Sediment 发表于 2025-3-21 18:13:16

书目名称Networks影响因子(影响力)<br>        http://impactfactor.cn/if/?ISSN=BK0662982<br><br>        <br><br>书目名称Networks影响因子(影响力)学科排名<br>        http://impactfactor.cn/ifr/?ISSN=BK0662982<br><br>        <br><br>书目名称Networks网络公开度<br>        http://impactfactor.cn/at/?ISSN=BK0662982<br><br>        <br><br>书目名称Networks网络公开度学科排名<br>        http://impactfactor.cn/atr/?ISSN=BK0662982<br><br>        <br><br>书目名称Networks被引频次<br>        http://impactfactor.cn/tc/?ISSN=BK0662982<br><br>        <br><br>书目名称Networks被引频次学科排名<br>        http://impactfactor.cn/tcr/?ISSN=BK0662982<br><br>        <br><br>书目名称Networks年度引用<br>        http://impactfactor.cn/ii/?ISSN=BK0662982<br><br>        <br><br>书目名称Networks年度引用学科排名<br>        http://impactfactor.cn/iir/?ISSN=BK0662982<br><br>        <br><br>书目名称Networks读者反馈<br>        http://impactfactor.cn/5y/?ISSN=BK0662982<br><br>        <br><br>书目名称Networks读者反馈学科排名<br>        http://impactfactor.cn/5yr/?ISSN=BK0662982<br><br>        <br><br>

gene-therapy 发表于 2025-3-21 23:50:04

http://reply.papertrans.cn/67/6630/662982/662982_2.png

同谋 发表于 2025-3-22 03:49:01

http://reply.papertrans.cn/67/6630/662982/662982_3.png

NEG 发表于 2025-3-22 07:25:39

978-3-642-62453-7Springer-Verlag Berlin Heidelberg 2002

Hippocampus 发表于 2025-3-22 12:25:53

http://reply.papertrans.cn/67/6630/662982/662982_5.png

humectant 发表于 2025-3-22 16:30:25

http://reply.papertrans.cn/67/6630/662982/662982_6.png

窗帘等 发表于 2025-3-22 18:55:36

http://reply.papertrans.cn/67/6630/662982/662982_7.png

不容置疑 发表于 2025-3-22 22:20:30

http://reply.papertrans.cn/67/6630/662982/662982_8.png

MOTIF 发表于 2025-3-23 02:41:44

Signalling protocolsplaced on those which are about to play an important role in the transition towards NGN, i.e. high-speed networks using packet transport technologies. The chapter is divided into two main parts, the first dealing with circuit-switched (PSTN, ISDN, mobile) and ATM network signalling protocols, and the second with IP network signalling protocols.

Chagrin 发表于 2025-3-23 08:28:40

Security techniquesnce..This chapter will first describe the types of threat that security techniques try to address. The ways in which these techniques may be implemented to ensure the security of the networks and access to them will then be presented, and finally, the security of the applications themselves will be briefly examined.
页: [1] 2 3 4 5 6
查看完整版本: Titlebook: Networks; Internet · Telephony Daniel Hardy,Guy Malléus,Jean-Noël Méreur Book 2002 Springer-Verlag Berlin Heidelberg 2002 Internet.Layout.Q