feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Cham :Springer Nature Switzerland, | Cham :Springer.
    UID:
    edoccha_BV048919243
    Format: 1 Online-Ressource (XXIV, 277 p. 46 illus., 38 illus. in color).
    Edition: 1st ed. 2023
    ISBN: 978-3-031-27765-8
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-27764-1
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-27766-5
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-27767-2
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Cham :Springer Nature Switzerland, | Cham :Springer.
    UID:
    edocfu_BV048919243
    Format: 1 Online-Ressource (XXIV, 277 p. 46 illus., 38 illus. in color).
    Edition: 1st ed. 2023
    ISBN: 978-3-031-27765-8
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-27764-1
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-27766-5
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-27767-2
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    b3kat_BV048919243
    Format: 1 Online-Ressource (XXIV, 277 p. 46 illus., 38 illus. in color)
    Edition: 1st ed. 2023
    ISBN: 9783031277658
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-27764-1
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-27766-5
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-27767-2
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Cham :Springer Nature Switzerland, | Cham :Springer.
    UID:
    almafu_BV048919243
    Format: 1 Online-Ressource (XXIV, 277 p. 46 illus., 38 illus. in color).
    Edition: 1st ed. 2023
    ISBN: 978-3-031-27765-8
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-27764-1
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-27766-5
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-27767-2
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    almahu_9949385723802882
    Format: 1 online resource (xix, 272 pages)
    Edition: First edition.
    ISBN: 9781000609769 , 1000609766 , 9781003300908 , 1003300901 , 9781000609721 , 1000609723
    Content: This book, divided into three parts, describes the detailed concepts of Digital Communication, Security, and Privacy protocols. In Part One, the first chapter provides a deeper perspective on communications, while Chapters 2 and 3 focus on analog and digital communication networks. Part Two then delves into various Digital Communication protocols. Beginning first in Chapter 4 with the major Telephony protocols, Chapter 5 then focuses on important Data Communication protocols, leading onto the discussion of Wireless and Cellular Communication protocols in Chapter 6 and Fiber Optic Data Transmission protocols in Chapter 7. Part Three covers Digital Security and Privacy protocols including Network Security protocols (Chapter 8), Wireless Security protocols (Chapter 9), and Server Level Security systems (Chapter 10), while the final chapter covers various aspects of privacy related to communication protocols and associated issues. This book will offer great benefits to graduate and undergraduate students, researchers, and practitioners. It could be used as a textbook as well as reference material for these topics. All the authors are well-qualified in this domain. The authors have an approved textbook that is used in some US, Saudi, and Bangladeshi universities since Fall 2020 semester - although used in online lectures/classes due to COVID-19 pandemic.
    Note: 〈P〉〈b〉Part One〈/b〉〈/p〉〈p〉Introduction to Analog & Digital Communication Protocols〈/p〉〈p〉Chapter 01 -- Evolution of Communication Protocols〈/p〉〈p〉Chapter 02 -- Introduction to Analog Communication Protocols〈/p〉〈p〉Chapter 03 -- Introduction to Digital Communication Protocols〈/p〉〈p〉〈b〉Part Two〈/b〉〈/p〉〈p〉Chapter 04 -- Major Telephony Protocols〈/p〉〈p〉Chapter 05 -- Important Data Communication Protocols〈/p〉〈p〉Chapter 06 -- Wireless and Cellular Communication Protocols〈/p〉〈p〉Chapter 07 -- Fiber Optic Data Transmission Protocols〈/p〉〈p〉〈b〉Part Three〈/b〉〈/p〉〈p〉Chapter 08 -- Network Security Protocols〈/p〉〈p〉Chapter 09 -- Wireless Security Protocols〈/p〉〈p〉Chapter 10 -- Server Level Security Systems〈/p〉〈p〉Chapter 11 -- Privacy〈/p〉〈p〉〈b〉Bibliography〈/b〉〈/p〉
    Additional Edition: Print version: ISBN 103229292X
    Additional Edition: ISBN 9781032292922
    Additional Edition: ISBN 1032292873
    Additional Edition: ISBN 9781032292878
    Language: English
    Keywords: Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Boca Raton :CRC Press,
    UID:
    almahu_9949385394002882
    Format: 1 online resource
    Edition: First edition.
    ISBN: 9781003230106 , 1003230105 , 9781000487275 , 100048727X , 9781000487244 , 1000487245
    Content: "This book describes the detailed concepts of mobile security. The first two chapters provide a deeper perspective on communication networks while the rest of the book focuses on different aspects of mobile security, wireless networks, and cellular networks. This book also explores issues of mobile, IoT (Internet of Things) devices for shopping and password management and threats related to these devices. A few chapters are fully dedicated to the cellular technology wireless network. The management of password for the mobile with the modern technologies that helps on how to create and manage passwords more effectively is also described in full detail. This book also covers aspects of wireless networks and their security mechanisms. The details of the routers and the most commonly used Wi-Fi routers are provided with some step-by-step procedures to configure and secure them more efficiently. This book will offer great benefits to the students of graduate and undergraduate classes, researchers, and also practitioners"--
    Additional Edition: Print version: Thakur, Kutub. Securing mobile devices and technology. Boca Raton : CRC Press, 2022 ISBN 9781032136110
    Language: English
    Keywords: Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    b3kat_BV049814820
    Format: xvi, 274 Seiten , Illustrationen
    Edition: First edition
    ISBN: 9781032754802 , 9781032754819
    Additional Edition: Erscheint auch als Online-Ausgabe ISBN 9781003474173
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Boca Raton, FL :CRC Press,
    UID:
    almahu_9949385979402882
    Format: 1 online resource
    Edition: First edition.
    ISBN: 9781000059571 , 100005957X , 9781003035626 , 1003035620 , 9781000059632 , 1000059634 , 9781000059601 , 100005960X
    Content: Cybersecurity Fundamentals: A Real-World Perspective explains detailed concepts within computer networks and computer security in an easy-to-understand way, making it the perfect introduction to the topic. This book covers fundamental issues using practical examples and real-world applications to give readers a rounded understanding of the subject and how it is applied. The first three chapters provide a deeper perspective on computer networks, cybersecurity, and different types of cyberattacks that hackers choose to unleash on cyber environments. It then goes on to cover the types of major computer malware and cybersecurity attacks that shook the cyber world in the recent years, detailing the attacks and analyzing their impact on the global economy. The details of the malware codes that help the hacker initiate the hacking attacks on networks are fully described. It then covers high-tech cybersecurity programs, devices, and mechanisms that are extensively adopted in modern security systems. Examples of those systems include intrusion detection systems (IDS), intrusion prevention systems (IPS), and security firewalls. It demonstrates how modern technologies can be used to create and manage passwords for secure data. This book also covers aspects of wireless networks and their security mechanisms. The details of the most commonly used Wi-Fi routers are provided with step-by-step procedures to configure and secure them more efficiently. Test questions are included throughout the chapters to ensure comprehension of the material. Along with this book's step-by-step approach, this will allow undergraduate students of cybersecurity, network security, and related disciplines to gain a quick grasp of the fundamental topics in the area. No prior knowledge is needed to get the full benefit of this book.
    Additional Edition: Print version: ISBN 0367472503
    Additional Edition: ISBN 9780367472504
    Language: English
    Keywords: Electronic books. ; Electronic books. ; Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages