Results 141 to 150 of about 486,360 (195)
Some of the next articles are maybe not open access.
2004
Preface. Acknowledgements. Chapter 1 Introduction to Virtual Private Networking. 1.1 THE VPN CONCEPT. 1.2 BOOK PREVIEW. Chapter 2 Understanding Authentication and Encryption. 2.1 AUTHENTICATION. 2.2 ENCRYPTION. Chapter 3 Understanding the TCP/IP Protocol Suite. 3.1 FRAME FORMATION. 3.2 THE NETWORK LAYER. 3.3 THE TRANSPORT LAYER.
openaire +1 more source
Preface. Acknowledgements. Chapter 1 Introduction to Virtual Private Networking. 1.1 THE VPN CONCEPT. 1.2 BOOK PREVIEW. Chapter 2 Understanding Authentication and Encryption. 2.1 AUTHENTICATION. 2.2 ENCRYPTION. Chapter 3 Understanding the TCP/IP Protocol Suite. 3.1 FRAME FORMATION. 3.2 THE NETWORK LAYER. 3.3 THE TRANSPORT LAYER.
openaire +1 more source
2016
Virtual Private Network, Its ‘Virtual', Its ‘Private' and it's a ‘Network'. A virtual private network (VPN) provides a secure connection between a sender and a receiver over a public non-secure network such as the Internet. A secure connection is generally associated with private networks.
openaire +1 more source
Virtual Private Network, Its ‘Virtual', Its ‘Private' and it's a ‘Network'. A virtual private network (VPN) provides a secure connection between a sender and a receiver over a public non-secure network such as the Internet. A secure connection is generally associated with private networks.
openaire +1 more source
Mobile Virtual Private Networking
2010Mobile Virtual Private Networking (VPN) solutions based on the Internet Security Protocol (IPSec), Transport Layer Security/Secure Socket Layer (SSL/TLS), Secure Shell (SSH), 3G/GPRS cellular networks, Mobile IP, and the presently experimental Host Identity Protocol (HIP) are described, compared and evaluated.
Göran Pulkkis +3 more
openaire +1 more source
2008
In this chapter, we will consider the different types of VPN, the VPN infrastructure, and virtual networks' requirements. The VPN general architecture, current VPN advantages and disadvantages, provisioning models, and the VPN standard will also be considered.
openaire +1 more source
In this chapter, we will consider the different types of VPN, the VPN infrastructure, and virtual networks' requirements. The VPN general architecture, current VPN advantages and disadvantages, provisioning models, and the VPN standard will also be considered.
openaire +1 more source

