Пловдивски


[66] Public Key Cryptography, http://www.facweb.iitkgp.ernet.in/sourav/PublicKeyCrypto.pdf (последно посетен на 2.03.2014) [67]



Pdf просмотр
страница129/130
Дата02.07.2022
Размер7.37 Mb.
#114742
1   ...   122   123   124   125   126   127   128   129   130
Компютърни мрежо и комуникации
[66] Public Key Cryptography, http://www.facweb.iitkgp.ernet.in/
sourav/PublicKeyCrypto.pdf
(последно посетен на
2.03.2014)
[67] PUBLIC SWITCHED TELEPHONE NETWORK (PSTN), Volume I, http://niits.ru/eng/public/eng-pstn-vol1.pdf
(последно посетен на 18.03.2013)
[68] Public Switched Telephone, Network (PSTN), http://www- phare.lip6.fr/
trnguyen/teaching/2010-2011/ptel-puf/PSTN.pdf
(последно посетен на
18.03.2013)
[69] Pulse code modulation standards, http://www.irig106.org/docs/106-05/chapter4.pdf
(последно посетен на 18.03.2013)
[70] Quantization and Pulse Code Modulation, http://www2.uic.edu/stud_orgs/prof/pesc/part_3_rev_F.pdf
(последно посетен на
18.03.2013)
[71] R. Victor Jones
,
http://people.seas.harvard.edu/
jones/cscie129/nu_lectures/lecture12/T- carriers/T-carriers.html
(последно посетен на 18.03.2013)
[72] RadCom, “ATM”, http://www.protocols.com/pbook/atm.htm
(последно посетен на
18.03.2013)
[73] Rafael Pass, Introduction to Cryptography, http://www.cs.cornell.edu/courses/cs687/2006fa/lectures/lecture1.pdf
(последно посетен на 2.03.2014)
[74] Richard M. Roberts, “Networking Fundamentals Course Outline & Text Materials”,
ISBN: 978-1-59070-449-3, 2005
[75] Rob Pooley, “An Introduction to Programming in Simula”, http://www.macs.hw.ac.uk/
rjp/bookhtml/
(последно посетен на 18.03.2013)
[76] Rocky K. C. Chang, „An Integrated View of Teaching and Learning for a Foundational
Course on Computer Networking”, http://www4.comp.polyu.edu.hk/
csrchang/neted_03_2.pdf
(последно посетен на
18.03.2013)


247
[77] Rocky K. C. Chang, „Teaching Computer Networking with the Help of Personal
Computer
Networks”, http://www4.comp.polyu.edu.hk/
csrchang/personalCN.pdf
(последно посетен на 18.03.2013)
[78] Salil Vadhan, Alon Rosen, Private-Key Encryption: Perfect Secrecy, http://people.seas.harvard.edu/
salil/cs127/fall06/docs/lec3.pdf
(последно посетен на
2.03.2014)
[79] Smita Rai, Anpeng Huang, Suman Sarkar, “SONET/SDH”, http://networks.cs.ucdavis.edu/
mukherje/289i_sq12/SONET.pdf
(последно посетен на 18.03.2013)
[80] Stein Krogdahl, „Concepts and terminology in the Simula Programming Language“, http://folk.uio.no/simula67/Archive/concepts.pdf
(последно посетен на 18.03.2013)
[81] Stephen Kent, Charles Lynn, Joanne Mikkelson, Karen Seo, “Secure Border Gateway
Protocol (S-BGP) — Real World Performance and Deployment Issues”, http://users.ece.cmu.edu/
adrian/731-sp04/readings/KLMS-SBGP.pdf
(последно посетен на 18.03.2013)
[82] Surasak Sanguanpong, “Digital Carrier Systems”, http://hccc.ee.ccu.edu.tw/courses/datacom/lecture-vg/carrier.pdf
(последно посетен на
18.03.2013)


Сподели с приятели:
1   ...   122   123   124   125   126   127   128   129   130




©obuch.info 2024
отнасят до администрацията

    Начална страница