Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"Rochester Institute of Technology" +contributor:("Johnson, Daryl"). Showing records 1 – 13 of 13 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


Rochester Institute of Technology

1. Snyder, Walter C. Evaluating the effectiveness of packet filter firewall applications in a “dual stack” internet protocol environment.

Degree: 2010, Rochester Institute of Technology

Technology providers have been implementing IPv6 capabilities including networking services and security tools for the past several years in anticipation for the transition from… (more)

Subjects/Keywords: Firewall; Internet; IPv6; Packet filter

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Snyder, W. C. (2010). Evaluating the effectiveness of packet filter firewall applications in a “dual stack” internet protocol environment. (Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/820

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Snyder, Walter C. “Evaluating the effectiveness of packet filter firewall applications in a “dual stack” internet protocol environment.” 2010. Thesis, Rochester Institute of Technology. Accessed November 14, 2019. https://scholarworks.rit.edu/theses/820.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Snyder, Walter C. “Evaluating the effectiveness of packet filter firewall applications in a “dual stack” internet protocol environment.” 2010. Web. 14 Nov 2019.

Vancouver:

Snyder WC. Evaluating the effectiveness of packet filter firewall applications in a “dual stack” internet protocol environment. [Internet] [Thesis]. Rochester Institute of Technology; 2010. [cited 2019 Nov 14]. Available from: https://scholarworks.rit.edu/theses/820.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Snyder WC. Evaluating the effectiveness of packet filter firewall applications in a “dual stack” internet protocol environment. [Thesis]. Rochester Institute of Technology; 2010. Available from: https://scholarworks.rit.edu/theses/820

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rochester Institute of Technology

2. Lloyd, Patrick. An Exploration of covert channels within voice over IP.

Degree: 2010, Rochester Institute of Technology

  In the following thesis, an overview of covert channels within Voice over IP is given and then expanded upon by presenting an experiment which… (more)

Subjects/Keywords: Covert channels; Steganography; Voice over ip; VoIP

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lloyd, P. (2010). An Exploration of covert channels within voice over IP. (Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/814

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lloyd, Patrick. “An Exploration of covert channels within voice over IP.” 2010. Thesis, Rochester Institute of Technology. Accessed November 14, 2019. https://scholarworks.rit.edu/theses/814.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lloyd, Patrick. “An Exploration of covert channels within voice over IP.” 2010. Web. 14 Nov 2019.

Vancouver:

Lloyd P. An Exploration of covert channels within voice over IP. [Internet] [Thesis]. Rochester Institute of Technology; 2010. [cited 2019 Nov 14]. Available from: https://scholarworks.rit.edu/theses/814.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lloyd P. An Exploration of covert channels within voice over IP. [Thesis]. Rochester Institute of Technology; 2010. Available from: https://scholarworks.rit.edu/theses/814

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rochester Institute of Technology

3. Savacool, Richard. Firewall resistance to metaferography in network communications.

Degree: 2010, Rochester Institute of Technology

  In recent years corporations and other enterprises have seen a consolidation of security services on the network perimeter. Services that have traditionally been stand-alone,… (more)

Subjects/Keywords: Application-layer firewall; Covert channels; Information hiding; Metaferography; Signature-based detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Savacool, R. (2010). Firewall resistance to metaferography in network communications. (Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/825

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Savacool, Richard. “Firewall resistance to metaferography in network communications.” 2010. Thesis, Rochester Institute of Technology. Accessed November 14, 2019. https://scholarworks.rit.edu/theses/825.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Savacool, Richard. “Firewall resistance to metaferography in network communications.” 2010. Web. 14 Nov 2019.

Vancouver:

Savacool R. Firewall resistance to metaferography in network communications. [Internet] [Thesis]. Rochester Institute of Technology; 2010. [cited 2019 Nov 14]. Available from: https://scholarworks.rit.edu/theses/825.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Savacool R. Firewall resistance to metaferography in network communications. [Thesis]. Rochester Institute of Technology; 2010. Available from: https://scholarworks.rit.edu/theses/825

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rochester Institute of Technology

4. Lidestri, Matthew. Providing public key certificate authorization and policy with DNS.

Degree: Department of Computing Security (GCCIS), 2012, Rochester Institute of Technology

  Public Key Infrastructure (PKI) instills trust in certificates commonly used to secure email, web traffic, VPNs, file transfers, and other forms of network communication.… (more)

Subjects/Keywords: Breach; Certificate authority; DNS; Public key infrastructure; SSL

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lidestri, M. (2012). Providing public key certificate authorization and policy with DNS. (Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/7521

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lidestri, Matthew. “Providing public key certificate authorization and policy with DNS.” 2012. Thesis, Rochester Institute of Technology. Accessed November 14, 2019. https://scholarworks.rit.edu/theses/7521.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lidestri, Matthew. “Providing public key certificate authorization and policy with DNS.” 2012. Web. 14 Nov 2019.

Vancouver:

Lidestri M. Providing public key certificate authorization and policy with DNS. [Internet] [Thesis]. Rochester Institute of Technology; 2012. [cited 2019 Nov 14]. Available from: https://scholarworks.rit.edu/theses/7521.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lidestri M. Providing public key certificate authorization and policy with DNS. [Thesis]. Rochester Institute of Technology; 2012. Available from: https://scholarworks.rit.edu/theses/7521

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rochester Institute of Technology

5. Imhof, Robert. Cyber crime and telecommunications law.

Degree: 2010, Rochester Institute of Technology

 Cyber crime is a new and emerging area of concern for technology professionals, business leaders, and heads of government. This research takes a look at… (more)

Subjects/Keywords: Cyber crime; Hacker; Information; Law; Security; Sociology

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Imhof, R. (2010). Cyber crime and telecommunications law. (Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/821

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Imhof, Robert. “Cyber crime and telecommunications law.” 2010. Thesis, Rochester Institute of Technology. Accessed November 14, 2019. https://scholarworks.rit.edu/theses/821.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Imhof, Robert. “Cyber crime and telecommunications law.” 2010. Web. 14 Nov 2019.

Vancouver:

Imhof R. Cyber crime and telecommunications law. [Internet] [Thesis]. Rochester Institute of Technology; 2010. [cited 2019 Nov 14]. Available from: https://scholarworks.rit.edu/theses/821.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Imhof R. Cyber crime and telecommunications law. [Thesis]. Rochester Institute of Technology; 2010. Available from: https://scholarworks.rit.edu/theses/821

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rochester Institute of Technology

6. Hirwani, Manish. Forensic analysis of VMware hard disks.

Degree: 2011, Rochester Institute of Technology

 With the advancement in virtualization technology, virtual machines (VMs) are becoming a common and an integral part of datacenters. As the popularity and use of… (more)

Subjects/Keywords: Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hirwani, M. (2011). Forensic analysis of VMware hard disks. (Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/624

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hirwani, Manish. “Forensic analysis of VMware hard disks.” 2011. Thesis, Rochester Institute of Technology. Accessed November 14, 2019. https://scholarworks.rit.edu/theses/624.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hirwani, Manish. “Forensic analysis of VMware hard disks.” 2011. Web. 14 Nov 2019.

Vancouver:

Hirwani M. Forensic analysis of VMware hard disks. [Internet] [Thesis]. Rochester Institute of Technology; 2011. [cited 2019 Nov 14]. Available from: https://scholarworks.rit.edu/theses/624.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hirwani M. Forensic analysis of VMware hard disks. [Thesis]. Rochester Institute of Technology; 2011. Available from: https://scholarworks.rit.edu/theses/624

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rochester Institute of Technology

7. Winemiller, Nathan. NAT denial of service: An Analysis of translation table behavior on multiple platforms.

Degree: MS, Computer Science (GCCIS), 2011, Rochester Institute of Technology

  Network Address Translation or NAT, is a technology that is used to translate internal addresses to globally routable addresses on the internet. It is… (more)

Subjects/Keywords: Denial of service; NAT; Network address translation; Translation table

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Winemiller, N. (2011). NAT denial of service: An Analysis of translation table behavior on multiple platforms. (Masters Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/315

Chicago Manual of Style (16th Edition):

Winemiller, Nathan. “NAT denial of service: An Analysis of translation table behavior on multiple platforms.” 2011. Masters Thesis, Rochester Institute of Technology. Accessed November 14, 2019. https://scholarworks.rit.edu/theses/315.

MLA Handbook (7th Edition):

Winemiller, Nathan. “NAT denial of service: An Analysis of translation table behavior on multiple platforms.” 2011. Web. 14 Nov 2019.

Vancouver:

Winemiller N. NAT denial of service: An Analysis of translation table behavior on multiple platforms. [Internet] [Masters thesis]. Rochester Institute of Technology; 2011. [cited 2019 Nov 14]. Available from: https://scholarworks.rit.edu/theses/315.

Council of Science Editors:

Winemiller N. NAT denial of service: An Analysis of translation table behavior on multiple platforms. [Masters Thesis]. Rochester Institute of Technology; 2011. Available from: https://scholarworks.rit.edu/theses/315


Rochester Institute of Technology

8. Froehlich, Jason. Correlating IPv6 addresses for network situational awareness.

Degree: MS, Information Sciences and Technologies (GCCIS), 2011, Rochester Institute of Technology

  The advent of the IPv6 protocol on enterprise networks provides fresh challenges to network incident investigators. Unlike the conventional behavior and implementation of its… (more)

Subjects/Keywords: IPv6; NDP for IPv6; Network management; Network security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Froehlich, J. (2011). Correlating IPv6 addresses for network situational awareness. (Masters Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/393

Chicago Manual of Style (16th Edition):

Froehlich, Jason. “Correlating IPv6 addresses for network situational awareness.” 2011. Masters Thesis, Rochester Institute of Technology. Accessed November 14, 2019. https://scholarworks.rit.edu/theses/393.

MLA Handbook (7th Edition):

Froehlich, Jason. “Correlating IPv6 addresses for network situational awareness.” 2011. Web. 14 Nov 2019.

Vancouver:

Froehlich J. Correlating IPv6 addresses for network situational awareness. [Internet] [Masters thesis]. Rochester Institute of Technology; 2011. [cited 2019 Nov 14]. Available from: https://scholarworks.rit.edu/theses/393.

Council of Science Editors:

Froehlich J. Correlating IPv6 addresses for network situational awareness. [Masters Thesis]. Rochester Institute of Technology; 2011. Available from: https://scholarworks.rit.edu/theses/393


Rochester Institute of Technology

9. Spinapolice, Matthew. Mitigating the risk of social engineering attacks.

Degree: MS, Information Sciences and Technologies (GCCIS), 2011, Rochester Institute of Technology

  The topic of social engineering is only covered briefly in today's system administration and security coursework. This lack of coverage leaves many Administrators ill-equipped… (more)

Subjects/Keywords: Network security; Social engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Spinapolice, M. (2011). Mitigating the risk of social engineering attacks. (Masters Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/394

Chicago Manual of Style (16th Edition):

Spinapolice, Matthew. “Mitigating the risk of social engineering attacks.” 2011. Masters Thesis, Rochester Institute of Technology. Accessed November 14, 2019. https://scholarworks.rit.edu/theses/394.

MLA Handbook (7th Edition):

Spinapolice, Matthew. “Mitigating the risk of social engineering attacks.” 2011. Web. 14 Nov 2019.

Vancouver:

Spinapolice M. Mitigating the risk of social engineering attacks. [Internet] [Masters thesis]. Rochester Institute of Technology; 2011. [cited 2019 Nov 14]. Available from: https://scholarworks.rit.edu/theses/394.

Council of Science Editors:

Spinapolice M. Mitigating the risk of social engineering attacks. [Masters Thesis]. Rochester Institute of Technology; 2011. Available from: https://scholarworks.rit.edu/theses/394


Rochester Institute of Technology

10. Adeloye, Brian. HTTP man-in-the-middle code execution.

Degree: Department of Computing Security (GCCIS), 2013, Rochester Institute of Technology

 As the Internet continues to mature, users are faced with an increasingly hostile environment on the World Wide Web. Additionally, public WiFi networks continue to… (more)

Subjects/Keywords: None provided

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Adeloye, B. (2013). HTTP man-in-the-middle code execution. (Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/5536

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Adeloye, Brian. “HTTP man-in-the-middle code execution.” 2013. Thesis, Rochester Institute of Technology. Accessed November 14, 2019. https://scholarworks.rit.edu/theses/5536.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Adeloye, Brian. “HTTP man-in-the-middle code execution.” 2013. Web. 14 Nov 2019.

Vancouver:

Adeloye B. HTTP man-in-the-middle code execution. [Internet] [Thesis]. Rochester Institute of Technology; 2013. [cited 2019 Nov 14]. Available from: https://scholarworks.rit.edu/theses/5536.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Adeloye B. HTTP man-in-the-middle code execution. [Thesis]. Rochester Institute of Technology; 2013. Available from: https://scholarworks.rit.edu/theses/5536

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rochester Institute of Technology

11. Shanmuganathan, Remesh. IP and ATM integration: A New paradigm in multi-service internetworking.

Degree: Information Sciences and Technologies (GCCIS), 1999, Rochester Institute of Technology

 ATM is a widespread technology adopted by many to support advanced data communication, in particular efficient Internet services provision. The expected challenges of multimedia communication… (more)

Subjects/Keywords: Information technology

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shanmuganathan, R. (1999). IP and ATM integration: A New paradigm in multi-service internetworking. (Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/392

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Shanmuganathan, Remesh. “IP and ATM integration: A New paradigm in multi-service internetworking.” 1999. Thesis, Rochester Institute of Technology. Accessed November 14, 2019. https://scholarworks.rit.edu/theses/392.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Shanmuganathan, Remesh. “IP and ATM integration: A New paradigm in multi-service internetworking.” 1999. Web. 14 Nov 2019.

Vancouver:

Shanmuganathan R. IP and ATM integration: A New paradigm in multi-service internetworking. [Internet] [Thesis]. Rochester Institute of Technology; 1999. [cited 2019 Nov 14]. Available from: https://scholarworks.rit.edu/theses/392.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Shanmuganathan R. IP and ATM integration: A New paradigm in multi-service internetworking. [Thesis]. Rochester Institute of Technology; 1999. Available from: https://scholarworks.rit.edu/theses/392

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rochester Institute of Technology

12. Lurain, Sher. Network security: Risk assessment of information systems.

Degree: Computer Science (GCCIS), 1990, Rochester Institute of Technology

 This paper investigates fundamental security issues and the growing impact of security breaches on computer networks. Cost-effective security measures, such as asset-threat analysis, enable monitoring… (more)

Subjects/Keywords: Access control; Authentication; Cryptology; Data security; Network security; Passwords; Transmission security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lurain, S. (1990). Network security: Risk assessment of information systems. (Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/349

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lurain, Sher. “Network security: Risk assessment of information systems.” 1990. Thesis, Rochester Institute of Technology. Accessed November 14, 2019. https://scholarworks.rit.edu/theses/349.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lurain, Sher. “Network security: Risk assessment of information systems.” 1990. Web. 14 Nov 2019.

Vancouver:

Lurain S. Network security: Risk assessment of information systems. [Internet] [Thesis]. Rochester Institute of Technology; 1990. [cited 2019 Nov 14]. Available from: https://scholarworks.rit.edu/theses/349.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lurain S. Network security: Risk assessment of information systems. [Thesis]. Rochester Institute of Technology; 1990. Available from: https://scholarworks.rit.edu/theses/349

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rochester Institute of Technology

13. Sorrentino, Daniel. Network performance monitors.

Degree: Computer Science (GCCIS), 1985, Rochester Institute of Technology

  Over the last 10 years both industry and academia have conducted extensive research and development in the areas of local area network management and… (more)

Subjects/Keywords: LAN; Local area network; Network performance monitor; TAP; TOOLSNET; Traffic

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sorrentino, D. (1985). Network performance monitors. (Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/6056

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Sorrentino, Daniel. “Network performance monitors.” 1985. Thesis, Rochester Institute of Technology. Accessed November 14, 2019. https://scholarworks.rit.edu/theses/6056.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Sorrentino, Daniel. “Network performance monitors.” 1985. Web. 14 Nov 2019.

Vancouver:

Sorrentino D. Network performance monitors. [Internet] [Thesis]. Rochester Institute of Technology; 1985. [cited 2019 Nov 14]. Available from: https://scholarworks.rit.edu/theses/6056.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Sorrentino D. Network performance monitors. [Thesis]. Rochester Institute of Technology; 1985. Available from: https://scholarworks.rit.edu/theses/6056

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

.