Results 71 to 80 of about 2,910 (182)

Personal Anonycloud [PDF]

open access: yes, 2015
Personal AnonyCloud es un proyecto que soluciona varios de los principales problemas en redes hoy en día. Por una parte, actualmente las herramientas VPN solo permiten conexiones punto a punto, es decir, cliente a servidor.
Baños Rodríguez, Sergio   +2 more
core   +1 more source

Linux Networking Cookbook [PDF]

open access: yes, 2008
If you want a book that lays out the steps for specific Linux networking tasks, one that clearly explains the commands and configurations, this is the book for you.
Schroder, Carla
core  

STUDY OF COMPATIBILITY OF METHODS AND TECHNOLOGIES OF HIGH-LEVEL PROTOCOLS AND ERROR-CORRECTING CODES

open access: yesВісник Національного технічного університету "ХПÌ": Системний аналіз, управління та інформаційні технології
Since the year 2000, the fields of error-correction codes and Virtual Private Networks (VPNs) have undergone significant advancements driven by technological demands for higher reliability and security in communication systems. In error-correction codes,
Vladyslav Sharov, Olena Nikulina
doaj   +1 more source

Pengembangan Aplikasi Online Mobile Repository [PDF]

open access: yes, 2012
Dewasa ini, banyak Perusahaan yang telah menginvestasikan dana pada teknologi informasi untuk mengelola dan menyimpan data yang ada untuk mendukung proses pengambilan keputusan yang efisien dan efektif.
Ricky, M. Y. (Michael)
core  

RANCANG BANGUN JARINGAN ENTERPRISE DENGAN VIRTUAL PRIVATE NETWORK DAN CENTRAL AUTHENTICATION SYSTEM PADA PABRIK GULA PT. PERKEBUNAN NUSANTARA X (PERSERO) [PDF]

open access: yes, 2011
Dalam proses produksi gula, perangkat lunak sistem informasi cukup berpengaruh besar dalam peningkatan hasil produksi. Perangkat lunak yang digunakan sangat mempengaruhi keputusan dari setiap proses produksi dan mengontrol perhitungan serta laporan ...
Ahmad, Aziz
core  

Implementasi Virtual Private Network (Vpn) Dengan Otentikasi Radius Server Pada PT. Anugerah Tunggal Mandiri Jakarta [PDF]

open access: yes, 2015
The principle of this research is un availability of secure data exchange lines, as well as the lack of authentication for users who join the PT network. Anugerah Tunggal Mandiri.
Latifah, F. (Fitri)   +1 more
core   +1 more source

Manajemen Keamanan Jaringan Informasi Menggunakan Ids/ips Strataguard “Studi Kasus STMIK AMIKOM YOGYAKARTA” [PDF]

open access: yes, 2011
Computer networks continue to experience growth, both of scalability, the number of nodes and the technology used.This requires a good network management so thatnetwork availability is always high.
Arief, M. R. (M)   +2 more
core  

Architectures of cost-effective system for COVID-19 patient monitoring. [PDF]

open access: yesIFAC Pap OnLine, 2022
Ivanov EA   +3 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy