Search alternatives:
"protectionism" » "protections"

1
Published 2014
CRC Press
Subjects: ...Technologie de protection de l'environnement...

2
Published 2015
Wiley
Subjects: ...Technologie de protection de l'environnement...

3
by Kitchen, Ronald
Published 2001
Newnes
Subjects: ...Radiation Protection...

4
by Habraken, Joseph W.
Published 2006
Sams
Table of Contents: ... -- Protecting and securing the wireless network...

5
by Minei, Ina
Published 2010
John Wiley & Sons, Ltd.
Table of Contents: ...14 Advanced Protection and Restoration: Protecting the Service15 MPLS Management; 16 MPLS in Access...

6
by Crisp, John
Published 2002
Newnes
Table of Contents: ... are the same; Selecting, protecting and connecting cables; Networks; Cables in buildings and between buildings...

7
by Horn, Gunther
Published 2013
John Wiley & Sons
Table of Contents: ... Architecture -- EPS Authentication and Key Agreement -- EPS Protection for Signalling and User Data -- Security...

8
by Minei, Ina
Published 2008
J. Wiley & Sons
Table of Contents: ...Foundations -- Traffic engineering with MPLS (MPLS-TE) -- Protection and restoration in MPLS...

9
by Farmer, James, Lane, Brian, Bourg, Kevin, Wang, Weyl
Published 2017
Morgan Kaufmann
Table of Contents: ...; Encryption; Flow Control in GPON; Discovering the New Guy; After Discovery; PON Protection; Type B Protection...

10
by Pizzi, Skip
Published 2014
Taylor and Francis
...-the-air and online convergence); Content protection (Conditional Access and Digital Rights Management...

11
by Hasegawa, Fumio
Published 2004
John Wiley & Sons
... examine the protection of intellectual property rights, which is one of the most...

12
by Bartz, Robert J.
Published 2009
Wiley Pub.
Table of Contents: ...); WLAN Roaming; Power Saving Operation; Protection Mechanisms; Summary; Exam Essentials; Key Terms...

13
by Raab, Stefan
Published 2005
Cisco Press
Table of Contents: ... -- Replay Protection Methods -- Mobile Node and Foreign Agent Authentication and Challenge Mechanism -- FA...

14
by Metsälä, Esa
Published 2015
Wiley
Table of Contents: ... on Availability 141 -- 5.4.3 Routing Gateway Redundancy 144 -- 5.4.4 Ethernet Ring Protection (ERP) 147 -- 5.4.5...

15
by Goransson, Paul
Published 2007
Newnes/Elsevier
Table of Contents: ...-Life Secured Roams; 7.5 Dissection of a WPA-PSK Protected Roam; 7.6 Dissection of a WPA2 Enterprise...

16
by Yi, SeungJune
Published 2012
John Wiley & Sons Singapore

17
by Ahmadi, Sassan
Published 2019
Academic Press, an imprint of Elsevier
Table of Contents: ... -- 2.2.3.2 Header Compression Function -- 2.2.3.3 Ciphering and Integrity Protection Functions -- 2.2.4...

18
by Kondoz, A. M.
Published 2009
Wiley
Table of Contents: ... Error Protection 96 -- 3.5 Conclusions 98 -- References 99 -- 4 Distributed Video Coding 105 -- 4.1...

19
by Ye, Feng, Qian, Yi, Hu, Rose Qingyang
Published 2018
John Wiley & Sons
Table of Contents: ...9.3.2.1 Privacy Scheme 194 -- 9.3.2.2 Identity Protection 195 -- 9.3.3 Analysis of the Learning...

20
by Sauter, Martin
Published 2014
John Wiley & Sons Inc.
... of a Smart Phone, Fast Dormancy, IMS and High-Speed Downlink Packet Access, and Wi-Fi-Protected Setup...