Rechnernetz
Resource Information
The concept Rechnernetz represents the subject, aboutness, idea or notion of resources found in University of Missouri Libraries.
The Resource
Rechnernetz
Resource Information
The concept Rechnernetz represents the subject, aboutness, idea or notion of resources found in University of Missouri Libraries.
- Label
- Rechnernetz
- Source
- gnd
56 Items that share the Concept Rechnernetz
Context
Context of RechnernetzSubject of
No resources found
No enriched resources found
- A guide to computer network security
- Advanced Internet protocols, services, and applications
- Advances in computing science--ASIAN 2002 : Internet computing and modeling, grid computing, peer-to-peer computing, and cluster computing : 7th Asian Computing Science Conference, Hanoi, Vietnam, December 4-6, 2002 : proceedings
- Advances in information and computer security : 4th International Workshop on Security, IWSEC 2009 Toyama, Japan, October 28-30, 2009, proceedings
- Advances in information and computer security : 5th international workshop on security, IWSEC 2010, Kobe, Japan, November 22-24, 2010 : proceedings
- Advances in web and network technologies, and information management : APWeb/WAIM 2009 international workshops, WCMT 2009, RTBI 2009, DBIR-ENQOIR 2009, PAIS 2009, Suzhou, China, April 2-4, 2009 : revised selected papers
- Applied cryptography and network security : 4th international conference, ACNS 2006, Singapore, June 6-9, 2006 : proceedings
- Applied cryptography and network security : 8th international conference, ACNS 2010, Beijing, China, June 22-25, 2010 ; proceedings
- Applied cryptography and network security : third international conference, ACNS 2005, New York, NY, USA, June 7-10, 2005 : proceedings
- Applied information security : a hands-on approach
- Architecture of distributed computer systems
- CCNA 200-301 Official Cert Guide Library
- Cloud networking : understanding cloud-based data center networks
- Computer and information security handbook
- Computer and information security handbook
- Computer network security : Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 25-27, 2005 : proceedings
- Computer networking and chemistry : a symposium sponsored by the Division of Computers in Chemistry at the 170th meeting of the American Chemical Society, Chicago, Ill., Aug. 26-27, 1975
- Computer networks
- Cryptology and network security : 6th international conference, CANS 2007, Singapore, December 8-10, 2007 ; proceedings
- Cryptology and network security : 9th international conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010 : proceedings
- Data and applications security XXIII : 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009 ; proceedings
- Data communications networking devices : operation, utilization, and LAN and WAN internetworking
- Databases in networked information systems : 4th international workshop, DNIS 2005, Aizu-Wakamatsu, Japan, March 28-30, 2005 : proceedings
- Databases in networked information systems : 6th international workshop, DNIS 2010, Aizu-Wakamatsu, Japan, March 29-31, 2010 ; proceedings
- Engineering secure software and systems : second international symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010 : proceedings
- Ethereal : packet sniffing
- Fuzzing : brute force vulnerabilty discovery
- Googling security : how much does Google know about you?
- Grid economics and business models : 5th international workshop, GECON 2008, Las Palmas de Gran Canaria, Spain, August 26, 2008 ; proceedings
- Groupware : design, implementation, and use : 15th International Workshop, CRIWG 2009, Peso da Régua, Douro, Portugal, September 13-17, 2009 : proceedings
- Information Systems Security : 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, proceedings
- Information security : 8th international conference, ISC 2005, Singapore, September 20-23, 2005 : proceedings
- Information security and cryptology - ICISC 2007 : 10th international conference, Seoul, Korea, November 29-30, 2007 ; proceedings
- Information security and cryptology - ICISC 2008 : 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised selected papers
- Information security practice and experience : first international conference, ISPEC 2005, Singapore, April 11-14, 2005 : proceedings
- Information systems security : 5th international conference, ICISS 2009, Kolkata, India, December 14-18, 2009 ; proceedings
- Information systems security : 6th international conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010 : proceedings
- Local area networks : an advanced course, Glasgow, July 11-22, 1983 proceedings
- Network and parallel computing : IFIP international conference, NPC 2005, Beijing, China, November 30 - December 3, 2005 ; proceedings
- Network distributed computing : fitscapes and fallacies
- Network programming in .NET : with C♯ and Visual Basic .NET
- Network security : private communication in a public world
- Network security hacks
- Networking bible
- Netzwerke für Dummies
- Passive and active network measurement : 5th international workshop, PAM 2004, Antibes Juan-les-Pins, France, April 19-20, 2004 ; proceedings
- Passive and active network measurement : 6th international workshop, PAM 2005, Boston, MA, USA, March 31-April 1, 2005 : proceedings
- Security in computing
- Security in computing systems : challenges, approaches and solutions
- Silence on the Wire : a Field Guide to Passive Reconnaissance and Indirect Attacks
- Testing of software and communicating systems : 20th IFIP TC 6/WG 6.1 international conference, TestCom 2008, 8th international workshop, FATES 2008, Tokyo, Japan, June 10-13, 2008 : proceedings
- Top-down network design
- Traffic monitoring and analysis : first international workshop, TMA 2009, Aachen, Germany, May 11, 2009 : proceedings
- Twisted network programming essentials
- UNIX System V network programming
- Using the common criteria for IT security evaluation
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/resource/zueMlArgTgM/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/resource/zueMlArgTgM/">Rechnernetz</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept Rechnernetz
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/resource/zueMlArgTgM/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/resource/zueMlArgTgM/">Rechnernetz</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>