|
|
|
|
LEADER |
00000cam a22000007a 4500 |
001 |
OR_on1263003927 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu|||||||| |
008 |
210806s2020 xx o 000 0 eng d |
040 |
|
|
|a AU@
|b eng
|c AU@
|d OCLCQ
|d TOH
|d OCLCQ
|d TXI
|
020 |
|
|
|z 9781119555643
|
020 |
|
|
|z 9781119555742
|
024 |
8 |
|
|a 9781119555643
|
029 |
0 |
|
|a AU@
|b 000068846541
|
029 |
1 |
|
|a AU@
|b 000072394983
|
035 |
|
|
|a (OCoLC)1263003927
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Goyal, Dinesh,
|e author.
|
245 |
1 |
0 |
|a Design and Analysis of Security Protocol for Communication /
|c Goyal, Dinesh.
|
250 |
|
|
|a 1st edition.
|
264 |
|
1 |
|b Wiley-Scrivener,
|c 2020.
|
300 |
|
|
|a 1 online resource (368 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
520 |
|
|
|a The purpose of designing this book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers of TCP/IP stack and also to discuss protocols independent to the stack. Authors will be aiming to identify the best set of security protocols for the similar applications and will also be identifying the drawbacks of existing protocols. The authors will be also suggesting new protocols if any.
|
542 |
|
|
|f Copyright © 2019 by John Wiley & Sons
|g 2019
|
550 |
|
|
|a Made available through: Safari, an O'Reilly Media Company.
|
588 |
|
|
|a Online resource; Title from title page (viewed March 17, 2020)
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
700 |
1 |
|
|a Balamurugan, S.,
|c Prof.,
|e author.
|
700 |
1 |
|
|a Peng, Sheng-Lung,
|e author.
|
700 |
1 |
|
|a Verma, O.,
|e author.
|
710 |
2 |
|
|a Safari, an O'Reilly Media Company.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781119555643/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
936 |
|
|
|a BATCHLOAD
|
994 |
|
|
|a 92
|b IZTAP
|