The protectors
Publisher:
Year
: 2014DOI: 10.1049/et.2014.0520
Keyword(s): Internet,computer crime,computer network security,telecommunication network routing,Internet data traffic flow,computer network security,hackers,internetworking devices,router vendors
Collections
:
-
Statistics
The protectors
Show full item record
| contributor author | Courtney, Martin | |
| contributor author | Hunter, Philip | |
| contributor author | Hayes, J. | |
| date accessioned | 2020-03-13T00:10:19Z | |
| date available | 2020-03-13T00:10:19Z | |
| date issued | 2014 | |
| identifier issn | 1750-9637 | |
| identifier other | 6841008.pdf | |
| identifier uri | https://libsearch.um.ac.ir:443/fum/handle/fum/1136972 | |
| format | general | |
| language | English | |
| publisher | IET | |
| title | The protectors | |
| type | Journal Paper | |
| contenttype | Metadata Only | |
| identifier padid | 8318766 | |
| subject keywords | Internet | |
| subject keywords | computer crime | |
| subject keywords | computer network security | |
| subject keywords | telecommunication network routing | |
| subject keywords | Internet data traffic flow | |
| subject keywords | computer network security | |
| subject keywords | hackers | |
| subject keywords | internetworking devices | |
| subject keywords | router vendors | |
| identifier doi | 10.1049/et.2014.0520 | |
| journal title | Engineering & Technology | |
| journal volume | 9 | |
| journal issue | 5 | |
| filesize | 727935 | |
| citations | 0 |


