يعرض 1 - 13 نتائج من 13 نتيجة بحث عن '"demilitarized zone (DMZ)"', وقت الاستعلام: 0.43s تنقيح النتائج
  1. 1
    Academic Journal
  2. 2
    Academic Journal

    المصدر: Diversity; Volume 14; Issue 12; Pages: 1011

    جغرافية الموضوع: agris

    وصف الملف: application/pdf

    Relation: Biodiversity Conservation; https://dx.doi.org/10.3390/d14121011

  3. 3
    Academic Journal
  4. 4
    Academic Journal
  5. 5
    Academic Journal

    المصدر: Revista Vínculos; Vol. 14 No. 1 (2017); 27-44 ; Revista Vínculos; Vol. 14 Núm. 1 (2017); 27-44 ; Revista Vínculos; v. 14 n. 1 (2017); 27-44 ; 2322-939X ; 1794-211X

    وصف الملف: application/pdf

    Relation: https://revistas.udistrital.edu.co/index.php/vinculos/article/view/13790/14123; B. M. Febrero, “Análisis de tráfico con sniffer” 11 Febrero 2011. [En línea]. Disponible en: http://cert.inteco.es/extfrontinteco/img/File/intecocert/EstudiosInformes/cert_inf_seguridad_analisis_trafico_wireshark.pdf; D. Xu y S. Yan, “Analysis and application of Wireshark in TCP/IP protocol teaching” E-Health Networking, Digital Ecosystems and Technologies (EDT), 2010 International Conference on, pp. 269-272, 210.; J. Mccabe, “Network Analysis, Architecture, and Design”, Burlington: Morgan Kaufmann, 2007; A. Barkl y T. Lammle, “CCDA: Cisco Certified Design Associate Study Guide, 2nd Edition” de CCDA, USA, 2003, pp. 60-103; Y. Sulbaran, “Evaluación de los dispositivos a nivel de la capa 2, 3 y 4 del modelo osi” de Evaluación de los dispositivos a nivel de la capa 2, 3 y 4 del modelo osi, Mexico, Telematique, 2005, pp. 87-120.; C. Fernandes, “Gigabit Ethernet for Stacking LAN's Networks Performance Correction” Optical Internet and Next Generation Network, 2006. COIN-NGNCON 2006. The Joint International Conference on, pp. 214-218, 2006, https://doi.org/10.1109/COINNGNCON.2006.4454673; H. P. /. Pallavi Asrodia, “International Journal of Engineering Research and Applications” 3 mayo 2012. [En línea]. Disponible en: http://www.ijera.com/papers/Vol2_issue3/EQ23854856.pdf; R. Mercer, “Overview of enterprise network developments” Communications Magazine, IEEE, vol. 34, issue 1, 2006, pp. 30-37.; A. S. Tanenbaum, “Redes de Computadoras”, Mexico: Pearson educación, 2003; B. Zhang, “Towards Automatic Creation of Usable Security Configuration” INFOCOM, 2010 Proceedings IEEE, pp. 1-5, 2010, https://doi.org/10.1109/INFCOM.2010.5462215; supportforce10networks, “supportforce10networks” [En línea]. Disponible en: https://www.force10networks.com/csportal20/TechTips/0020_HardwareTroubleshootingGuideforSwitchPorts.aspx; R. J. Shimonski y W. Eaton, “Sniffer Pro Network Optimization & Troubleshooting” Handbook, Syngress, 2010.; V. Ballingam, “Analysis of client/server transaction delay through a local area network switch” Southeastcon '96. Bringing Together Education, Science and Technology., Proceedings of the IEEE, pp. 571-587, 1996, https://doi.org/10.1109/SECON.1996.510137; A. Dabir, “Bottleneck Analysis of Traffic Monitoring using Wireshark” Innovations in Information Technology, pp. 158-162, 2007, https://doi.org/10.1109/IIT.2007.4430446; https://revistas.udistrital.edu.co/index.php/vinculos/article/view/13790

  6. 6
  7. 7
    Report
  8. 8
    Report
  9. 9
    Academic Journal
  10. 10
    Academic Journal
  11. 11
    Academic Journal
  12. 12
    Dissertation/ Thesis
  13. 13