A Survey of Context-Aware Mobile Computing Research
A Study of the Novel Approaches Used in Intrusion Detection and
A Small PC Network
A simple survey of knowledge plane approaches for future cognitive
A Secure Way to Protect Your Network: IBM
A Secure Routing Protocol for Ad Hoc Networks
A Review on Wireless Network
20.4 Universal Service in a Heterogeneous World
2/e, by William Stallings and Lawrie Brown, Chapter 9
2.2 Network Standards
2.2 INTERNET ROUTING PROTOCOLS
2.2 Internet Protocol
2.1 Chapter 2 Network Models
2.0 Static routing
2.0 Processor specifications
2. Principles governing the use of TCP/IP on the GTS
2. Network Media
2. - people
2-LAN-MPLS-Internetworking - ETH TIK
2-3.chapter2
2 What is a VPN