中国高校课件下载中心 》 教学资源 》 大学文库

《计算机网络》课程教学资源(学习资料)2009MIS系网络课程材料汇编(上)

文档信息
资源类别:文库
文档格式:DOC
文档页数:2
文件大小:35.5KB
团购合买:点击进入团购
内容简介
《计算机网络》课程教学资源(学习资料)2009MIS系网络课程材料汇编(上)
刷新页面文档预览

网络基础知识材料汇编 (上) 胥正川编印 上海 2009年1月18日

网络基础知识材料汇编 (上) 胥正川 编 印 上 海 2009 年 1 月 18 日

目录 I. Communications of the ACM, Special Issue: Emerging technologies for homeland security Vol 47. Issue 3. 2004 dari, O.S. Cyber defense art to science, pp 52-57 Bajcsy, R etc, Cyber defense technology networking and evaluation, pp. 58-61 II. Choi, Y B, etc(2006)Corporate wireless LAN Security: threats and an effective security assessment framework for wireless information assurance, IntJ. Mobile communications, Vol 4, No. 3, pp. 266-290 Ill. Kumar, s.(2004)Mobile communications: global trends in the 21st century, Int. Mobile communication, Vol 2, No 1, pp 67-86 IV. Varshney, U, Malloy, A, Ahluwalia, P and Jain, R(2004)Wireless in the enterprise: requirements, solutions and research directions,, Int. J Mobile communications, Vol 2, No 4, pp. 354-367 V. Lim, B. and Zheng, H.(2004)A day in the life of Jini: a peek at service-oriented architecture for internet appliances, Int. J. Mobile Communication, Vol 2, No 2, pp 199-216 VI Pietro, R.D. and Mancini, LV(2003)Security and privacy issues of handheld and wearable wireless devices, Communications of the aCm. Vol 46. No 9 VIL. Wei,J, Liu, L.C. and Koong, K S(2006) An onion ring framework for develop ing and assessing mobile commerce security, IntJ mobile Communications, Vol 4, No 2, pp 128-142 VIll. Raymond R. Panko (2007) Business Data Networks and Telecommunications(Sixthedition), Prentice-Hall

目 录 I. Communications of the ACM, Special Issue: Emerging technologies for homeland security, Vol. 47, Issue 3, 2004 Saydjari, O.S. Cyber defense: art to science, pp. 52 - 57 Bajcsy, R. etc, Cyber defense technology networking and evaluation, pp. 58 - 61 II. Choi, Y.B., etc (2006) ‘Corporate wireless LAN security: threats and an effective security assessment framework for wireless information assurance’, Int. J. Mobile Communications, Vol. 4, No. 3, pp.266–290. III. Kumar, S. (2004) ‘Mobile communications: global trends in the 21st century’, Int. J. Mobile Communication, Vol. 2, No. 1, pp.67–86. IV. Varshney, U., Malloy, A., Ahluwalia, P. and Jain, R. (2004) ‘Wireless in the enterprise: requirements, solutions and research directions’, Int. J. Mobile Communications, Vol. 2, No. 4, pp. 354–367. V. Lim, B. and Zheng, H. (2004) ‘A day in the life of Jini: a peek at service-oriented architecture for internet appliances’, Int. J. Mobile Communication, Vol. 2, No. 2, pp.199–216. VI. Pietro, R.D. and Mancini, L.V. (2003) Security and privacy issues of handheld and wearable wireless devices, Communications of the ACM, Vol 46, No. 9. VII. Wei, J., Liu, L.C. and Koong, K.S. (2006) ‘An onion ring framework for developing and assessing mobile commerce security’, Int. J. Mobile Communications, Vol. 4, No. 2, pp.128–142 VIII. Raymond R. Panko (2007) ‘Business Data Networks and Telecommunications (Sixth edition), Prentice-Hall

已到末页,全文结束
刷新页面下载完整文档
VIP每日下载上限内不扣除下载券和下载次数;
按次数下载不扣除下载券;
注册用户24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
相关文档