247
[77] Rocky K. C. Chang, „Teaching Computer Networking
with the Help of Personal Computer
Networks”, http://www4.comp.polyu.edu.hk/
csrchang/personalCN.pdf
(последно посетен на 18.03.2013)
[78] Salil Vadhan, Alon Rosen, Private-Key Encryption: Perfect Secrecy, http://people.seas.harvard.edu/
salil/cs127/fall06/docs/lec3.pdf
(последно посетен на
2.03.2014)
[79] Smita Rai, Anpeng Huang, Suman Sarkar, “SONET/SDH”, http://networks.cs.ucdavis.edu/
mukherje/289i_sq12/SONET.pdf
(последно посетен на 18.03.2013)
[80] Stein Krogdahl, „Concepts and terminology in the Simula Programming Language“, http://folk.uio.no/simula67/Archive/concepts.pdf
(последно посетен на 18.03.2013)
[81] Stephen Kent,
Charles Lynn, Joanne Mikkelson, Karen Seo, “Secure
Border Gateway Protocol (S-BGP) — Real World Performance and Deployment Issues”, http://users.ece.cmu.edu/
adrian/731-sp04/readings/KLMS-SBGP.pdf
(последно посетен на 18.03.2013)
[82] Surasak Sanguanpong, “Digital Carrier Systems”, http://hccc.ee.ccu.edu.tw/courses/datacom/lecture-vg/carrier.pdf
(последно посетен на
18.03.2013)
Сподели с приятели: