy to safely compartmentalize complex web applications and protect user credentials in case of XSS bugs Build mashups and embed gadgets without getting stung by the tricky frame navigation policy Embed or host user-supplied content without running into the trap of content sniffing For quick reference, "Security Engineering Cheat Sheets' at the end of each chapter offer ready solutions to problems you're most likely to encounter. With coverage extending as far as planned HTML5 features, The Tangled Web will help you create secure web applications to stand the test of time"-- Provided by publisher. Exemplaires
Code-barres Cote Support Localisation Section DisponibilitĂ© 115717 005.8 ZAL Livre Library Repository Exclu du prĂȘt Transportation network modeling and calibration / Mansoureh Jeihani Koohbanani
Titre : Transportation network modeling and calibration Type de document : texte imprimé Auteurs : Mansoureh Jeihani Koohbanani, Auteur; Anam Ardeshiri, Auteur Editeur : Momentum Press, LLC Année de publication : 2017 Importance : 150 Page Présentation : ill Format : 24cm ISBN/ISSN/EAN : 978-1-606-50893-0 Langues : Anglais (eng) Catégories : 380.142 Marble industry and trade. Mots-clés : Transportation network modeling and calibration Index. décimale : 380.502854 Transportation network modeling and calibration [texte imprimé] / Mansoureh Jeihani Koohbanani, Auteur; Anam Ardeshiri, Auteur . - 222 East 46th Street, New York, NY 10017 : Momentum Press, LLC, 2017 . - 150 Page : ill ; 24cm.
ISBN : 978-1-606-50893-0
Langues : Anglais (eng)
Catégories : 380.142 Marble industry and trade. Mots-clés : Transportation network modeling and calibration Index. décimale : 380.502854 Exemplaires
Code-barres Cote Support Localisation Section DisponibilitĂ© 0-120396 380.502854 JEI Livre Library Repository Exclu du prĂȘt