Computer network protocols
Resource Information
The concept Computer network protocols represents the subject, aboutness, idea or notion of resources found in University of Liverpool.
The Resource
Computer network protocols
Resource Information
The concept Computer network protocols represents the subject, aboutness, idea or notion of resources found in University of Liverpool.
- Label
- Computer network protocols
118 Items that share the Concept Computer network protocols
Context
Context of Computer network protocolsSubject of
No resources found
No enriched resources found
- Advanced Internet protocols, services, and applications
- Advanced transport protocols : designing the next generation
- Algebraic specification of communication protocols
- Algorithms and protocols for wireless sensor networks
- Applications of process algebra
- BACnet : the global standard for building automation and control networks
- Bee-inspired protocol engineering : from nature to networks
- Bluetooth : connect without cables
- Bluetooth application developer's guide : the short range interconnect solution
- Bluetooth revealed
- Broadband wireless access
- Building Web services with Java : making sense of XML, SOAP, WSDL, and UDDI
- Building telephony systems with OpenSER : a step-by-step guide to building a high-performance telephony system
- Building telephony systems with OpenSIPS 1.6 : build scalable and robust telephony systems using SIP
- Communicating systems with UML 2 : modeling and analysis of network protocols
- Communication network protocols
- Computer networking course
- Computer networking with Internet protocols and technology
- Configuring Cisco voice over IP.
- Convergence technologies for 3G networks : IP, UMTS, EGPRS and ATM
- Cryptographic protocol : security analysis based on trusted freshness
- Data communications, computer networks and OSI
- Data communications, computer networks and open systems
- Data communications, computer networks and open systems
- Declarative networking
- Designing SCADA application software : a practical approach
- Designing SCADA application software : a practical approach
- Distributed algorithms and protocols
- End-to-end quality of service over heterogeneous networks
- Engineering secure two-party computation protocols : design, optimization, and applications of efficient secure function evaluation
- Enhanced living environments : from models to technologies
- Enhanced living environments : from models to technologies
- Ethereal : packet sniffing
- FreeSWITCH 1.0.6 : build robust high performance telephony systems using FreeSWITCH
- FreeSWITCH 1.2 : build robust, high-performance telephony systems using FreeSWITCH
- GNS3 Network simulation guide
- High performance switches and routers
- IP-traffic theory and performance
- IPv6 advanced protocols implementation
- Identity Management : concepts, technologies, and systems
- Implementing NAP and NAC security technologies : the complete guide to network access control
- Implementing SSL/TLS using cryptography and PKI
- Installation and maintenance of SDH/SONET, ATM, xDSL, and synchronization networks
- Instant Wireshark starter : a quick and easy guide to getting started with network analysis using Wireshark
- Instant traffic analysis with Tshark how-to : master the terminal-based version of Wireshark for dealing with network security incidents
- Internet protocol-based emergency services
- Internet video data streaming : energy-saving and cost-aware methods
- Java 2 network protocols black book
- Joint source-channel video transmission
- Key secure establishments : proofs and refutations
- MAP and TOP: advanced manufacturing communications
- Mastering Wireshark 2 : develop skills for network analysis and address a wide range of information security threats
- Microsoft DirectAccess best practices and troubleshooting
- Mobile IP : the Internet unplugged
- Mobility protocols and handover optimization : design, evaluation and application
- Multimedia communications and networking
- Multiple access channels : theory and practice
- NGN architectures, protocols and services
- Network coding at different layers in wireless networks
- Networking self-teaching guide : OSI, TCP/IP, LANs, MANs, WANs, implementation, management, and maintenance
- Optimization for Wireless Powered Communication Networks
- Practical Spring LDAP : Enterprise Java LDAP development made easy
- Practical packet analysis : using Wireshark to solve real-world network problems
- Principles of protocol design
- Pro DNS and BIND
- Pro DNS and BIND 10
- Pro Nagios 2.0
- Pro OpenSSH
- Professional XMPP programming with JavaScript® and jQuery
- Protocol engineering
- Protocols by Invariants
- Queueing theory and network applications
- REST : advanced research topics and practical applications
- REST : from research to practice
- Rick Gallaher's MPLS training guide : building Multi Protocol Label Switching Networks
- SAS/CONNECT software, usage and reference : version 6
- SCION : a secure internet architecture
- SIP : understanding the Session Initiation Protocol
- SIP : understanding the Session Initiation Protocol
- SSL and TLS : theory and practice
- SSL and TLS : theory and practice
- Satellite networking : principles and protocols
- Scheduling and congestion control for wireless internet
- Secure group communications over data networks
- Secure group communications over data networks
- Secure key establishment
- Secure multiparty computation : an information-theoretic approach
- Secure transaction protocol analysis : models and applications
- Signposts in cyberspace : the Domain Name System and internet navigation
- Software defined networks
- SolarWinds server and application monitor : deployment and administration
- Synchronizing Internet Protocol Security (SIPSec)
- TCP/IP network administration
- The Austin protocol compiler
- The IMS : IP multimedia concepts and services in the mobile domain
- The Wireshark field guide : analyzing and troubleshooting network traffic
- The book of IMAP : building a mail server with Courier and Cyrus
- The definitive guide to HTML5 WebSocket
- The exploit : a theory of networks
- The internet message : closing the book with electronic mail
- The modelling and analysis of security protocols : the CSP approach
- Tutorial: computer communications: architectures, protocols, and standards
- Understanding LDAP design and implementation
- Understanding SIP servlets 1.1
- Understanding and using the controller area network communication protocol : theory and practice
- Unified communications forensics : anatomy of common UC attacks
- Unified communications forensics : anatomy of common UC attacks
- Unlocking the Power of OPNET Modeler
- Using LDAP for directory integration
- V5 TCP/IP applications on the IBM e-server iSeries server
- Verification of communication protocols in web services : model-checking service compositions
- Versatile routing and services with BGP : understanding and implementing BGP in SR-OS
- VoIP technology : applications and challenges
- Wireless physical layer network coding
- Wireless sensor and actuator networks : algorithms and protocols for scalable coordination and data communication
- Wireless-powered communication networks : architectures, protocols, and applications
- Wireshark 2 quick start guide : secure your network through protocol analysis
- Wireshark essentials : get up and running with Wireshark to analyze network packets and protocols effectively
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.liverpool.ac.uk/resource/4BCJ2Jg502s/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.liverpool.ac.uk/resource/4BCJ2Jg502s/">Computer network protocols</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.liverpool.ac.uk/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.liverpool.ac.uk/">University of Liverpool</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept Computer network protocols
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.liverpool.ac.uk/resource/4BCJ2Jg502s/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.liverpool.ac.uk/resource/4BCJ2Jg502s/">Computer network protocols</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.liverpool.ac.uk/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.liverpool.ac.uk/">University of Liverpool</a></span></span></span></span></div>