Portal para Investigadores y Profesionales

Encuentra más Cursos o Publica tu Contenido en ElPrisma.com





Redes de Datos



Enlaces Patrocinados






Navigation bar
  Start Previous page
 15 of 15 
Next page End 10 11 12 13 14 15  

[10]
IEEE 802.11TM WIRELESS LOCAL AREA NETWORKS
[11]
IEEE 802.11a :
Telecommunications
and
information
exchange
between
systems—Local
and
metropolitan
area  networks—Specific  requirements—Part  11:  Wireless  LAN  Medium  Access  Control
(MAC) and Physical Layer (PHY) specifications—Amendment 1: High-speed Physical Layer
in the 5 GHz band
(IEEE Standard for Information technology, 1999)
[12]
IEEE 802.11b :
Wireless
LAN
MAC
and
PHY
specifications:
Higher
speed Physical
Layer
(PHY)
extension
in the 2.4 GHz band
(IEEE Standard for Information technology, 1999)
[13]
IEEE 802.11g :
Telecommunications
and
information
exchange
between
systems—Local
and
metropolitan
area  networks—Specific  requirements—Part  11:  Wireless  LAN  Medium  Access  Control
(MAC)  and  Physical  Layer  (PHY)  specifications—Amendment  4:  Further  Higher-Speed
Physical Layer Extension in the 2.4 GHz Band
(IEEE Standard for Information technology, 2003)
[14]
Principles of Wireless Networks
Kaveh Pahlavan, Prashant Krishnamurthy
Prentice Hall PTR, 2002
ISBN: 0-13-093003-2
[15]
2.4 GHz 802.11 Channel-to-Frequency Mappings
[16]
Complementary Code Keying Made Simple
Intersil Application Note AN9850.2
Bob Pearson
Novembre 2001
[17]
IEEE  
Standard  
for  
Information  
technology—  
Telecommunications  
and   information
exchange    between    systems—    Local    and    metropolitan    area    networks—    Specific
requirements
Part   11:   Wireless   LAN   Medium   Access   Control   (MAC)   and   Physical   Layer   (PHY)
specifications
Amendment  2:  Higher-speed  Physical  Layer  (PHY)  extension  in  the 
2.4  GHz  band—
Corrigendum 1
IEEE Std 802.11b-1999/Cor 1-2001
7
November 2001
[18]
Wireless Market Update
Alex Myrman
Cisco Systems, April 2004
[19]
802.11g:
IEEE Standard
for
Information technology—
Telecommunications
and information
exchange    between    systems—    Local    and    metropolitan    area    networks—    Specific
requirements
Part   11:   Wireless   LAN   Medium   Access   Control   (MAC)   and   Physical   Layer   (PHY)
specifications
Amendment 4: Further Higher Data Rate Extension in the 2.4 GHz Band
[20]
IEEE P802.11 - TASK GROUP N - MEETING UPDATE
Status of Project IEEE 802.11n
[21]
Capacity Coverage & Deployment Considerations for IEEE 802.11g
Cisco Systems, White Paper
801d61a3.shtml
[22]
Application Note: Wi-Fi /802.11 WLANs Bi-directional amplifier
Fidelity Comtech
September 2002
[23]
802.1X: IEEE Standard for Local and Metropolitan Area Networks— Port Based Network
Access Control
December 13, 2004
[24]
IEEE Standard for Information technology— Telecommunications and information
exchange between systems— Local and metropolitan area networks— Specific
requirements.
Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY)
specifications Amendment 6: Medium Access Control (MAC) Security Enhancements
July 23, 2004
[25]
Ad Hoc Mobile Wireless Networks: Protocols and Systems
C.-K. Toh
2002, Prentince Hall
[26]
Harald Blåtand
e-Robotiker
[27]
Bluetooth Protocol and Security Architecture Review|
[28]
Specification of the Bluetooth System
Covered Core Package version: 2.0 + EDR
4
November 2004
[29]
Bluetooth Compare with Other Technologies
[30]
Power Consumption and Energy Efficiency Comparisons of WLAN Products
Atheros White Paper
[31]
Bluetooth Basics
[32]
802.15.1
IEEE Standard
for
Information technology—
Telecommunications
and information
exchange
between
systems—
Local
and
metropolitan
area
networks—Specific
requirements
Part 15.1: Wireless medium access control (MAC) and physical layer (PHY) specifications
for wireless personal area networks (WPANs)
Approved 31 May 2005
[33]
802.15.1
IEEE
Standard
for
Information technology—
Telecommunications
and information
exchange
between
systems—
Local
and
metropolitan
area
networks—Specific
requirements
Part 15.2: Coexistence of Wireless Personal Area Networks with Other Wireless Devices
Operating in Unlicensed Frequency Band
Approved June 12, 2003
[34]
Principles of Wireless Networks
Kaveh Pahlavan, Prashant Krishnamurthy
Prentice Hall PTR, 2002
ISBN: 0-13-093003-2
[35]
“The Basic Guide to Frame Relay Networking”
Frame Relay Forum, 1998
[36]
xDSL Tutorial
Brandon Provolt
Engineering Intern Marketing and Product Development Group
Schott Corporation
Version 0.53 (beta), August 2000
[37]
VDSL2: The Ideal Access Technology for Delivering Video Services, Revision 2
White Paper, Aware
[38]
ADSL
ITU-T Recomendación G992.1
(ITU-T, Jun 1999)
[39]
ADSL Light
ITU-T Recommendation G992.2
(ITU-T, Jun 1999)
[40]
HDSL
ITU-T Recommendation G991.1
(ITU-T, Oct 1998)
[41]
ANSI T1E1.4
High Bit Rate Digital Subscriber Line 2nd Generation (HDSL2)
[42]
VDSL2: Very high speed digital subscriber line transceivers 2 (VDSL2)
ITU-T Recommendation G.993.2
(ITU-T, February 2006)
[43]
Espectro de asignación VDSL2
Wikipedia|
44
“New ITU Standard Delivers 10x ADSL Speeds”
ITU Press Release
27 de mayo de 2005
7498-4
Information
Processing
Systems
Open
Systems
Interconnection
Basic
Reference Model Part 4: Management Framework”, 1989
[46]
Introduction to TMN|
Aiko Pras, Enschede, the Netherlands
Abril 1999
[47]
CCITT
Blue
Book
“Recommendation
M.30,
Principles
for
a
Telecommunication
Management Network”, Volume IV, Fascicle IV.1, Geneva, 1989
[48]
CCITT   “Recommendation   M.3010,   Principles   for   a   Telecommunication   Management
Network”, Geneva, 1996
[49]
Nueva visión en la gestión de redes y servicios
José Antonio Lozano López, Carmen de Hita Álvarez
Telefónica I+D, Número 18, Setiembre 2000,|
[50]
RFC-1098 SMNP, J. Case et al, MIT Laboratory for Computer Science, 1989
[51]
ISO/IEC  17799:2000:  Information  technology  --  Code  of  practice  for  information  security
management
[52]
British Standards Institution. BS 7799-2:2002: Information security management systems -
specification with guidance for use.
Londres, 2002
[53]
The twenty
most critical Internet security vulnerability – The experts consensus
Version 6.01 November 28, 2005 Copyright (C) 2005, SANS Institute
[54]
Common Vulnerabilities and Exposures
CVE, the standard for information security vulnerability names
[55]
La rentabilidad de las medidas de seguridad de la información
Vicente Aceituno Canal, e.Security, septiembre 2004 – No 1, pp 36-37.
[56]
Amenazas, vulnerabilidades y contramedidas
Francisco
F.
Pardo Barro,
Curso:
Seguridad
en
Redes,
2002,
Programa
de
Doctorado
en
Tecnologías de la Información, DET, Universidad de Vigo
[57]
Clasificación y tipos de ataques contra sistemas de información
Delitosinformaticos.com, 25 de marzo de 2001
[58]
Security of the Internet
Marcel Dekker, New York, 1997
The Froehlich/Kent Encyclopedia of Telecommunications vol. 15., pp. 231-255.
[59]
Tipos de ataques
Ingeniería Dric
[60]
Sistemas de detección de intrusiones
Mª Aurora Garcés Navarro, Carlos Ruiz García, Abril 2002, Curso de Seguridad en Internet
Programa de Doctorado en Tecnologías de la Información, DET, Universidad de Vigo
[61]
Seguridad en sistemas de información   -  Detección de intrusos
http://redes-linux.all-inone.net/manuales/ seguridad/DeteccionDeIntrusos.pdf
[62]
Forma rápida de detectar intrusiones y registrar sucesos
Microsoft TechNet, 11 de agosto de 2004
[63]
Intrusion Detection Systems
Rebecca Bace and Peter Mell,  NIST Special Publications 800-31, Noviembre, 2001
[64]
DECRETO REGLAMENTARIO DEL USO DE LA FIRMA DIGITAL
[65]
Internet Firewall Tutorial – A white paper
Rob Pickering
RPA Network, July 2002
[66]
Wikipedia
[67]
Whatis.com|
[68]
ESIDE. Facultad de Ingeniería. Universidad de Deusto
Dr. Javier Areitio Bertolin.
[69]
Firewalls Frequently Asked Questions, 2004/07/26
Paul D. Robertson, Matt Curtin, Marcus J. Ranum.
[70]
Keeping your site comfortable secure: An introduction to Internet Firewalls
US Department of Commerce, NIST (National Institute of Standars and Technology)
John P. Wack, Lisa J. Carnahan
[71]
Virtual Private Networks|
Mariano Hevia
[72]
RFC 2402 - IP Authentication Header
S.Kent BBN Corp, R. Atkinson @Home Network
November 1998
[73]
RFC 2406 - IP Encapsulating Security Payload (ESP)
S.Kent BBN Corp, R. Atkinson @Home Network
November 1998
[74]
IPSec VPN Fundamentals
Pradosh Kumar Mohapatra and Mohan Dattatreya
Tasman Networks, TechOnLine, Sep. 19, 2002
Previous page Top Next page
Comparte ElPrisma.com en:   Tweet     Mister Wong 


Es política de El Prisma.com cumplir con las leyes nacionales y tratados internacionales que protegen la propiedad intelectual y los Derechos de Autor (Copyright). Los textos mostrados en esta página han sido enviados por nuestros usuarios que han declarado ser los autores de los mismos y han permitido su uso por parte de www.elprisma.com, si usted considera que la información contenida en esta página viola sus derechos de autor, por favor envíenos su notificación de infracción a sugerencias1[en]elprisma.com y removeremos los textos de nuestros servidores. Condiciones de Uso.

Administración de Empresas y Negocios, Economía y Finanzas, Mercadeo y Publicidad, Arquitectura, Diseño Gráfico, Diseño Industrial, Teología, Pedagogía, Ciencias Políticas, Derecho, Historia, Bellas Artes, Comunicación y Periodismo, Español y Literatura, Filosofía, Ingeniería Civil, Ingeniería de Minas y Petróleos, Ingeniería de Sistemas e Informática, Ingeniería Eléctrica y Electrónica, Ingeniería Industrial, Ingeniería Mecánica, Ingeniería Química, Biología, Física, Geografía, Matemáticas, Química, Medicina, Odontología, Psicología, Agronomía, Veterinaria, Zootecnia.