Skip to main content
    • by 
    • امنیت شبکه
    • by 
    •   6  
      Mobile Ad Hoc Networksامنیت شبکهامنیت اطلاعاتادهاک
شبكات المعلومات والإتصال ومدي توظيفها في بيئة المكتبات
    • by 
    • امنیت شبکه
 Insecure links -non denial of eavesdropping.  Replay and injection of packets.  Non tamper resistant.  Trust Requirements  Base station and aggregation point trustworthiness.  Threat Models  Outsider vs. insider attacks. ... more
    • by 
    •   2  
      امنیت شبکهشبکه حسگر بی سیم
It is the purpose of this book to provide a practical survey of both the principles and practices of Cyber security, network security and cryptography. In the first two parts of the book, the basic issues to be addressed by a network... more
    • by 
    •   14  
      Wireless CommunicationsNetwork SecurityNetwork ManagementNetwork Protocols and Architectures