Results 61 to 70 of about 4,234 (179)
Fronteras de seguridad en redes privadas virtuales (VPN) [PDF]
El presente trabajo de grado consiste en la elaboración de un documento basado en la investigación sobre la temática de redes privadas virtuales, terminología usada, nociones de enlaces de red, tipos de VPN y arquitecturas de VPNs, hasta el análisis de ...
Romero López, Camilo Ernesto +1 more
core
The neural correlates of verbal and nonverbal semantic processing deficits in neurodegenerative disease [PDF]
Objective—To investigate the neural correlates of verbal and non-verbal semantic processing in neurodegenerative disease. Background—Semantic memory is often impaired in neurodegenerative disease. Neuropsychological and functional neuroimaging studies
Brambati, Simona Maria +3 more
core +1 more source
Recontrucció del pont de Colom [PDF]
L’objectiu final del projecte es el de substituir l’actual Pont per un altre de major capacitat. El nou pont, tindrà una longitud real de 26 metres (llum de càlcul 25,3 metres) i una amplada de 12 metres.
Planella Congost, Cristina
core
BackgroundPoor sleep is closely linked to mental health challenges and workplace burnout. Mental health and workplace stressors can impair sleep, while good sleep quality supports cognitive and emotional resources to cope with daily challenges.
Kristen M Van Swearingen +6 more
doaj +1 more source
Abstract Internet has become an essential requirement for communication. By using the internet, it is possible for someone to get information anytime and anywhere. The internet is also used in local networks. The local network connects personal devices and workstations in an organization for the use of shared resources. The local network cannot be
Vicky Phang, Endah Setyaningsih
openaire +1 more source
Analysis of data transfer security issues at particular OSI model layers [PDF]
Táto práca sa zaoberá analýzou protokolov zaisťujúcich zabezpečený prenos dát. V prvej časti je stručne popísaný referenčný model ISO/OSI. Druhá časť je zameraná na samotné zabezpečené protokoly na jednotlivých vrstvách ISO/OSI modelu, z ktorých je v ...
Kňazovický, Pavel
core
Distributed Support for Intelligent Environments [PDF]
This thesis describes research on methods for Ubiquitous/Pervasive Computing to better suit users in an Intelligent Environment. The approach is to create and equip a computing environment, such as our Active Office, with technologies that can identify ...
Mantoro, Teddy
core +1 more source
AbstractTunnel PPTP, L2TP, SSTP, and IPsec are VPN types that have been widely supported by network protocols to be applicable to many computer network devices. These four methods are applied alternately on Mikrotik. In each applied method, will be analyzed using Wireshark application, with Quality of Service (QoS) parameters consisting of Packet Loss,
Zamalia, Wa Ode +2 more
openaire +2 more sources
Highly loaded multi-stage fan drive turbine: Performance of final three configurations [PDF]
Results for a three-stage highly loaded fan drive turbine follow-on test program are presented. The effects of combinations of tandem and leaned bladerows on three-stage turbine performance were tested.
Cherry, D. G., Thomas, M. W.
core +1 more source
Linux Networking Cookbook [PDF]
If you want a book that lays out the steps for specific Linux networking tasks, one that clearly explains the commands and configurations, this is the book for you.
Schroder, Carla
core

