Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Virtual private network servers“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Virtual private network servers" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Virtual private network servers"
Mohammed, Subhi Aswad. „Performance Analysis of Volume Loads of (Services and Transmission) Traffic in VPN Networks: A Comparative Study“. Al-Nahrain Journal for Engineering Sciences 22, Nr. 4 (20.12.2019): 283–93. http://dx.doi.org/10.29194/njes.22040283.
Der volle Inhalt der QuelleRoşu, Marius, und George Drăgoi. „VPN solutions and network monitoring to support virtual teams work in virtual enterprises“. Computer Science and Information Systems 8, Nr. 1 (2011): 1–26. http://dx.doi.org/10.2298/csis100127033r.
Der volle Inhalt der QuelleHariyadi, I. Putu, und Akbar Juliansyah. „Analisa Penerapan Private Cloud Computing Berbasis Proxmox Virtual Environment Sebagai Media Pembelajaran Praktikum Manajemen Jaringan“. MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer 18, Nr. 1 (29.11.2018): 1–12. http://dx.doi.org/10.30812/matrik.v18i1.329.
Der volle Inhalt der QuelleKhizirova, M. A., Katipa Chezhimbayeva, Almira Mukhamejanova, Zhanat Manbetova und Bulbul Ongar. „USING OF VIRTUAL PRIVATE NETWORK TECHNOLOGY FOR SIGNAL TRANSMISSION IN CORPORATE NETWORKS“. Series of Geology and Technical Sciences 447, Nr. 3 (15.06.2021): 100–103. http://dx.doi.org/10.32014/2021.2518-170x.69.
Der volle Inhalt der QuelleSalim, Mikail Mohammed, Inyeung Kim, Umarov Doniyor, Changhoon Lee und Jong Hyuk Park. „Homomorphic Encryption Based Privacy-Preservation for IoMT“. Applied Sciences 11, Nr. 18 (20.09.2021): 8757. http://dx.doi.org/10.3390/app11188757.
Der volle Inhalt der QuelleQu, Liang Dong, Xin Yu Cui und Xiao Nan Liu. „IPv6 in IPv4 Virtual Private Network Based on Virtual Devices in Vehicle Information System“. Applied Mechanics and Materials 321-324 (Juni 2013): 2910–13. http://dx.doi.org/10.4028/www.scientific.net/amm.321-324.2910.
Der volle Inhalt der QuelleSano, Albert Verasius Dian. „Simulasi Saham Berbasis Web dengan Teknologi Virtual Private Network di Portal Www.Kontan.Co.Id“. ComTech: Computer, Mathematics and Engineering Applications 2, Nr. 2 (01.12.2011): 946. http://dx.doi.org/10.21512/comtech.v2i2.2845.
Der volle Inhalt der QuelleQu, Liang Dong, Xin Yu Cui und Xiao Nan Liu. „A Route Handoff Method Based on Virtual Private Network in Vehicle Information Network“. Applied Mechanics and Materials 475-476 (Dezember 2013): 699–702. http://dx.doi.org/10.4028/www.scientific.net/amm.475-476.699.
Der volle Inhalt der QuelleLizarti, Nora, und Wirta Agustin. „Aplikasi Network Traffic Monitoring Menggunakan Simple Network Management Protocol (SNMP) pada Jaringan Virtual Private Network (VPN)“. SATIN - Sains dan Teknologi Informasi 1, Nr. 1 (23.06.2015): 27. http://dx.doi.org/10.33372/stn.v1i1.17.
Der volle Inhalt der QuelleUmaroh, Lia, und Machsun Rifauddin. „IMPLEMENTASI VIRTUAL PRIVATE NETWORK (VPN) DI PERPUSTAKAAN UNIVERSITAS ISLAM MALANG“. BACA: JURNAL DOKUMENTASI DAN INFORMASI 41, Nr. 2 (11.12.2020): 193. http://dx.doi.org/10.14203/j.baca.v41i2.531.
Der volle Inhalt der QuelleDissertationen zum Thema "Virtual private network servers"
Bergvall, Ricardo. „Secure remote access to a work environment“. Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-45124.
Der volle Inhalt der QuelleCelestino, Pedro. „Private virtual network“. Universidade de Taubaté, 2005. http://www.bdtd.unitau.br/tedesimplificado/tde_busca/arquivo.php?codArquivo=264.
Der volle Inhalt der QuelleCom as redes de computadores, surge também a possibilidade de administrar remotamente as organizações inteligentes, no entanto a troca de informações segura tornou-se um problema para as instituições que trafegam dados estruturados através das redes de computadores. Um dos maiores desafios é a busca de soluções economicamente viáveis e ao mesmo tempo seguras. Protocolos de segurança, algoritmos criptográficos meios de comunicação seguros, são itens essenciais para que a informação possa trafegar em ambientes livres de interferências externas. Uma das soluções é a Rede Virtual Privada. Neste trabalho, serão apresentados os principais destaques desta tecnologia, utilizando o protocolo IPSec, com o propósito de apresentar mais uma solução atrativa para as organizações, pois trata-se de uma solução economicamente viável e segura.
Samuelsson, Joakim, und Richard Sandsund. „Implementing a virtual private network“. Thesis, KTH, Kommunikationssystem, CoS, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-91933.
Der volle Inhalt der QuelleCompanies of today want to give their employees the opportunity to work from home or while they travel. A common solution to accomplish this is to implement a VPN over top of the existing network. Using VPN gives the employees access to the company’s local area network from outside, via the internet. The VPN provides a secure channel for these employees to connect to the local services attached to the company’s network that they need to reach. Which VPN technology is most suitable to deliver a secure, fast, and reliable connection to theses employees? In this thesis examines we are taking a closer look at different VPN solutions. We describe different VPN-protocols like L2TP, IPSec and PPTP. How to authenticate users in a secure and flexible way and also methods used to make the VPN-connection secure. Lastly we will show the solution we have implemented at the company Confidence, for whom we made the solution. The difficulties in using existing products with the company’s infrastructure are described. Suggestions are offered for future work to address these problems.
Davis, Carlton R. „IPSec base virtual private network“. Thesis, McGill University, 2000. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=33390.
Der volle Inhalt der QuelleIkiz, Suheyla. „Performance Parameters Of Wireless Virtual Private Network“. Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/12607094/index.pdf.
Der volle Inhalt der Quelleheyla Ms.c, Department of Information Systems Supervisor: Assoc. Prof. Dr. Nazife Baykal Co-Supervisor: Assist. Prof. Dr. Yusuf Murat Erten January 2006, 78 pages As the use of PC&rsquo
s and handheld devices increase, it expected that wireless communication would also grow. One of the major concerns in wireless communication is the security. Virtual Private Network (VPN) is the most secure solution that ensures three main aspect of security: authentication, accountability and encryption can use in wireless networks. Most VPNs have built on IP Security Protocol (IPSec) to support end-to-end secure data transmission. IPSec is a wellunderstood and widely used mechanism for wired network communication. Because, wireless networks have limited bandwidth and wireless devices have limited power and less capable CPU, the performance of the networks when VPN&rsquo
s are used is an important research area. We have investigated the use of VPNs in wireless LANs to provide end &ndash
to &ndash
end security. We have selected IPSec as the VPN protocol and investigated the effects of using IPSec on the throughput, packet loss, and delay of the wireless LANs. For this purpose, we have set up a test bed and based, our results on the actual measurements obtained from the experiments performed using the test bed. v The wireless LAN we have used is an 802.11g network and the results show that the performance of the network is adversely affected when VPN&rsquo
s are used but the degradation is not as bad as expected.
Norin, Anders, und Henrik Ohlsson. „VPN : Virtual Private Network i Windows 2000“. Thesis, University West, Department of Informatics and Mathematics, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-483.
Der volle Inhalt der QuelleLiang, Huan. „Minimal cost design of virtual private network“. Thesis, University of Ottawa (Canada), 2003. http://hdl.handle.net/10393/26513.
Der volle Inhalt der QuelleRüegg, Maurice. „Virtual private network provisioning in the hose model /“. Zürich : ETH, Eidgenössische Technische Hochschule Zürich, Institut für Technische Informatik und Kommunikationsnetze, 2003. http://e-collection.ethbib.ethz.ch/show?type=dipl&nr=119.
Der volle Inhalt der QuelleLin, Zhangxi. „Virtual private network traffic pricing : an exploratory study /“. Digital version accessible at:, 1999. http://wwwlib.umi.com/cr/utexas/main.
Der volle Inhalt der QuelleHabibovic, Sanel. „VIRTUAL PRIVATE NETWORKS : An Analysis of the Performance in State-of-the-Art Virtual Private Network solutions in Unreliable Network Conditions“. Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-17844.
Der volle Inhalt der QuelleBücher zum Thema "Virtual private network servers"
Carmouche, James Henry. IPsec virtual private network fundamentals. Indianapolis, Ind: Cisco Press, 2007.
Den vollen Inhalt der Quelle findenIPsec virtual private network fundamentals. Indianapolis, Ind: Cisco Press, 2007.
Den vollen Inhalt der Quelle findenCarmouche, James Henry. IPsec virtual private network fundamentals. Indianapolis, Ind: Cisco Press, 2007.
Den vollen Inhalt der Quelle finden(Corporation), NIIT, Hrsg. Building a virtual private network. Cincinnati, Ohio: Premier Press, 2003.
Den vollen Inhalt der Quelle findenVirtual private networking: New issues for network security. Rolling Meadows, IL: Information Systems Audit and Control Foundation, 2001.
Den vollen Inhalt der Quelle findenCovill, Randall J. Implementing extranets: The Internet as a virtual private network. Boston: Digital Press, 1998.
Den vollen Inhalt der Quelle findenPaul, Wolfe, und Erwin Mike 1969-, Hrsg. Virtual Private Networks. 2. Aufl. Beijing [China]: O'Reilly, 1999.
Den vollen Inhalt der Quelle finden1969-, Erwin Mike, und Wolfe Paul, Hrsg. Virtual Private Networks. Sebastopol, CA: O'Reilly, 1998.
Den vollen Inhalt der Quelle findenNg, Walfrey. MIBlet approach to virtual private network management: Design, applications and implementation. Ottawa: National Library of Canada, 1999.
Den vollen Inhalt der Quelle findenA technical guide to IPSec virtual private networks. Boca Raton, FL: Auerbach, 2001.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Virtual private network servers"
Bök, Patrick-Benjamin, Andreas Noack, Marcel Müller und Daniel Behnke. „Virtual Private Network (VPN)“. In Computernetze und Internet of Things, 211–24. Wiesbaden: Springer Fachmedien Wiesbaden, 2020. http://dx.doi.org/10.1007/978-3-658-29409-0_11.
Der volle Inhalt der QuelleMasuda, Mineyoshi, Yutaka Yoshimura, Toshiaki Tarui, Toni Shonai und Mamoru Sugie. „VPDC: Virtual Private Data Center“. In Integrated Network Management VIII, 473–76. Boston, MA: Springer US, 2003. http://dx.doi.org/10.1007/978-0-387-35674-7_47.
Der volle Inhalt der QuelleSinha, Sanjib. „Virtual Private Network or VPN“. In Beginning Ethical Hacking with Python, 185–89. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2541-7_28.
Der volle Inhalt der QuellePrenn, Caroline, und Paul van Marcke. „Value-chain, virtual private network (VPN)“. In Projektkompass eLogistik, 235–40. Wiesbaden: Vieweg+Teubner Verlag, 2002. http://dx.doi.org/10.1007/978-3-322-84977-9_16.
Der volle Inhalt der QuelleWang, Lina, Ge Yu, Guoren Wang, Xiaochun Yang, Dan Wang, Xiaomei Dong, Daling Wang und Zhe Mei. „A Virtual Private Network for Virtual Enterprise Information Systems“. In Web-Age Information Management, 165–76. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-45151-x_16.
Der volle Inhalt der QuelleAugot, Daniel, Françoise Levy-dit-Vehel und Abdullatif Shikfa. „A Storage-Efficient and Robust Private Information Retrieval Scheme Allowing Few Servers“. In Cryptology and Network Security, 222–39. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-12280-9_15.
Der volle Inhalt der QuelleEisenbrand, Friedrich, Fabrizio Grandoni, Gianpaolo Oriolo und Martin Skutella. „New Approaches for Virtual Private Network Design“. In Automata, Languages and Programming, 1151–62. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11523468_93.
Der volle Inhalt der QuelleBrehon, Yannick, Daniel Kofman und Augusto Casaca. „Virtual Private Network to Spanning Tree Mapping“. In NETWORKING 2007. Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet, 703–13. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-72606-7_60.
Der volle Inhalt der QuelleGali, Alex, und Stefan Covaci. „Active Virtual Private Network Services on Demand“. In Next Generation Networks. Networks and Services for the Information Society, 160–73. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-40019-2_14.
Der volle Inhalt der QuelleLakshmi, M. L. S. N. S., und Naga Venkata Sai Sudheer Bandaru. „Configuring MPLS Cloud Providers with Virtual Private Network“. In Lecture Notes in Electrical Engineering, 817–26. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-2256-7_76.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Virtual private network servers"
Pavlicek, Antonin, und Frantisek Sudzina. „Use of virtual private networks (VPN) and proxy servers: Impact of personality and demographics“. In 2018 Thirteenth International Conference on Digital Information Management (ICDIM). IEEE, 2018. http://dx.doi.org/10.1109/icdim.2018.8846991.
Der volle Inhalt der QuelleChen, Qian, Xuefeng Sun und Zhihong Shangguan. „A Utility Model of Environmental Radiation Online Monitoring System of Nuclear Power Plants“. In 2013 21st International Conference on Nuclear Engineering. American Society of Mechanical Engineers, 2013. http://dx.doi.org/10.1115/icone21-16842.
Der volle Inhalt der QuelleTakeda, Tomonori. „Layer 1 Virtual Private Network“. In OFC/NFOEC 2007 - 2007 Conference on Optical Fiber Communication and the National Fiber Optic Engineers Conference. IEEE, 2007. http://dx.doi.org/10.1109/ofc.2007.4348578.
Der volle Inhalt der QuelleGupta, Anupam, Jon Kleinberg, Amit Kumar, Rajeev Rastogi und Bulent Yener. „Provisioning a virtual private network“. In the thirty-third annual ACM symposium. New York, New York, USA: ACM Press, 2001. http://dx.doi.org/10.1145/380752.380830.
Der volle Inhalt der QuelleKim, Kangseok, Marlon E. Pierce und Rajarshi Guha. „SQMD: Architecture for Scalable, Distributed Database System Built on Virtual Private Servers“. In 2008 IEEE Fourth International Conference on eScience (eScience). IEEE, 2008. http://dx.doi.org/10.1109/escience.2008.35.
Der volle Inhalt der QuelleJaha, Ahmed A., Fathi Ben Shatwan und Majdi Ashibani. „Proper Virtual Private Network (VPN) Solution“. In 2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies. IEEE, 2008. http://dx.doi.org/10.1109/ngmast.2008.18.
Der volle Inhalt der QuelleHernandez, Harold, und Ping-Tsai Chung. „Case study of virtual private network“. In ITCom 2001: International Symposium on the Convergence of IT and Communications, herausgegeben von Anura P. Jayasumana und V. Chandrasekar. SPIE, 2001. http://dx.doi.org/10.1117/12.434430.
Der volle Inhalt der QuelleBenzid, Djedjiga, und Michel Kadoch. „Virtual Private Network over Wireless Mesh Networks“. In 2014 2nd International Conference on Future Internet of Things and Cloud (FiCloud). IEEE, 2014. http://dx.doi.org/10.1109/ficloud.2014.60.
Der volle Inhalt der QuelleKang, Sunyoung, und Seungae Kang. „Virtual Private Network for Wellness Sports Information“. In 2013 International Conference on IT Convergence and Security (ICITCS). IEEE, 2013. http://dx.doi.org/10.1109/icitcs.2013.6717897.
Der volle Inhalt der QuelleKim, Jaehoon, Myeong-wuk Jang, Byoung-Joon Lee und Kiho Kim. „Content Centric Network-based Virtual Private Community“. In 2011 IEEE International Conference on Consumer Electronics (ICCE). IEEE, 2011. http://dx.doi.org/10.1109/icce.2011.5722896.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Virtual private network servers"
Andersson, L., und T. Madsen. Provider Provisioned Virtual Private Network (VPN) Terminology. RFC Editor, März 2005. http://dx.doi.org/10.17487/rfc4026.
Der volle Inhalt der QuelleRosen, E., Y. Cai und A. Boers. Multicast Virtual Private Network (MVPN): Using Bidirectional P-Tunnels. RFC Editor, Juli 2015. http://dx.doi.org/10.17487/rfc7582.
Der volle Inhalt der QuelleSchliesser, B., und T. Nadeau. Definition of Textual Conventions for Virtual Private Network (VPN) Management. RFC Editor, November 2005. http://dx.doi.org/10.17487/rfc4265.
Der volle Inhalt der QuelleBaker, F., und P. Bose. Quality of Service (QoS) Signaling in a Nested Virtual Private Network. RFC Editor, August 2007. http://dx.doi.org/10.17487/rfc4923.
Der volle Inhalt der QuelleTakeda, T., Hrsg. Applicability Statement for Layer 1 Virtual Private Network (L1VPN) Basic Mode. RFC Editor, Juli 2008. http://dx.doi.org/10.17487/rfc5253.
Der volle Inhalt der QuelleNadeau, T., und H. van, Hrsg. MPLS/BGP Layer 3 Virtual Private Network (VPN) Management Information Base. RFC Editor, Februar 2006. http://dx.doi.org/10.17487/rfc4382.
Der volle Inhalt der QuelleDe, J., D. Ooms, M. Carugi und F. Le. BGP-MPLS IP Virtual Private Network (VPN) Extension for IPv6 VPN. RFC Editor, September 2006. http://dx.doi.org/10.17487/rfc4659.
Der volle Inhalt der QuelleAdrangi, F., und H. Levkowetz, Hrsg. Problem Statement: Mobile IPv4 Traversal of Virtual Private Network (VPN) Gateways. RFC Editor, August 2005. http://dx.doi.org/10.17487/rfc4093.
Der volle Inhalt der QuelleSathappan, S., K. Nagaraj und W. Lin. Propagation of ARP/ND Flags in an Ethernet Virtual Private Network (EVPN). Herausgegeben von J. Rabadan. RFC Editor, Juni 2021. http://dx.doi.org/10.17487/rfc9047.
Der volle Inhalt der QuelleLuo, W. Layer 2 Virtual Private Network (L2VPN) Extensions for Layer 2 Tunneling Protocol (L2TP). RFC Editor, September 2006. http://dx.doi.org/10.17487/rfc4667.
Der volle Inhalt der Quelle