Toshkent – 2024 Mustaqil ish mavzusi: Kanal sathidagi uchraydigan hujumlar tahlili Reja




Download 180,45 Kb.
bet8/8
Sana14.05.2024
Hajmi180,45 Kb.
#231109
1   2   3   4   5   6   7   8
Bog'liq
tarmoq xavfsizligiMI

FOYDALANILGAN ADABIYOTLAR:


  1. Andrew S. Tanenbaum, Computer Networks, 5th Edition, Prentice Hall, 2010.


  2. Larry L. Peterson and Bruce S. Davie, Computer Networks: A Systems Approach, 5th Edition, Morgan Kaufmann, 2012.


  3. Behrouz A. Forouzan, Data Communications and Networking, 5th Edition, McGraw-Hill, 2012.


  4. James F. Kurose and Keith W. Ross, Computer Networking: A Top-Down Approach, 7th Edition, Pearson, 2017.


  5. Douglas E. Comer, Computer Networks and Internets, 6th Edition, Pearson, 2015.


Bu adabiyotlar tarmoq xavfsizligi, tarmoq protokollari, tarmoq tizimlari va tarmoq kamchiliklarining tahlilini o'rganishga yordam beradi. Shu bilan birga, tarmoq kafolatli xavfsizligi uchun tegishli tarmoq xavfsizlik protokollari va kamandalari, tarmoqni boshqarish usullari va tarmoq yaxshi ishlashini taʼminlash uchun muhim masalalarni ham ko'rsatadi.
http://fayllar.org
Download 180,45 Kb.
1   2   3   4   5   6   7   8




Download 180,45 Kb.

Bosh sahifa
Aloqalar

    Bosh sahifa



Toshkent – 2024 Mustaqil ish mavzusi: Kanal sathidagi uchraydigan hujumlar tahlili Reja

Download 180,45 Kb.