Auswahl der wissenschaftlichen Literatur zum Thema „Virtual Private Network“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Virtual Private Network" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Zeitschriftenartikel zum Thema "Virtual Private Network"

1

Kim, Kyung-Muk, and Hae-Sool Yang. "VPN (Virtual Private Network) SW's examination example analysis." Journal of the Korea Academia-Industrial cooperation Society 11, no. 8 (August 31, 2010): 3012–20. http://dx.doi.org/10.5762/kais.2010.11.8.3012.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Knapp, Laura. "Virtual Private Network Performance." EDPACS 28, no. 7 (January 2001): 1. http://dx.doi.org/10.1201/1079/43264.28.7.20010101/30378.4.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Wright, Marie A. "Virtual Private Network Security." Network Security 2000, no. 7 (July 2000): 11–14. http://dx.doi.org/10.1016/s1353-4858(00)07018-5.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Kennedy, Okokpujie, Shobayo Olamilekan, Noma-Osaghae Etinosa, Imhade Okokpujie, and Okoyeigbo Obinna. "Performance of MPLS-based Virtual Private Networks and Classic Virtual Private Networks Using Advanced Metrics." TELKOMNIKA Telecommunication, Computing, Electronics and Control 16, no. 5 (October 1, 2018): 2073–81. https://doi.org/10.12928/TELKOMNIKA.v16i5.7326.

Der volle Inhalt der Quelle
Annotation:
Multiprotocol Label Switching (MPLS) is effective in managing and utilizing available network bandwidth. It has advanced security features and a lower time delay. The existing literature has covered the performance of MPLS-based networks in relation to conventional Internet Protocol (IP) networks. But, too few literatures exist on the performance of MPLS-based Virtual Private Networks (VPN) in relation to traditional VPN networks. In this paper, a comparison is made between the effectiveness of the MPLSVPN network and a classic VPN network using simulation studies done on OPNET® . The perf
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Scott, Charlie, Paul Wolfe, and Mike Erwin. "Virtual Private Networks: Turning the Internet into Your Private Network." EDPACS 27, no. 2 (August 1999): 16. http://dx.doi.org/10.1201/1079/43248.27.2.19990801/30263.5.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Anggie Maulia, Aldi Fadilla Ramadhan, Andi Purwanto, Apipah Apipah, and Didik Aribowo. "Simulasi Virtual Private Network Dengan Topologi Star." Jurnal Penelitian Teknologi Informasi dan Sains 2, no. 2 (May 16, 2024): 54–66. http://dx.doi.org/10.54066/jptis.v2i2.1865.

Der volle Inhalt der Quelle
Annotation:
Virtual Private Network (VPN) is a form of private network through a public network by focusing on the security of the encrypted data in it. This research uses Cisco Packet Tracere software as a computer network technology simulation tool. Cisco Packet Tracker is a device in network technology simulation that functions for creation and development in networks. The purpose of this research is to create a VPN simulation using a star topology with Cisco Packet Tracer software. Star topology is a star-shaped topology, where each node is to the centre. The method used is a qualitative method with d
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Khizirova, M. A., Katipa Chezhimbayeva, Almira Mukhamejanova, Zhanat Manbetova, and Bulbul Ongar. "USING OF VIRTUAL PRIVATE NETWORK TECHNOLOGY FOR SIGNAL TRANSMISSION IN CORPORATE NETWORKS." Series of Geology and Technical Sciences 447, no. 3 (June 15, 2021): 100–103. http://dx.doi.org/10.32014/2021.2518-170x.69.

Der volle Inhalt der Quelle
Annotation:
This paper discusses some modes of signal transmission for corporate systems using the technology of virtual private networks VPN. A very important property of tunnels is the ability to differentiate different types of traffic and assign them the necessary service priorities. In this work, research has been carried out and comparative characteristics of signal transmission modes using virtual networks have been obtained to identify the effectiveness of the network in various modes of organizing a virtual network, and to optimize a virtual network in order to identify an effective method for or
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

TAKEDA, T., R. MATSUZAKI, I. INOUE, and S. URUSHIDANI. "Network Design Scheme for Virtual Private Network Services." IEICE Transactions on Communications E89-B, no. 11 (November 1, 2006): 3046–54. http://dx.doi.org/10.1093/ietcom/e89-b.11.3046.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Sobh, Tarek S., and Yasser Aly. "Effective and Extensive Virtual Private Network." Journal of Information Security 02, no. 01 (2011): 39–49. http://dx.doi.org/10.4236/jis.2011.21004.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Crocetti, P., S. Fotedar, L. Fratta, G. Gallassi, and M. Gerla. "ATM virtual private network design alternatives." Computer Communications 18, no. 1 (January 1995): 24–31. http://dx.doi.org/10.1016/0140-3664(94)00748-7.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Mehr Quellen

Dissertationen zum Thema "Virtual Private Network"

1

Celestino, Pedro. "Private virtual network." Universidade de Taubaté, 2005. http://www.bdtd.unitau.br/tedesimplificado/tde_busca/arquivo.php?codArquivo=264.

Der volle Inhalt der Quelle
Annotation:
Along with the computers networks emerges the possibility of managing remotely the intelligent organizations although the safe change of information has become a problem to the institutions which transport structured data through nets of computers. One of the largest challenges is the search for safe and economically viable solutions. Protocols of safety, cryptographic algorithms, safe means of communication are essential items so that the information can travel in environmentals free of external interferences. One of the alternatives is the Virtual Private Networks. In this work, the main pro
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Samuelsson, Joakim, and Richard Sandsund. "Implementing a virtual private network." Thesis, KTH, Kommunikationssystem, CoS, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-91933.

Der volle Inhalt der Quelle
Annotation:
Dagens företag vill ge anställda möjlighet att jobba hemifrån eller på resande fot. En vanlig lösning för att möjliggöra detta är virtual private network (VPN). VPN ger en användare tillgång till interna resurser på företaget från ett externt nät, exempelvis via Internet. Detta gör att användare kan komma åt de interna resurserna på ett säkert sätt. Vilken VPN-teknik är då att föredra för att få en så snabb, säker och pålitlig anslutning som möjligt? Detta examensarbete tar upp olika VPN-tekniker. Vi beskriver vanliga VPN-protokoll som L2TP, IPSec och PPTP. Hur användare autentiseras på ett sä
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Davis, Carlton R. "IPSec base virtual private network." Thesis, McGill University, 2000. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=33390.

Der volle Inhalt der Quelle
Annotation:
The Internet evolved from an experiential packet-switching network called the ARPANET. This network has grown exponentially since its conversion from an experimental to an operational network in 1975. However, the need for confidential and secure data channel has dissuaded many enterprises from using this ubiquitous public infrastructure. The IPSec protocol suite developed by the Internet Engineering Task Force (IETF) makes it possible to implement secure communication channels or virtual private network (VPN) over the Internet. Corporations can benefit from substantial financial savings by ut
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Habibovic, Sanel. "VIRTUAL PRIVATE NETWORKS : An Analysis of the Performance in State-of-the-Art Virtual Private Network solutions in Unreliable Network Conditions." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-17844.

Der volle Inhalt der Quelle
Annotation:
This study aimed to identify the differences between state-of-the-art VPN solutions on different operating systems. It was done because a novel VPN protocol is in the early stages of release and a comparison of it, to other current VPN solutions is interesting. It is interesting because current VPN solutions are well established and have existed for a while and the new protocol stirs the pot in the VPN field. Therefore a contemporary comparison between them could aid system administrators when choosing which VPN to implement. To choose the right VPN solution for the occasion could increase per
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Norin, Anders, and Henrik Ohlsson. "VPN : Virtual Private Network i Windows 2000." Thesis, University West, Department of Informatics and Mathematics, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-483.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Ikiz, Suheyla. "Performance Parameters Of Wireless Virtual Private Network." Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/12607094/index.pdf.

Der volle Inhalt der Quelle
Annotation:
ABSTRACT PERFORMANCE PARAMETERS OF WIRELESS VIRTUAL PRIVATE NETWORK KZ, S&uuml<br>heyla Ms.c, Department of Information Systems Supervisor: Assoc. Prof. Dr. Nazife Baykal Co-Supervisor: Assist. Prof. Dr. Yusuf Murat Erten January 2006, 78 pages As the use of PC&rsquo<br>s and handheld devices increase, it expected that wireless communication would also grow. One of the major concerns in wireless communication is the security. Virtual Private Network (VPN) is the most secure solution that ensures three main aspect of security: authentication, accountability and encryption can use in wireless ne
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Liang, Huan. "Minimal cost design of virtual private network." Thesis, University of Ottawa (Canada), 2003. http://hdl.handle.net/10393/26513.

Der volle Inhalt der Quelle
Annotation:
VPN technology is an attractive cost-effective solution for the support of the networking needs of enterprises. In this work, we review current issues in the development of VPN technology. We then focus our research on minimal cost design, used by network-based IP VPN service providers. The interest in such solutions is generated by both customers seeking to reduce support costs and by Internet Service Providers (ISPs) seeking new revenue sources. Solving the cost minimization would allow ISPs to define and deploy new VPN services. In this thesis, Multicommodity Min-Cost Flows (MMCF) formulati
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Rüegg, Maurice. "Virtual private network provisioning in the hose model /." Zürich : ETH, Eidgenössische Technische Hochschule Zürich, Institut für Technische Informatik und Kommunikationsnetze, 2003. http://e-collection.ethbib.ethz.ch/show?type=dipl&nr=119.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Lin, Zhangxi. "Virtual private network traffic pricing : an exploratory study /." Digital version accessible at:, 1999. http://wwwlib.umi.com/cr/utexas/main.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Bazama, Muneer I. "Investigation into Layer 3 Multicast Virtual Private Network Schemes." Thèse, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/22653.

Der volle Inhalt der Quelle
Annotation:
The need of multicast applications such as Internet Protocol Television (IPTV) and dependent financial services require more scalable and reliable MVPN infrastructures. This diversity and breadth of services pose a challenge for operators to create an infrastructure that supports Layer 2 (ATM/Frame relay/Ethernet/PPP) and Layer 3(IPv4/IPv6) Virtual Private Networks. The difficulty is particularly true for virtual services that require complex control and data plane operations. Another challenge is to support emerging multicast applications incrementally on top of the existing Layer 3 VPN infra
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Mehr Quellen

Bücher zum Thema "Virtual Private Network"

1

Carmouche, James Henry. IPsec virtual private network fundamentals. Indianapolis, Ind: Cisco Press, 2007.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Carmouche, James Henry. IPsec virtual private network fundamentals. Indianapolis, Ind: Cisco Press, 2007.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

(Corporation), NIIT, ed. Building a virtual private network. Cincinnati, Ohio: Premier Press, 2003.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Kosiur, David R. Building and managing virtual private networks. New York: Wiley, 1998.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Covill, Randall J. Implementing extranets: The Internet as a virtual private network. Boston: Digital Press, 1998.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Ng, Walfrey. MIBlet approach to virtual private network management: Design, applications and implementation. Ottawa: National Library of Canada, 1999.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Raud, Matthieu. A study of virtual private network technologies and analysis of the implementations. Oxford: Oxford Brookes University, 2003.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Frahim, Jazib. SSL and Remote Access VPNs: An introduction to designing and configuring SSL virtual private networks. Indianapolis, IN: Cisco Systems, 2008.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

1969-, Erwin Mike, and Wolfe Paul, eds. Virtual Private Networks. Sebastopol, CA: O'Reilly, 1998.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Inc, NetLibrary, ed. Virtual private networks. New York: McGraw-Hill, 2000.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Mehr Quellen

Buchteile zum Thema "Virtual Private Network"

1

Bök, Patrick-Benjamin, Andreas Noack, Marcel Müller, and Daniel Behnke. "Virtual Private Network (VPN)." In Computernetze und Internet of Things, 211–24. Wiesbaden: Springer Fachmedien Wiesbaden, 2020. http://dx.doi.org/10.1007/978-3-658-29409-0_11.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Masuda, Mineyoshi, Yutaka Yoshimura, Toshiaki Tarui, Toni Shonai, and Mamoru Sugie. "VPDC: Virtual Private Data Center." In Integrated Network Management VIII, 473–76. Boston, MA: Springer US, 2003. http://dx.doi.org/10.1007/978-0-387-35674-7_47.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Sinha, Sanjib. "Virtual Private Network or VPN." In Beginning Ethical Hacking with Python, 185–89. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2541-7_28.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Prenn, Caroline, and Paul van Marcke. "Value-chain, virtual private network (VPN)." In Projektkompass eLogistik, 235–40. Wiesbaden: Vieweg+Teubner Verlag, 2002. http://dx.doi.org/10.1007/978-3-322-84977-9_16.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Cabianca, Dario. "Implementing Virtual Private Cloud Instances." In Google Cloud Platform (GCP) Professional Cloud Network Engineer Certification Companion, 87–180. Berkeley, CA: Apress, 2023. http://dx.doi.org/10.1007/978-1-4842-9354-6_3.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Wang, Lina, Ge Yu, Guoren Wang, Xiaochun Yang, Dan Wang, Xiaomei Dong, Daling Wang, and Zhe Mei. "A Virtual Private Network for Virtual Enterprise Information Systems." In Web-Age Information Management, 165–76. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-45151-x_16.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Gali, Alex, and Stefan Covaci. "Active Virtual Private Network Services on Demand." In Next Generation Networks. Networks and Services for the Information Society, 160–73. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-40019-2_14.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Brehon, Yannick, Daniel Kofman, and Augusto Casaca. "Virtual Private Network to Spanning Tree Mapping." In NETWORKING 2007. Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet, 703–13. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-72606-7_60.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Eisenbrand, Friedrich, Fabrizio Grandoni, Gianpaolo Oriolo, and Martin Skutella. "New Approaches for Virtual Private Network Design." In Automata, Languages and Programming, 1151–62. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11523468_93.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Ezra, Paul Joan, Sanjay Misra, Akshat Agrawal, Jonathan Oluranti, Rytis Maskeliunas, and Robertas Damasevicius. "Secured Communication Using Virtual Private Network (VPN)." In Lecture Notes on Data Engineering and Communications Technologies, 309–19. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-3961-6_27.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Konferenzberichte zum Thema "Virtual Private Network"

1

Garg, Mohan, S. Senthurya, Jagtej Singh, Anila Bajpai, Nakul S. Sharma, and K. Yuvaraj. "Investigating the Use of Virtual Private Networks on ATM Network Security." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT), 1–6. IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10724957.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Saad, Muhammad, Waseem Ahmed, and Muhammad Mubashir Khan. "Design and Analysis of Quantum Safe Virtual Private Network." In 2024 4th International Conference on Innovations in Computer Science (ICONICS), 1–8. IEEE, 2024. https://doi.org/10.1109/iconics64289.2024.10824365.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Shim, Hyoungsub, Bongho Kang, Haejung Im, Duhyun Jeon, and Seok-min Kim. "Virtual Private Network (VPN) with Post-Quantum Cryptography (PQC)." In 2024 15th International Conference on Information and Communication Technology Convergence (ICTC), 1009–11. IEEE, 2024. https://doi.org/10.1109/ictc62082.2024.10827179.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Wang, Xu, Dahua Zhang, Ziqing Lin, Yayun Zhu, Xin Liu, Rui Wang, and Baiji Hu. "Research on Security Risk Assessment Model for Power 5G Virtual Private Network." In 2024 International Conference on Artificial Intelligence and Power Systems (AIPS), 457–61. IEEE, 2024. http://dx.doi.org/10.1109/aips64124.2024.00100.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Zhang, Guoyi, Hailong Zhu, Junyi Xie, Jiaqi Hu, Yu Huang, and Tianyu Chen. "Research on Terminal Multi-Operator Network Access and Switching Control Technology Based on 5G Power Virtual Private Network." In 2024 IEEE 4th International Conference on Data Science and Computer Application (ICDSCA), 555–60. IEEE, 2024. https://doi.org/10.1109/icdsca63855.2024.10859952.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Zhu, Hailong, Guoyi Zhang, Junyi Xie, Jiaqi Hu, Yu Huang, and Tianyu Chen. "Intelligent Management and Control of Massive Terminal Access Based on 5G Power Virtual Private Network." In 2024 IEEE 4th International Conference on Data Science and Computer Application (ICDSCA), 561–65. IEEE, 2024. https://doi.org/10.1109/icdsca63855.2024.10860110.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Benzid, Djedjiga, and Michel Kadoch. "Virtual Private Network over Wireless Mesh Networks." In 2014 2nd International Conference on Future Internet of Things and Cloud (FiCloud). IEEE, 2014. http://dx.doi.org/10.1109/ficloud.2014.60.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Gupta, Anupam, Jon Kleinberg, Amit Kumar, Rajeev Rastogi, and Bulent Yener. "Provisioning a virtual private network." In the thirty-third annual ACM symposium. New York, New York, USA: ACM Press, 2001. http://dx.doi.org/10.1145/380752.380830.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Takeda, Tomonori. "Layer 1 Virtual Private Network." In OFC/NFOEC 2007 - 2007 Conference on Optical Fiber Communication and the National Fiber Optic Engineers Conference. IEEE, 2007. http://dx.doi.org/10.1109/ofc.2007.4348578.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Nawej, Claude Mukatshung, and Shengzhi Du. "Virtual Private Network’s Impact on Network Performance." In 2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC). IEEE, 2018. http://dx.doi.org/10.1109/iconic.2018.8601281.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Berichte der Organisationen zum Thema "Virtual Private Network"

1

Andersson, L., and T. Madsen. Provider Provisioned Virtual Private Network (VPN) Terminology. RFC Editor, March 2005. http://dx.doi.org/10.17487/rfc4026.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Daggett, David. Analyzing Risks of Virtual Private Network Connections. Office of Scientific and Technical Information (OSTI), December 2024. https://doi.org/10.2172/2483602.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Bocci, M., S. Boutros, and A. Sajassi. Applicability of Ethernet Virtual Private Network (EVPN) to Network Virtualization over Layer 3 (NVO3) Networks. Edited by J. Rabadan. RFC Editor, September 2023. http://dx.doi.org/10.17487/rfc9469.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Rosen, E., Y. Cai, and A. Boers. Multicast Virtual Private Network (MVPN): Using Bidirectional P-Tunnels. RFC Editor, July 2015. http://dx.doi.org/10.17487/rfc7582.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Schliesser, B., and T. Nadeau. Definition of Textual Conventions for Virtual Private Network (VPN) Management. RFC Editor, November 2005. http://dx.doi.org/10.17487/rfc4265.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Gont, F. Layer 3 Virtual Private Network (VPN) Tunnel Traffic Leakages in Dual-Stack Hosts/Networks. RFC Editor, August 2014. http://dx.doi.org/10.17487/rfc7359.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Adrangi, F., and H. Levkowetz, eds. Problem Statement: Mobile IPv4 Traversal of Virtual Private Network (VPN) Gateways. RFC Editor, August 2005. http://dx.doi.org/10.17487/rfc4093.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Nadeau, T., and H. van, eds. MPLS/BGP Layer 3 Virtual Private Network (VPN) Management Information Base. RFC Editor, February 2006. http://dx.doi.org/10.17487/rfc4382.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

De, J., D. Ooms, M. Carugi, and F. Le. BGP-MPLS IP Virtual Private Network (VPN) Extension for IPv6 VPN. RFC Editor, September 2006. http://dx.doi.org/10.17487/rfc4659.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Baker, F., and P. Bose. Quality of Service (QoS) Signaling in a Nested Virtual Private Network. RFC Editor, August 2007. http://dx.doi.org/10.17487/rfc4923.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!