Gotowa bibliografia na temat „Virtual Private Network”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Spis treści
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Virtual Private Network”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Virtual Private Network"
Kim, Kyung-Muk, i Hae-Sool Yang. "VPN (Virtual Private Network) SW's examination example analysis". Journal of the Korea Academia-Industrial cooperation Society 11, nr 8 (31.08.2010): 3012–20. http://dx.doi.org/10.5762/kais.2010.11.8.3012.
Pełny tekst źródłaKnapp, Laura. "Virtual Private Network Performance". EDPACS 28, nr 7 (styczeń 2001): 1. http://dx.doi.org/10.1201/1079/43264.28.7.20010101/30378.4.
Pełny tekst źródłaWright, Marie A. "Virtual Private Network Security". Network Security 2000, nr 7 (lipiec 2000): 11–14. http://dx.doi.org/10.1016/s1353-4858(00)07018-5.
Pełny tekst źródłaScott, Charlie, Paul Wolfe i Mike Erwin. "Virtual Private Networks: Turning the Internet into Your Private Network". EDPACS 27, nr 2 (sierpień 1999): 16. http://dx.doi.org/10.1201/1079/43248.27.2.19990801/30263.5.
Pełny tekst źródłaKhizirova, M. A., Katipa Chezhimbayeva, Almira Mukhamejanova, Zhanat Manbetova i Bulbul Ongar. "USING OF VIRTUAL PRIVATE NETWORK TECHNOLOGY FOR SIGNAL TRANSMISSION IN CORPORATE NETWORKS". Series of Geology and Technical Sciences 447, nr 3 (15.06.2021): 100–103. http://dx.doi.org/10.32014/2021.2518-170x.69.
Pełny tekst źródłaTAKEDA, T., R. MATSUZAKI, I. INOUE i S. URUSHIDANI. "Network Design Scheme for Virtual Private Network Services". IEICE Transactions on Communications E89-B, nr 11 (1.11.2006): 3046–54. http://dx.doi.org/10.1093/ietcom/e89-b.11.3046.
Pełny tekst źródłaSobh, Tarek S., i Yasser Aly. "Effective and Extensive Virtual Private Network". Journal of Information Security 02, nr 01 (2011): 39–49. http://dx.doi.org/10.4236/jis.2011.21004.
Pełny tekst źródłaCrocetti, P., S. Fotedar, L. Fratta, G. Gallassi i M. Gerla. "ATM virtual private network design alternatives". Computer Communications 18, nr 1 (styczeń 1995): 24–31. http://dx.doi.org/10.1016/0140-3664(94)00748-7.
Pełny tekst źródłaSu, Y., Y. Tian, E. Wong, N. Nadarajah i C. C. K. Chan. "All-optical virtual private network in passive optical networks". Laser & Photonics Review 2, nr 6 (11.12.2008): 460–79. http://dx.doi.org/10.1002/lpor.200810021.
Pełny tekst źródła., Ekwe O. A. "VIRTUAL PRIVATE NETWORK: A VERITABLE TOOL FOR NETWORK SECURITY". International Journal of Research in Engineering and Technology 03, nr 05 (25.05.2014): 319–22. http://dx.doi.org/10.15623/ijret.2014.0305060.
Pełny tekst źródłaRozprawy doktorskie na temat "Virtual Private Network"
Celestino, Pedro. "Private virtual network". Universidade de Taubaté, 2005. http://www.bdtd.unitau.br/tedesimplificado/tde_busca/arquivo.php?codArquivo=264.
Pełny tekst źródłaCom as redes de computadores, surge também a possibilidade de administrar remotamente as organizações inteligentes, no entanto a troca de informações segura tornou-se um problema para as instituições que trafegam dados estruturados através das redes de computadores. Um dos maiores desafios é a busca de soluções economicamente viáveis e ao mesmo tempo seguras. Protocolos de segurança, algoritmos criptográficos meios de comunicação seguros, são itens essenciais para que a informação possa trafegar em ambientes livres de interferências externas. Uma das soluções é a Rede Virtual Privada. Neste trabalho, serão apresentados os principais destaques desta tecnologia, utilizando o protocolo IPSec, com o propósito de apresentar mais uma solução atrativa para as organizações, pois trata-se de uma solução economicamente viável e segura.
Samuelsson, Joakim, i Richard Sandsund. "Implementing a virtual private network". Thesis, KTH, Kommunikationssystem, CoS, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-91933.
Pełny tekst źródłaCompanies of today want to give their employees the opportunity to work from home or while they travel. A common solution to accomplish this is to implement a VPN over top of the existing network. Using VPN gives the employees access to the company’s local area network from outside, via the internet. The VPN provides a secure channel for these employees to connect to the local services attached to the company’s network that they need to reach. Which VPN technology is most suitable to deliver a secure, fast, and reliable connection to theses employees? In this thesis examines we are taking a closer look at different VPN solutions. We describe different VPN-protocols like L2TP, IPSec and PPTP. How to authenticate users in a secure and flexible way and also methods used to make the VPN-connection secure. Lastly we will show the solution we have implemented at the company Confidence, for whom we made the solution. The difficulties in using existing products with the company’s infrastructure are described. Suggestions are offered for future work to address these problems.
Davis, Carlton R. "IPSec base virtual private network". Thesis, McGill University, 2000. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=33390.
Pełny tekst źródłaHabibovic, Sanel. "VIRTUAL PRIVATE NETWORKS : An Analysis of the Performance in State-of-the-Art Virtual Private Network solutions in Unreliable Network Conditions". Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-17844.
Pełny tekst źródłaNorin, Anders, i Henrik Ohlsson. "VPN : Virtual Private Network i Windows 2000". Thesis, University West, Department of Informatics and Mathematics, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-483.
Pełny tekst źródłaIkiz, Suheyla. "Performance Parameters Of Wireless Virtual Private Network". Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/12607094/index.pdf.
Pełny tekst źródłaheyla Ms.c, Department of Information Systems Supervisor: Assoc. Prof. Dr. Nazife Baykal Co-Supervisor: Assist. Prof. Dr. Yusuf Murat Erten January 2006, 78 pages As the use of PC&rsquo
s and handheld devices increase, it expected that wireless communication would also grow. One of the major concerns in wireless communication is the security. Virtual Private Network (VPN) is the most secure solution that ensures three main aspect of security: authentication, accountability and encryption can use in wireless networks. Most VPNs have built on IP Security Protocol (IPSec) to support end-to-end secure data transmission. IPSec is a wellunderstood and widely used mechanism for wired network communication. Because, wireless networks have limited bandwidth and wireless devices have limited power and less capable CPU, the performance of the networks when VPN&rsquo
s are used is an important research area. We have investigated the use of VPNs in wireless LANs to provide end &ndash
to &ndash
end security. We have selected IPSec as the VPN protocol and investigated the effects of using IPSec on the throughput, packet loss, and delay of the wireless LANs. For this purpose, we have set up a test bed and based, our results on the actual measurements obtained from the experiments performed using the test bed. v The wireless LAN we have used is an 802.11g network and the results show that the performance of the network is adversely affected when VPN&rsquo
s are used but the degradation is not as bad as expected.
Liang, Huan. "Minimal cost design of virtual private network". Thesis, University of Ottawa (Canada), 2003. http://hdl.handle.net/10393/26513.
Pełny tekst źródłaRüegg, Maurice. "Virtual private network provisioning in the hose model /". Zürich : ETH, Eidgenössische Technische Hochschule Zürich, Institut für Technische Informatik und Kommunikationsnetze, 2003. http://e-collection.ethbib.ethz.ch/show?type=dipl&nr=119.
Pełny tekst źródłaLin, Zhangxi. "Virtual private network traffic pricing : an exploratory study /". Digital version accessible at:, 1999. http://wwwlib.umi.com/cr/utexas/main.
Pełny tekst źródłaBazama, Muneer I. "Investigation into Layer 3 Multicast Virtual Private Network Schemes". Thèse, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/22653.
Pełny tekst źródłaKsiążki na temat "Virtual Private Network"
Carmouche, James Henry. IPsec virtual private network fundamentals. Indianapolis, Ind: Cisco Press, 2007.
Znajdź pełny tekst źródłaCarmouche, James Henry. IPsec virtual private network fundamentals. Indianapolis, Ind: Cisco Press, 2007.
Znajdź pełny tekst źródłaCarmouche, James Henry. IPsec virtual private network fundamentals. Indianapolis, Ind: Cisco Press, 2007.
Znajdź pełny tekst źródłaGupta, Meeta. Building a virtual private network. Cincinnati, Ohio: Premier Press, 2003.
Znajdź pełny tekst źródłaScott, Charlie. Virtual Private Networks. Wyd. 2. Beijing [China]: O'Reilly, 1999.
Znajdź pełny tekst źródłaScott, Charlie. Virtual Private Networks. Sebastopol, CA: O'Reilly, 1998.
Znajdź pełny tekst źródłaKosiur, David R. Building and managing virtual private networks. New York: Wiley, 1998.
Znajdź pełny tekst źródłaTiller, Jim S. A technical guide to IPSec virtual private networks. Boca Raton, FL: Auerbach, 2001.
Znajdź pełny tekst źródłaInformation Systems Audit and Control Foundation. Virtual private networking: New issues for network security. Rolling Meadows, IL: Information Systems Audit and Control Foundation, 2001.
Znajdź pełny tekst źródłaCovill, Randall J. Implementing extranets: The Internet as a virtual private network. Boston: Digital Press, 1998.
Znajdź pełny tekst źródłaCzęści książek na temat "Virtual Private Network"
Bök, Patrick-Benjamin, Andreas Noack, Marcel Müller i Daniel Behnke. "Virtual Private Network (VPN)". W Computernetze und Internet of Things, 211–24. Wiesbaden: Springer Fachmedien Wiesbaden, 2020. http://dx.doi.org/10.1007/978-3-658-29409-0_11.
Pełny tekst źródłaMasuda, Mineyoshi, Yutaka Yoshimura, Toshiaki Tarui, Toni Shonai i Mamoru Sugie. "VPDC: Virtual Private Data Center". W Integrated Network Management VIII, 473–76. Boston, MA: Springer US, 2003. http://dx.doi.org/10.1007/978-0-387-35674-7_47.
Pełny tekst źródłaSinha, Sanjib. "Virtual Private Network or VPN". W Beginning Ethical Hacking with Python, 185–89. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2541-7_28.
Pełny tekst źródłaPrenn, Caroline, i Paul van Marcke. "Value-chain, virtual private network (VPN)". W Projektkompass eLogistik, 235–40. Wiesbaden: Vieweg+Teubner Verlag, 2002. http://dx.doi.org/10.1007/978-3-322-84977-9_16.
Pełny tekst źródłaCabianca, Dario. "Implementing Virtual Private Cloud Instances". W Google Cloud Platform (GCP) Professional Cloud Network Engineer Certification Companion, 87–180. Berkeley, CA: Apress, 2023. http://dx.doi.org/10.1007/978-1-4842-9354-6_3.
Pełny tekst źródłaWang, Lina, Ge Yu, Guoren Wang, Xiaochun Yang, Dan Wang, Xiaomei Dong, Daling Wang i Zhe Mei. "A Virtual Private Network for Virtual Enterprise Information Systems". W Web-Age Information Management, 165–76. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-45151-x_16.
Pełny tekst źródłaGali, Alex, i Stefan Covaci. "Active Virtual Private Network Services on Demand". W Next Generation Networks. Networks and Services for the Information Society, 160–73. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-40019-2_14.
Pełny tekst źródłaBrehon, Yannick, Daniel Kofman i Augusto Casaca. "Virtual Private Network to Spanning Tree Mapping". W NETWORKING 2007. Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet, 703–13. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-72606-7_60.
Pełny tekst źródłaEisenbrand, Friedrich, Fabrizio Grandoni, Gianpaolo Oriolo i Martin Skutella. "New Approaches for Virtual Private Network Design". W Automata, Languages and Programming, 1151–62. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11523468_93.
Pełny tekst źródłaEzra, Paul Joan, Sanjay Misra, Akshat Agrawal, Jonathan Oluranti, Rytis Maskeliunas i Robertas Damasevicius. "Secured Communication Using Virtual Private Network (VPN)". W Lecture Notes on Data Engineering and Communications Technologies, 309–19. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-3961-6_27.
Pełny tekst źródłaStreszczenia konferencji na temat "Virtual Private Network"
Benzid, Djedjiga, i Michel Kadoch. "Virtual Private Network over Wireless Mesh Networks". W 2014 2nd International Conference on Future Internet of Things and Cloud (FiCloud). IEEE, 2014. http://dx.doi.org/10.1109/ficloud.2014.60.
Pełny tekst źródłaGupta, Anupam, Jon Kleinberg, Amit Kumar, Rajeev Rastogi i Bulent Yener. "Provisioning a virtual private network". W the thirty-third annual ACM symposium. New York, New York, USA: ACM Press, 2001. http://dx.doi.org/10.1145/380752.380830.
Pełny tekst źródłaTakeda, Tomonori. "Layer 1 Virtual Private Network". W OFC/NFOEC 2007 - 2007 Conference on Optical Fiber Communication and the National Fiber Optic Engineers Conference. IEEE, 2007. http://dx.doi.org/10.1109/ofc.2007.4348578.
Pełny tekst źródłaNawej, Claude Mukatshung, i Shengzhi Du. "Virtual Private Network’s Impact on Network Performance". W 2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC). IEEE, 2018. http://dx.doi.org/10.1109/iconic.2018.8601281.
Pełny tekst źródłaSu, Yikai. "All-Optical Virtual-Private-Network in Access Networks". W LEOS 2007 - IEEE Lasers and Electro-Optics Society Annual Meeting. IEEE, 2007. http://dx.doi.org/10.1109/leos.2007.4382651.
Pełny tekst źródłaVarvello, Matteo, Inigo Querejeta Azurmendi, Antonio Nappa, Panagiotis Papadopoulos, Goncalo Pestana i Benjamin Livshits. "VPN-Zero: A Privacy-Preserving Decentralized Virtual Private Network". W 2021 IFIP Networking Conference (IFIP Networking). IEEE, 2021. http://dx.doi.org/10.23919/ifipnetworking52078.2021.9472843.
Pełny tekst źródłaJaha, Ahmed A., Fathi Ben Shatwan i Majdi Ashibani. "Proper Virtual Private Network (VPN) Solution". W 2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies. IEEE, 2008. http://dx.doi.org/10.1109/ngmast.2008.18.
Pełny tekst źródłaHernandez, Harold, i Ping-Tsai Chung. "Case study of virtual private network". W ITCom 2001: International Symposium on the Convergence of IT and Communications, redaktorzy Anura P. Jayasumana i V. Chandrasekar. SPIE, 2001. http://dx.doi.org/10.1117/12.434430.
Pełny tekst źródłaKang, Sunyoung, i Seungae Kang. "Virtual Private Network for Wellness Sports Information". W 2013 International Conference on IT Convergence and Security (ICITCS). IEEE, 2013. http://dx.doi.org/10.1109/icitcs.2013.6717897.
Pełny tekst źródłaKim, Jaehoon, Myeong-wuk Jang, Byoung-Joon Lee i Kiho Kim. "Content Centric Network-based Virtual Private Community". W 2011 IEEE International Conference on Consumer Electronics (ICCE). IEEE, 2011. http://dx.doi.org/10.1109/icce.2011.5722896.
Pełny tekst źródłaRaporty organizacyjne na temat "Virtual Private Network"
Andersson, L., i T. Madsen. Provider Provisioned Virtual Private Network (VPN) Terminology. RFC Editor, marzec 2005. http://dx.doi.org/10.17487/rfc4026.
Pełny tekst źródłaBocci, M., S. Boutros i A. Sajassi. Applicability of Ethernet Virtual Private Network (EVPN) to Network Virtualization over Layer 3 (NVO3) Networks. Redaktor J. Rabadan. RFC Editor, wrzesień 2023. http://dx.doi.org/10.17487/rfc9469.
Pełny tekst źródłaRosen, E., Y. Cai i A. Boers. Multicast Virtual Private Network (MVPN): Using Bidirectional P-Tunnels. RFC Editor, lipiec 2015. http://dx.doi.org/10.17487/rfc7582.
Pełny tekst źródłaSchliesser, B., i T. Nadeau. Definition of Textual Conventions for Virtual Private Network (VPN) Management. RFC Editor, listopad 2005. http://dx.doi.org/10.17487/rfc4265.
Pełny tekst źródłaGont, F. Layer 3 Virtual Private Network (VPN) Tunnel Traffic Leakages in Dual-Stack Hosts/Networks. RFC Editor, sierpień 2014. http://dx.doi.org/10.17487/rfc7359.
Pełny tekst źródłaAdrangi, F., i H. Levkowetz, red. Problem Statement: Mobile IPv4 Traversal of Virtual Private Network (VPN) Gateways. RFC Editor, sierpień 2005. http://dx.doi.org/10.17487/rfc4093.
Pełny tekst źródłaNadeau, T., i H. van, red. MPLS/BGP Layer 3 Virtual Private Network (VPN) Management Information Base. RFC Editor, luty 2006. http://dx.doi.org/10.17487/rfc4382.
Pełny tekst źródłaDe, J., D. Ooms, M. Carugi i F. Le. BGP-MPLS IP Virtual Private Network (VPN) Extension for IPv6 VPN. RFC Editor, wrzesień 2006. http://dx.doi.org/10.17487/rfc4659.
Pełny tekst źródłaBaker, F., i P. Bose. Quality of Service (QoS) Signaling in a Nested Virtual Private Network. RFC Editor, sierpień 2007. http://dx.doi.org/10.17487/rfc4923.
Pełny tekst źródłaTakeda, T., red. Applicability Statement for Layer 1 Virtual Private Network (L1VPN) Basic Mode. RFC Editor, lipiec 2008. http://dx.doi.org/10.17487/rfc5253.
Pełny tekst źródła