eBooks „multicast security and authentication“

11192 eBooks were found for the search term „multicast security and authentication“.



Books (11192)


MULTICAST IP ROUTING Part-2
Ummed Singh MULTICAST IP ROUTING Part-2

IP routing & forwarding

  • Technology & Engineering
  • English
  • 7470 Words
  • Ages 12 and up
  • 43
  • 0
IP multicast routing is a technique used in computer networks to efficiently deliver data packets from a single [more]

Keywords: IP multicast routing, Multicast routing protocols, Multicast group communication, Multicast packet forwarding, Protocol Independent Multicast (PIM), Multicast addressing, Multicast distribution tree, Multicast traffic optimization, Efficient multicast data delivery, Network bandwidth optimization, Multicast routing table, Multicast group membership, Multicast routing algorithms, Multicast network infrastructure, Multicast applications and benefits, Multicast routing protocols comparison, Multicast forwarding strategies, Multicast routing efficiency, [more]

$2.99

Hacking and Security
Chandan Chaturvedi Hacking and Security

Hacking and Security

  • Technology & Engineering
  • English
  • 11930 Words
  • Ages 6 and up
  • 1732
  • 4
This book is mostly dedicated to those student who want to learn hacking and security. Ethical Hacking is [more]

Keywords: Hacking, Security

$0.00

Security
Ernest M Kenyon Security
  • Games
  • English
  • 3614 Words
  • Ages 18 and up
  • 2
  • 0
Suddenly Collins snapped the pencil between his fingers and hurled the pieces across the lab, where they clattered, [more]

For Free

Security
Poul William Anderson Security
  • Fiction
  • English
  • 12237 Words
  • Ages 18 and up
  • 2
  • 0
Poul William Anderson (November 25, 1926 – July 31, 2001) was an American science fiction author who began [more]

For Free

MULTICAST IP ROUTING
Ummed Singh MULTICAST IP ROUTING

MULTICAST IP ROUTING- Part 1

  • Education
  • English
  • 6911 Words
  • No Age Recommendation
  • 46
  • 0
Multicast routing is a technique used in computer networks to optimize the transmission of data from one sender [more]

Keywords: multicast, ip, routing, unicast, broadcast, group communication, data transmission, network protocols, network traffic, forwarding, path selection, network efficiency, data replication, tree structures, membership management, IGMP, PIM, DVMRP, [more]

$2.99

STATE SECURITY
BRIAN R. LUNDIN STATE SECURITY
  • Fiction
  • English
  • 11965 Words
  • No Age Recommendation
  • 1173
  • 0
THE RISE AND FALL OF A MULTI-MILLION DOLLAR PRIVATE SECURITY COMPANY IN CHICAGO PUBLIC HOUSING PROJECTS AND THE [more]

For Free

Security Risk
Ed M Clinton Security Risk
  • Fiction
  • English
  • 3928 Words
  • Ages 18 and up
  • 2
  • 0
At moments like this, General David Walker always thought fleetingly of the good old days when he had [more]

For Free

Security Risk
Ed M. Clinton Security Risk
  • Fiction
  • English
  • 3962 Words
  • Ages 18 and up
  • 2
  • 0
This eBook is for the use of anyone anywhere at no cost and with almost no restrictions whatsoever. You [more]

For Free

Australian Journal of Wireless Technologies, Mobility & Security- March 2013 Issue - Proceedings of First National Conference on Networking Technology,Mobility and Security 2013 Bangalore
Prof.Dr.Pritam Gajkumar Shah Australian Journal of Wireless Technologies, Mobility & Security- March 2013 Issue - Proceedings of First National Conference on Networking Technology,Mobility and Security 2013 Bangalore

NCNTMS 2013

  • Computers
  • English
  • 2 Words
  • Ages 16 and up
  • 1501
  • 11
NCNTMS -2013 Proceedings of 1st National Conference on Networking Technology, Mobility and Security-2013, Bangalore-India 28th and 29th January 2013 Organized by Research and Incubation [more]

Keywords: Networking Technology, cloud computing, Mobility, cryptography

For Free

Australian Journal of Wireless Technology,Mobility and Security -April 2013 Issue
BHARATH M , MANJUNATH N Australian Journal of Wireless Technology,Mobility and Security -April 2013 Issue

BHARATH M

  • Technology & Engineering
  • English
  • 2 Words
  • Ages 18 and up
  • 3
  • 0
Cloud Computing, the long-held dream of computing as a utility, has the potential to transform a large part of [more]

Keywords: Google scholar, Clloud computing paper

For Free


To ensure optimal functioning, our website uses cookies. By using the website you agree to the use of cookies. More info
OK
Top of page