Опубликован: 10.10.2007 | Уровень: специалист | Доступ: платный
  • 1.
    Borenstein, Nathaniel S
    Multimedia Applications Development with the Andrew Toolkit
  • 2.
    International Standard — Information Processing — Character Code Structure and Extension Techniques
  • 3.
    International Standard — Information Processing — 8-bit Single-Byte Coded Graphic Character Sets
  • 4.
    International Standard — Information Technology — ISO 7-bit Coded Character Set for Information Interchange
  • 5.
    JPEG Draft Standard ISO 10918-1 CD
  • 6.
    Video Coding Draft Standard ISO 11172 CD
  • 7.
    CCITT, Fascicle III.4 — Recommendation G.711, “Pulse Code Modulation (PCM) of Voice Frequencies”
  • 8.
    PostScript Language Reference Manual
  • 9.
    Adobe Systems, Inc., PostScript Language Reference Manual
  • 10.
    K.R, Sollins
    “TFTP Protocol (revision 2)”, RFC-783
  • 11.
    J.B, Postel
    “Simple Mail Transfer Protocol”, STD-10, RFC-821
  • 12.
    M. and E, Rose
    “Proposed Standard for Message Encapsulation”, RFC-934
  • 13.
    J. and J. Reynolds, Postel
    “File Transfer Protocol”, STD 9, RFC-959
  • 14.
    M, Sirbu
    “Content-Type Header Field for Internet Messages”, RFC-1049
  • 15.
    and R. Ullmann, D., Robinson
    “Encoding Header Field for Internet Messages”, RFC-1154
  • 16.
    and N. Freed, Borenstein, N.
    “MIME (Multipurpose Internet Mail Extensions): Mechanisms for Specifying and Describing the Format of Internet Message Bodies”, RFC- 1341
  • 17.
    K, Moore
    “Representation of Non-Ascii Text in Internet Message Headers”, RFC-1342
  • 18.
    Borenstein, N
    “Implications of MIME for Internet Mail Gateways”, RFC-1344
  • 19.
    K, Simonsen
    “Character Mnemonics & Character Sets”, RFC-1345
  • 20.
    J, Linn
    “Privacy Enhancement for Internet Electronic Mail: Part I — Message Encryption and Authentication Procedures”, RFC-1421
  • 21.
    Kent, S
    “Privacy Enhancement for Internet Electronic Mail: Part II — Certificate-Based Key Management”, RFC-1422
  • 22.
    Balenson, D
    “Privacy Enhancement for Internet Electronic Mail: Part III — Algorithms, Modes, and Identifiers”
  • 23.
    B, Kaliski
    “Privacy Enhancement for Internet Electronic Mail: Part IV — Key Certification and Related Services”
  • 24.
    and Freed, Borenstein, N, N.
    “MIME (Multipurpose Internet Mail Extensions): Mechanisms for Specifying and Describing the Format of Internet Message Bodies”, RFC-1521
  • 25.
    K, Moore
    “Representation of Non-ASCII Text in Internet Message Headers”, RFC-1522
  • 26.
    Borenstein, N
    “A User Agent Configuration Mechanism for Multimedia Mail Format Information”, RFC-1524
  • 27.
    J, Postel
    “Instructions to RFC Authors”, RFC-1543
  • 28.
    H, Nussbacher
    “Handling of Bi-directional Texts in MIME”, RFC-1556
  • 29.
    J, Postel
    “Media Type Registration Procedure”, RFC-1590
  • 30.
    C., Gross, Huitema, P
    “The Internet Standards Process — Revision 2”
  • 31.
    and Crocker, D, E., Freed, J, Klensin, M., N., Rose, Stefferud
    “SMTP Service Extension for 8bit-MIME transport”, RFC-1652
  • 32.
    J. and J. Postel, Reynolds
    “Assigned Numbers”, STD-2, RFC-1700
  • 33.
    and Fair, Crocker, D., E, Faltstrom, P.
    “MIME Content Type for BinHex Encoded Files”
  • 34.
    and A. Walker, P., Resnick
    “The text/enriched MIME Content-type”, RFC-1896
  • 35.
    and and N. Borenstein, Freed, N.
    “Multipurpose Internet Mail Extensions (MIME) Part One: Format of Internet Message Bodies”, RFC-2045
  • 36.
    and N. Borenstein, Freed, N.
    “Multipurpose Internet Mail Extensions (MIME) Part Two: Media Types”, RFC-2046
  • 37.
    K, Moore
    “Multipurpose Internet Mail Extensions (MIME) Part Three: Representation of Non-ASCII Text in Internet Message Headers”, RFC-2047
  • 38.
    and J. Postel, Freed, J., Klensin, N.
    “Multipurpose Internet Mail Extensions (MIME) Part Four: MIME Registration Procedures”, RFC-2048
  • 39.
    Freed, N. and N. Borenstein
    “Multipurpose Internet Mail Extensions (MIME) Part Five: Conformance Criteria and Examples”, RFC-2049
  • 40.
    Coded Character Set — 7-Bit American Standard Code for Information Interchange
  • 41.
    J, Myers
    “ACAP — Application Configuration Access Protocol”
  • 42.
    and J. Postel, J., Reynolds
    “Assigned Numbers”, STD 2, RFC 1700
  • 43.
    and Dorner, R., S, Troost
    “Communicating Presentation Information in Internet Messages: The Content-Disposition Header”, RFC 1806
  • 44.
    J, Myers
    “IMAP4 Authentication Mechanism”, RFC 1731
  • 45.
    Crispin, M
    “IMAP4 Compatibility with IMAP2bis”, RFC 2061
  • 46.
    Austein, R
    “Synchronization Operations for Disconnected IMAP4 Clients”
  • 47.
    Crispin, M
    “IMAP4 Compatibility with IMAP2 and IMAP2bis”, RFC 1732
  • 48.
    Crispin, M
    “Distributed Electronic Mail Models in IMAP4”, RFC 1733
  • 49.
    Crispin, M
    “Internet Message Access Protocol — Obsolete Syntax”, RFC 2062
  • 50.
    Crispin, M
    “Interactive Mail Access Protocol — Version 2”, RFC 1176
  • 51.
    Alvestrand, H
    “Tags for the Identification of Languages”, RFC 1766
  • 52.
    and N. Borenstein, Freed, N.
    “MIME (Multipurpose Internet Mail Extensions) Part One: Format of Internet Message Bodies”, RFC 2045
  • 53.
    and N. Borenstein, Freed, N.
    “MIME (Multipurpose Internet Mail Extensions) Part Two: Media Types”, RFC 2046
  • 54.
    K, Moore
    “MIME (Multipurpose Internet Mail Extensions) Part Three: Message Header Extensions for Non-ASCII Text”, RFC 2047
  • 55.
    Crocker, D
    “Standard for the Format of ARPA Internet Text Messages”, STD 11, RFC 822
  • 56.
    J, Postel
    “Simple Mail Transfer Protocol”, STD 10, RFC 821
  • 57.
    and Davis, D., Goldsmith, M
    “UTF-7: A Mail-Safe Transformation Format of Unicode”, RFC 1642
  • 58.
    G, Salton
    “Automatic Text Analysis”
  • 59.
    H. P, Luhn
    “The automatic creation of literature abstracts”
  • 60.
    Chris Buckley and Edvard A. Fox, Gerard Salton
  • 61.
  • 63.
    Roger Whitney
  • 64.
    Abate, et al
    AT&T’s new approach to the synchronization of telecommunication networks
  • 65.
    Allan, D.W., J.H. Shoaf and D. Halford
    Statistics of time and frequency data analysis
  • 66.
    Allan, D.W., J.E. Gray and H.E. Machlan
    The National Bureau of Standards atomic time scale: generation, stability, accuracy and accessibility
  • 67.
    and R. Gallager, Bertsekas, D.
    Data Networks
  • 68.
    B.E, Blair
    Time and frequency dissemination: an overview of principles and techniques
  • 69.
    Braun, W.B
    Short term frequency effects in networks of coupled oscillators
  • 70.
    and C. Foxcroft, Cole, R.
    An experiment in clock synchronization
  • 71.
    Defense Advanced Research Projects Agency. Internet Protocol
    DARPA Network Working Group Report RFC-791, USC Information Sciences Institute, September 1981
  • 72.
    Defense Advanced Research Projects Agency. Internet Control Message Protocol
    DARPA Network Working Group Report RFC-792, USC Information Sciences Institute, September 1981
  • 73.
    Digital Time Service Functional Specification Version T.1.0.5
  • 74.
    and E.M. Reingold, Dershowitz, N.
    Calendrical Calculations
  • 75.
    Frank, R.L
    History of LORAN-C
  • 76.
    and S. Zatti, Gusella, R.
    TEMPO — A network time controller for a distributed Berkeley UNIX system
  • 77.
    and S. Zatti, Gusella, R.
    The Berkeley UNIX 4.3BSD time synchronization protocol: protocol specification
  • 78.
    and S. Zatti, Gusella, R.
    An election algorithm for a distributed clock synchronization program
  • 79.
    B. Simons, Halpern, J.Y., R. Strong and D. Dolly
    Fault-tolerant clock synchronization
  • 80.
    E.C, Jordan
    Reference Data for Engineers, Seventh Edition
  • 81.
    and W. Ochsenreiter, H., Kopetz
    Clock synchronization in distributed real-time systems
  • 82.
    L, Lamport
    Time, clocks and the ordering of events in a distributed system
  • 83.
    and P.M. Melliar-Smith, L., Lamport
    Synchronizing clocks in the presence of faults
  • 84.
    and A.V. Kantak, Lindsay, W.C.
    Network synchronization of random signals
  • 85.
    and N.A. Lynch, J., Lundelius
    A new fault-tolerant algorithm for clock synchronization
  • 86.
    and S. Owicki, K., Marzullo
    Maintaining the time in a distributed system
  • 87.
    D.L, Mills
    Time Synchronization in DCNET Hosts
  • 88.
    D.L, Mills
    DCNET Internet Clock Service
  • 89.
    D.L, Mills
    Internet Delay Experiments
  • 90.
    D.L, Mills
    DCN local-network protocols
  • 91.
    D.L, Mills
    Network Time Protocol (NTP)
  • 92.
    D.L, Mills
    Network Time Protocol (version 1) — specification and implementation
  • 93.
    D.L, Mills
    The Fuzzball
  • 94.
    D.L, Mills
    Measured performance of the Network Time Protocol in the Internet system
  • 95.
    D.L, Mills
    Internet time synchronization: the Network Time Protocol
  • 96.
    D.L, Mills
    On the chronology and metrology of computer network timescales and their application to the Network Time Protocol
  • 97.
    D, Mitra
    Network synchronization: analysis of a hybrid of masterslave and mutual synchronization
  • 98.
    Data Encryption Standard. Federal Information Processing Standards Publication 46
  • 99.
    Time and Frequency Dissemination Services
  • 100.
    DES Modes of Operation
    Federal Information Processing Standards Publication 81. National Bureau of Standards, U.S. Department of Commerce, December 1980
  • 101.
    J, Postel
    User Datagram Protocol
  • 102.
    J, Postel
    Daytime protocol. DARPA Network
  • 103.
    J, Postel
    Time protocol
  • 104.
    N.W, Rickert
    Non Byzantine clock synchronization — a programming experiment
  • 105.
    F.B, Schneider
    A paradigm for reliable clock synchronization
  • 106.
    J, Smith
    Modern Communications Circuits
  • 107.
    and S. Toueg, Srikanth, T.K.
    Optimal clock synchronization
  • 108.
    and J.I. Schiller, C. Neuman, J.G., Steiner
    Kerberos: an authentication service for open network systems
  • 109.
    Su, Z
    A specification of the Internet protocol (IP) timestamp option
  • 110.
    and S.H. Chang, S.K., Tripathi
    ETempo: a clock synchronization algorithm for hierarchical LANs — implementation and measurements
  • 111.
    A.J., and W.C. Melton, Van Dierendonck
    Applications of time transfer using NAVSTAR GPS
  • 112.
    E.R, Vass
    OMEGA navigation system: present status and plans 1977-1980
  • 113.
    CCITT. Recommendation X.208: "Specification of Abstract Syntax Notation One (ASN.1)"
  • 114.
    CCITT. Recommendation X.209: "Specification of Basic Encoding Rules for Abstract Syntax Notation One (ASN.1)"
  • 115.
    CCITT. Recommendation X.509: "The Directory - Authentication Framework"
  • 116.
    CCITT. Recommendation X.520: "The Directory - Selected Attribute Types"
  • 117.
    RSA Laboratories. PKCS #1: RSA Encryption Standard, Version 1.5
  • 118.
    RSA Laboratories. PKCS #6: Extended-Certificate Syntax Standard, Version 1.5
  • 119.
    R. Rivest
    RFC 1321: The MD5 Message Digest Algorithm
  • 120.
    R. Rivest
    RFC 1319: The MD2 Message Digest Algorithm
  • 121.
    B. Schneier
    Applied Cryptography: Protocols, Algorithms, и Source Code in C
  • 122.
    M. Abadi и R. Needham
    Prudent engineering practice for cryptographic protocols
  • 123.
    W. Tuchman
    “Hellman Presents No Shortcut Solutions To DES”
  • 124.
    Bleichenbacher D
    “Chosen Ciphertext Attacks against Protocols Based on RSA Encryption Standard PKCS #1”
  • 125.
    ANSI X3.106, “American National Standard for Information Systems-Data Link Encryption"
  • 126.
    W. Diffie and M. E. Hellman
    “New Directions in Cryptography”
  • 127.
    “Digital Signature Standard”
    IST FIPS PUB 186,National Institute of Standards and Technology
  • 128.
    and J. Reynolds, Postel J.
    “File Transfer Protocol”, STD-9, RFC-959
  • 129.
    and H. Frystyk, Berners-Lee, Fielding, R., T.
    “Hypertext Transfer Protocol — HTTP/1.0”, RFC-1945
  • 130.
    and R. Canetti, Bellare, H., Krawczyk, M.
    “HMAC: Keyed-Hashing for Message Authentication,” RFC-2104
  • 131.
    X. Lai
    “On the Design and Security of Block Ciphers”
  • 132.
    B, Kaliski
    “The MD2 Message Digest Algorithm”, RFC-1319
  • 133.
    R, Rivest
    “The MD5 Message Digest Algorithm”, RFC-1321
  • 134.
    RSA Laboratories, “PKCS #1: RSA Encryption Standard,” version 1.5
  • 135.
    RSA Laboratories, “PKCS #6: RSA Extended Certificate Syntax Standard,” version 1.5
  • 136.
    RSA Laboratories, “PKCS #7: RSA Cryptographic Message Syntax Standard,” version 1.5
  • 137.
    Ford, Housley, Polk, R., W., W. and D. Solo
    “Internet Public Key Infrastructure: Part I: X.509 Certificate and CRL Profile”, RFC-2459
  • 138.
    R, Rivest
    “A Description of the RC2(r) Encryption Algorithm”, RFC 2268
  • 139.
    R. and K. Kaukonen, Thayer
    A Stream Cipher Encryption Algorithm
  • 140.
    A. Shamir, and L. M. Adleman, R. Rivest
    “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems”
  • 141.
    Contact RSA Data Security
  • 142.
    B. Schneier
    Applied Cryptography: Protocols, Algorithms, and Source Code in C
  • 143.
    NIST FIPS PUB 180-1, “Secure Hash Standard”
  • 144.
    Hickman, Kipp
    “The SSL Protocol”
  • 145.
    A. Frier, and P. Kocher, P. Karlton
    “The SSL 3.0 Protocol”
  • 146.
    J, Postel
    “Transmission Control Protocol,” STD-7, RFC 793
  • 147.
    and J. Reynolds, Postel J.
    “Telnet Option Specifications”, STD-8, RFC-855
  • 148.
    CCITT. Recommendation X.509: “The Directory — Authentication Framework”
  • 149.
    R. Srinivansan
    Sun Microsystems, RFC-1832: XDR: External Data Representation Standard
  • 150.
    K. Seo, S. Kent
    Security Architecture for the Internet Protocol
  • 151.
    S. Kent
    IP Authentication Header
  • 152.
    S. Kent
    IP Encapsulating Security Payload (ESP)
  • 153.
    S. Kent
    Extended Sequence Number (ESN) Addendum to IPsec Domain of Interpretation (DOI) for Internet Security Association and Key Management Protocol (ISAKMP)
  • 154.
    H.Krawczyk, M. Bellare, R. Canetti
    HMAC: Keyed-Hashing for Message Authentication
  • 155.
    C. Madson, R. Glenn
    The Use of HMAC-SHA-1-96 within ESP and AH
  • 156.
    D. Piper
    The Internet IP Security Domain of Interpretation for ISAKMP
  • 157.
    D. Maughan, J. Turner, M. Schertler, M. Schneider
    Internet Security Association and Key Management Protocol (ISAKMP)
  • 158.
    C. Kaufman
    Internet Key Exchange (IKEv2) Protocol
  • 159.
    R. Glenn, S. Kent
    The NULL Encryption Algorithm and Its Use With IPsec
  • 160.
    N. Doraswamy, R. Glenn, R. Thayer
    IP Security Document Roadmap
  • 161.
    H. Orman
    The OAKLEY Key Determination Protocol
  • 162.
    J.Touch, L. Eggert, Y. Wang
    Use of IPsec Transport Mode for Dynamic Routing
  • 163.
    У.Блэк
    Интернет. Протоколы безопасности
  • 164.
    Терри Оглтри
    Firewalls. Практическое применение межсетевых экранов
  • 167.
    C.Г.Баричев, В.В.Гончаров, Р.Е.Серов
    Основы современной криптографии
  • 168.
    and John Smolin, Charles H. Bennett, Francois Bessette, Gilles Brassard, Louis Salvail
    Experimental Quantum Cryptography
  • 169.
    and Artur Ekert, Charles H. Bennett, Gilles Brassard
  • 172.
    A.K. Ekert
    Quantum Cryptography Based on Bell's Theorem
  • 173.
    Toby Howard
  • 174.
    C.H. Bennet
    Quantum Cryptography Using Any Two Non-Orthogonal States
  • 175.
    J. D. Franson and H.Ilves
    "Quantum Cryptography Using Optical Fibers"
  • 176.
    R. J. Hughes et al
    Quantum Cryptography Over 14 km of Installed Optical Fiber
  • 177.
    С. H. Bennet et al
    Generalized Privacy Amplification
  • 178.
    Ю. А. Розанов, Ю. В. Прохоров
    Теория вероятностей. Основные понятия, предельные теоремы, случайные процессы
  • 179.
    Guide to Network Resource Tools
  • 180.
    Douglas E. Comer
    Internetworking with TCP/IP
  • 181.
    Uyless Black, TCP/IP and Related Protocols
  • 182.
    E., et al, Feinler
    DDN Protocol Handbook, DDN Network Information Center
  • 183.
    Spider Systems, Ltd., Packets and Protocols
  • 184.
    et al, Tony Bates
    Representation of IP Routing Polices in a Routing Registry
  • 185.
    A. I. Kravtsov, A. N. Bobyshev, A. O. Saphonov, M. Ernst, S. I. Burov, Yu. A. Semenov
    ITEPNET to Internet communication
  • 186.
    Robert J. T. Morris
    Neural Network Control of Communications Systems IEEE Transactions on Neural Networks
  • 187.
    Paul J. Fortier
    Handbook of LAN Technology. 2-nd Edition
  • 188.
    У.Ричард Стивенс
    Протоколы TCP/IP. Практическое руководство
  • 189.
    et al, Matthew Flint Arnett, Mike Coulombe
    Inside TCP/IP, Second Edition
  • 190.
    Лаура Ф. Чаппелл и Дэн Е. Хейкс
    Анализатор локальных сетей NetWare (Руководство Novell)
  • 191.
    А. В. Фролов и Г. В. Фролов
    Локальные сети персональных компьютеров. Использование протоколов IPX, SPX, NETBIOS
  • 192.
    К. Джамса, К. Коуп
    Программирование для INTERNET в среде Windows
  • 193.
    Bryant Dunetz, Charles Summers
    ISDN How to get a high-speed connection to the Internet
  • 194.
    John M. Griffiths
    ISDN Explained, Worldwide Network and Applications Technology, 2 edition
  • 195.
    П. Боккер
    ISDN. Цифровая сеть с интеграцией служб. Понятия, методы, системы
  • 196.
    С. Вильховченко
    Модем 96. Выбор, настройка и использование
  • 197.
    И. А. Мизина и А. П. Кулешова
    Справочник "Протоколы информационно-вычислительных сетей"
  • 198.
    Douglas E. Comer
    nternetworking with TCP/IP
  • 199.
    Craig Hunt
    TCP/IP Network Administration
  • 200.
    А. В. Фролов и Г.В. Фролов
    Модемы и факс-модемы. Программирование для MS-DOS и Windows
  • 201.
    Семенов Ю. А
    Протоколы и ресурсы INTERNET. "Радио и связь"
  • 202.
    Семенов Ю. А
    Сети Интернет. Архитектура и протоколы
  • 203.
    А. Н. Назаров, М.В. Симонов
    ATM-технология высокоскоростных сетей
  • 204.
    Н. Н. Слепов
    Синхронные цифровые сети SDH
  • 205.
    Интернет. Всемирная компьютерная сеть. Практическое пособие и путеводитель
  • 206.
    World Wide Web. Всемирная Информационная паутина в сети Интернет. Практическое руководство
  • 207.
    Эд Крол
    Все об INTERNET
  • 208.
    Пол Гилстер
    Навигатор INTERNET. Путеводитель для человека с компьютером и модемом
  • 209.
    В. Уразметов, С. Клименко
    Internet. Среда обитания информационного общества
  • 210.
    Лаем Куин, Ричард Рассел
    Fast Ethernet
  • 211.
    Тимоти Паркер
    Освой самостоятельно TCP/IP
  • 212.
    Дональд Дж. Стерлинг
    Волоконная оптика. Техническое руководство
  • 213.
    Дж. Гауэр
    Оптические системы связи
  • 214.
    Стивен Спейнаур и Валери Куэрсиа
    Справочник WEB-мастера
  • 215.
    Lincoln D. Stein
    Web Security: a step-by-step reference guide
  • 216.
    Ahmed El Hakeem, Mostafa H. Ammar, Tarek N. Saadawi
    Fundamentals of Telecommunication Networks
  • 217.
    К.Шеннон
    Работы по теории информации и кибернетике
  • 218.
    В.Е.Котов
    Сети Петри
  • 219.
    Лайза Хендерсон, Том Дженкинс
    Frame Relay межсетевые взаимодействия
  • 220.
    Семенов Ю.А
    Протоколы Интернет. Энциклопедия
  • 221.
    Семенов Ю.А
    Протоколы Интернет для электронной торговли
  • 222.
    Майкл Дж. Мартин
    Введение в сетевые технологии
  • 223.
    У. Блэк
    Интернет. Протоколы безопасности
  • 224.
    В.В. Гончаров, Р.Е. Серов, С.Г. Баричев
    Основы современной криптографии. 2-е издание
  • 225.
    Э. Таненбаум
    Компьютерные сети. 4-е издание
Евгений Виноградов
Евгений Виноградов

Прошел экстерном экзамен по курсу перепордготовки "Информационная безопасность". Хочу получить диплом, но не вижу где оплатить? Ну и соответственно , как с получением бумажного документа?

Илья Сидоркин
Илья Сидоркин

Добрый день! Подскажите пожалуйста как и когда получить диплом, после сдичи и оплаты?????

Р Алоев
Р Алоев
Россия
Татьяна Тренина
Татьяна Тренина
Россия, Челябинск