::  Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

 
Ditemukan 204 dokumen yang sesuai dengan query
cover
Issariyakul, Teerawat, author
The authors discuss the simulation architecture and the key components of NS2 including simulation-related objects, network objects, packet-related objects, and helper objects. The NS2 modules included within are nodes, links, SimpleLink objects, packets, agents, and applications. Further, the book covers three helper modules, timers, random number generators, and error models....
New York: [, Springer], 2012
e20418374
eBooks  Universitas Indonesia Library
cover
Sanders, Chris, author
Applied network security monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. Network security monitoring is based on the principle that prevention eventually fails....
Waltham, MA: Syngress, 2014
e20426799
eBooks  Universitas Indonesia Library
cover
Vacca, John R., editor
This book serves as a security practitioner’s guide to today’s most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of cyber-physical and...
Waltham, MA: Syngress, 2014
e20426913
eBooks  Universitas Indonesia Library
cover
White, Curt M.
CD-ROM contains: Eleven sets of visual demonstrations...
Cambridge, UK: Course Technology, Thomson Learning, 2001
005WHID001
Multimedia  Universitas Indonesia Library
cover
Contents : - Table of Contents by Author - The International Engineering Consortium - Consortium Affiliated Universities - Part I. Business Realities of AIN - Basics of AIN - AIN Can It Deliver? - Economic Realities of IN - AIN Deployment: A Blue Chip...
Chicago: International Engineering Consortium, 1997
e20448071
eBooks  Universitas Indonesia Library
cover
Contents : - Table of Contents by Author - ACRONYM GUIDE - Benefits of Voice over ATM for the Service Provider - Customer Care and Billing: Mission Critical - Service Provider API: Secure Access to Converged Networks The Parlay API - Winning IN Services for the...
Chicago: Professional Education International, 2000
e20448189
eBooks  Universitas Indonesia Library
cover
Contents : - Table of Contents by Author - ACRONYM GUIDE - Foreword - Beyond Dial Tone: Opportunities for Value in IP Telephony - The Myths and Facts about Voice over IP - Using ROI Models to Predict the Costs of Installing IP Telephony -...
Chicago: Professional Education International, 1999
e20448509
eBooks  Universitas Indonesia Library
cover
This book provides an introduction to trusted computing technology and its applications. As computers are increasingly embedded and wireless connected, security becomes imperative. This has resulted in the development of the notion of a ?trusted platform?, the main feature of which is the possession of a trusted hardware element capable...
London: Institution of Engineering and Technology, 2008
e20452623
eBooks  Universitas Indonesia Library
cover
Cham, Switzerland: Springer, 2018
307.121 6 SMA
Buku Teks  Universitas Indonesia Library
cover
Collins, Heidi, author
"Customers of AOL don't realize it, but they're using a "portal" when they go online. A portal provides a "home"--a place to get news, stock prices, or whatever else interests you. A "corporate portal" is the same concept--but it's for the employees of a business. It provides them with a...
New York: [American Management Association, ], 2001
e20438020
eBooks  Universitas Indonesia Library
<<   3 4 5 6 7 8 9 10 11 12   >>