Results 71 to 80 of about 2,951 (197)

Linux Networking Cookbook [PDF]

open access: yes, 2008
If you want a book that lays out the steps for specific Linux networking tasks, one that clearly explains the commands and configurations, this is the book for you.
Schroder, Carla
core  

Personal Anonycloud [PDF]

open access: yes, 2015
Personal AnonyCloud es un proyecto que soluciona varios de los principales problemas en redes hoy en día. Por una parte, actualmente las herramientas VPN solo permiten conexiones punto a punto, es decir, cliente a servidor.
Baños Rodríguez, Sergio   +2 more
core   +1 more source

RANCANG BANGUN JARINGAN ENTERPRISE DENGAN VIRTUAL PRIVATE NETWORK DAN CENTRAL AUTHENTICATION SYSTEM PADA PABRIK GULA PT. PERKEBUNAN NUSANTARA X (PERSERO) [PDF]

open access: yes, 2011
Dalam proses produksi gula, perangkat lunak sistem informasi cukup berpengaruh besar dalam peningkatan hasil produksi. Perangkat lunak yang digunakan sangat mempengaruhi keputusan dari setiap proses produksi dan mengontrol perhitungan serta laporan ...
Ahmad, Aziz
core  

Implementasi Virtual Private Network (Vpn) Dengan Otentikasi Radius Server Pada PT. Anugerah Tunggal Mandiri Jakarta [PDF]

open access: yes, 2015
The principle of this research is un availability of secure data exchange lines, as well as the lack of authentication for users who join the PT network. Anugerah Tunggal Mandiri.
Latifah, F. (Fitri)   +1 more
core   +1 more source

Perbandingan Virtual Private Network Protokol Menggunakan Point To Point Tunnel Protocol dan OpenVPN [PDF]

open access: yes, 2015
Dengan semakin ketergantungannya user kepada teknologi internet tentu harus diimbangi dengan ketersediaan internet yang memadai dan handal, berbagai masalah justru muncul ketika internet tidak menjamin keamanan yang maksimal tanpa adanya metode-metode ...
Ridwan, M. (Muhammad)   +2 more
core  

Servidor dedicado de seguridad en contenedores de Linux Docker [PDF]

open access: yes, 2017
Actualmente, estamos viviendo en un momento en el que la importancia de la seguridad informática está creciendo exponencialmente, en parte, debido a la gran subida del porcentaje de cibercrimen en los últimos meses.
Arjona Rivera, Daniel   +1 more
core  

STUDY OF COMPATIBILITY OF METHODS AND TECHNOLOGIES OF HIGH-LEVEL PROTOCOLS AND ERROR-CORRECTING CODES

open access: yesВісник Національного технічного університету "ХПÌ": Системний аналіз, управління та інформаційні технології
Since the year 2000, the fields of error-correction codes and Virtual Private Networks (VPNs) have undergone significant advancements driven by technological demands for higher reliability and security in communication systems. In error-correction codes,
Vladyslav Sharov, Olena Nikulina
doaj   +1 more source

Dynamic virtual private network provisioning from multiple cloud infrastructure service providers [PDF]

open access: yes, 2011
The Cloud infrastructure service providers currently provision basic virtualized computing resources as on demand and dynamic services but there is no common framework in existence that allows the seamless provisioning of even these basic services across
Dimitrakos, T.   +4 more
core  

Home - About - Disclaimer - Privacy