Sumbangan 15 September 2024 – 1 Oktober 2024
Tentang pengumpulan dana
pencarian buku
buku
Sumbangan:
66.9% dicapai
Masuk
Masuk
pengguna terdaftar memiliki akses ke:
rekomendasi pribadi
Bot Telegram
riwayat unduhan
mengirim ke alamat email atau Kindle
manajemen daftar buku
penyimpanan ke Favorit
Pribadi
Permintaan untuk buku
Pengkajian
Z-Recommend
Daftar buku
Yang paling populer
Kategori
Partisipasi
Mendukung
Unggahan
Litera Library
Menyumbangkan buku kertas
Menambah buku kertas
Search paper books
LITERA Point saya
Pencarian kata kunci
Main
Pencarian kata kunci
search
1
Handbook of Security and Networks
Chen
,
Hui
,
Li
,
Frank Haizhon.
,
Xiao
,
Yang
security
networks
key
network
february
handbook
authentication
6.5in
9.75in
b1059
nodes
node
protocol
wireless
packet
sensor
packets
attacks
attacker
figure
mobile
signature
drm
algorithm
keys
detection
worm
messages
secure
kernel
traffic
overhead
first
different
rate
schemes
techniques
function
server
systems
approach
virus
proposed
hash
detect
malware
memory
file
session
device
Tahun:
2011
Bahasa:
english
File:
PDF, 8.65 MB
Tag Anda:
0
/
4.0
english, 2011
2
Handbook of security and networks
World Scientific Pub. Co
Chen
,
Hui
,
Li
,
Frank Haizhon
,
Xiao
,
Yang
security
networks
key
network
february
handbook
authentication
6.5in
9.75in
b1059
nodes
node
protocol
wireless
packet
sensor
packets
attacks
attacker
figure
mobile
signature
drm
algorithm
keys
detection
worm
messages
secure
kernel
traffic
overhead
first
different
rate
schemes
techniques
function
server
systems
approach
virus
proposed
hash
detect
malware
memory
file
session
device
Tahun:
2011
Bahasa:
english
File:
PDF, 17.07 MB
Tag Anda:
0
/
0
english, 2011
3
Handbook of Security and Networks
World Scientific Publishing Company
Yang Xiao
,
Frank H. Li
,
Hui Chen
security
networks
key
network
february
handbook
authentication
6.5in
9.75in
b1059
nodes
node
protocol
wireless
packet
sensor
packets
attacks
attacker
figure
mobile
signature
drm
algorithm
keys
detection
worm
messages
secure
kernel
traffic
overhead
first
different
rate
schemes
techniques
function
server
systems
approach
virus
proposed
hash
detect
malware
memory
file
session
device
Tahun:
2011
Bahasa:
english
File:
PDF, 8.80 MB
Tag Anda:
0
/
0
english, 2011
1
Pindah ke
tautan ini
atau temukan bot "@BotFather" di Telegram
2
Kirimlah perintah /newbot
3
Masukkan nama untuk bot Anda
4
Masukkan nama pengguna untuk bot
5
Salin pesan terbaru dari BotFather dan masukkannya di sini
×
×