• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
  • ورود / ثبت نام
تعداد ۳ پاسخ غیر تکراری از ۳ پاسخ تکراری در مدت زمان ۰,۴۲ ثانیه یافت شد.

1. Router security strategie

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Gregg Schudel, David J. Smith

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Routers (Computer networks)--Security measures,Computer networks--Security measures,TCP/IP (Computer network protocol)--Security measures

Classification :
TK
,
5105
.
543
,.
S38
,
2008

2. Router security strategies

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author:

Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)

Subject: Computer networks , Security measures,Routers (Computer networks) , Security measures,TCP/IP (Computer network protocol) , Security measures

Classification :
E-BOOK

3. Router security strategies :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author:

Library: Central Library and Documents Center of Mazandaran University (Mazandaran)

Subject: Routers (Computer networks) ; Security measures ; Computer networks ; Security measures ; TCP/IP (Computer network protocol) ; Security measures ;

Classification :
  • »
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival