- Out-of-Stock

Roger J. Sutton
free shipping in Poland for all orders over 500 PLN
If your payment will be credited to our account by 11:00
Each consumer can return the purchased goods within 14 days
Author: Roger J. Sutton ISBN: 83-206-1517-8 Format: B5, 364 pages Publisher: WKiŁ |
About the book |
The book describes practical aspects of telecommunications security and management, taking into account different methods of protection, especially encryption. From the point of view of security, the problems were treated broadly, starting from the concept of the network and their initial configuration to maintaining the security of the operated networks through the management of encryption keys. Various types of civil and military communication networks and a wide range of issues, including, among others, voice transmission, landline telephony, mobile telephony, radiocommunications, fax networks, transmission and storage of data in personal computers, Internet protocols and e-mail. The book states:
Table of Contents: Preface Threats and data protection Introduction to encryption and security management Security of conversations in military communication systems Telephony security Protection systems for GSM mobile telephony Security of private VHF / UHF radio networks Radio-electronic defense - frequency hopping Mass and link data encryption Security of fax networks Security of personal computers Security of e-mail Security of virtual private networks Data transmission in military communication networks Management, service and training Literature List of shortcuts Dictionary of basic concepts Index |
No product available!
No product available!
Self-assembly case designed for the Odroid H2 computer. It allows you to conveniently mount the Odroid H2 computer and SATA 3.5" or SATA 2.5" drive. ODROID-H2 Case Type 4
No product available!
PCB board and programmed layout for the dawn and twilight simulator. AVT5480 A +
No product available!
No product available!
No product available!
No product available!
Orange Pi PC H3 Quad-core Learning Development Board Mali400MP2 GPU 1GB DDR3
No product available!
Modern Ukraine has a beautiful legend about a heroic ace pilot who defended the skies over Kyiv in his MiG-29 fighter. During the first 30 hours of the full-scale invasion of russia, "The Ghost of Kyiv" shot down six hostile russian aircraft, taking his place in the history of Ukraine forever. In total, he was credited with at least 40 kills. People called this unknown hero "The Ghost of Kyiv." It is impossible to overcome him, it is impossible not to admire him. In fact, the "Ghost of Kyiv" is a composite character of the pilots of the 40th Tactical Air Force Brigade of Ukraine, which has bravely defended Ukrainian skies ever since russia launched its war of aggression. UGears 70191
No product available!
No product available!
No product available!
No product available!
No product available!
The eXtremestyle silicone cable (1.5m length) with Lightning connector. Allows you to charge the device and transfer data. eXtreme S15ULB
No product available!
No product available!
No product available!
Roger J. Sutton