Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Virtual Private Network“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Virtual Private Network" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Virtual Private Network"
Kim, Kyung-Muk, and Hae-Sool Yang. "VPN (Virtual Private Network) SW's examination example analysis." Journal of the Korea Academia-Industrial cooperation Society 11, no. 8 (August 31, 2010): 3012–20. http://dx.doi.org/10.5762/kais.2010.11.8.3012.
Der volle Inhalt der QuelleKnapp, Laura. "Virtual Private Network Performance." EDPACS 28, no. 7 (January 2001): 1. http://dx.doi.org/10.1201/1079/43264.28.7.20010101/30378.4.
Der volle Inhalt der QuelleWright, Marie A. "Virtual Private Network Security." Network Security 2000, no. 7 (July 2000): 11–14. http://dx.doi.org/10.1016/s1353-4858(00)07018-5.
Der volle Inhalt der QuelleKennedy, Okokpujie, Shobayo Olamilekan, Noma-Osaghae Etinosa, Imhade Okokpujie, and Okoyeigbo Obinna. "Performance of MPLS-based Virtual Private Networks and Classic Virtual Private Networks Using Advanced Metrics." TELKOMNIKA Telecommunication, Computing, Electronics and Control 16, no. 5 (October 1, 2018): 2073–81. https://doi.org/10.12928/TELKOMNIKA.v16i5.7326.
Der volle Inhalt der QuelleScott, Charlie, Paul Wolfe, and Mike Erwin. "Virtual Private Networks: Turning the Internet into Your Private Network." EDPACS 27, no. 2 (August 1999): 16. http://dx.doi.org/10.1201/1079/43248.27.2.19990801/30263.5.
Der volle Inhalt der QuelleAnggie Maulia, Aldi Fadilla Ramadhan, Andi Purwanto, Apipah Apipah, and Didik Aribowo. "Simulasi Virtual Private Network Dengan Topologi Star." Jurnal Penelitian Teknologi Informasi dan Sains 2, no. 2 (May 16, 2024): 54–66. http://dx.doi.org/10.54066/jptis.v2i2.1865.
Der volle Inhalt der QuelleKhizirova, M. A., Katipa Chezhimbayeva, Almira Mukhamejanova, Zhanat Manbetova, and Bulbul Ongar. "USING OF VIRTUAL PRIVATE NETWORK TECHNOLOGY FOR SIGNAL TRANSMISSION IN CORPORATE NETWORKS." Series of Geology and Technical Sciences 447, no. 3 (June 15, 2021): 100–103. http://dx.doi.org/10.32014/2021.2518-170x.69.
Der volle Inhalt der QuelleTAKEDA, T., R. MATSUZAKI, I. INOUE, and S. URUSHIDANI. "Network Design Scheme for Virtual Private Network Services." IEICE Transactions on Communications E89-B, no. 11 (November 1, 2006): 3046–54. http://dx.doi.org/10.1093/ietcom/e89-b.11.3046.
Der volle Inhalt der QuelleSobh, Tarek S., and Yasser Aly. "Effective and Extensive Virtual Private Network." Journal of Information Security 02, no. 01 (2011): 39–49. http://dx.doi.org/10.4236/jis.2011.21004.
Der volle Inhalt der QuelleCrocetti, P., S. Fotedar, L. Fratta, G. Gallassi, and M. Gerla. "ATM virtual private network design alternatives." Computer Communications 18, no. 1 (January 1995): 24–31. http://dx.doi.org/10.1016/0140-3664(94)00748-7.
Der volle Inhalt der QuelleDissertationen zum Thema "Virtual Private Network"
Celestino, Pedro. "Private virtual network." Universidade de Taubaté, 2005. http://www.bdtd.unitau.br/tedesimplificado/tde_busca/arquivo.php?codArquivo=264.
Der volle Inhalt der QuelleSamuelsson, Joakim, and Richard Sandsund. "Implementing a virtual private network." Thesis, KTH, Kommunikationssystem, CoS, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-91933.
Der volle Inhalt der QuelleDavis, Carlton R. "IPSec base virtual private network." Thesis, McGill University, 2000. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=33390.
Der volle Inhalt der QuelleHabibovic, Sanel. "VIRTUAL PRIVATE NETWORKS : An Analysis of the Performance in State-of-the-Art Virtual Private Network solutions in Unreliable Network Conditions." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-17844.
Der volle Inhalt der QuelleNorin, Anders, and Henrik Ohlsson. "VPN : Virtual Private Network i Windows 2000." Thesis, University West, Department of Informatics and Mathematics, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-483.
Der volle Inhalt der QuelleIkiz, Suheyla. "Performance Parameters Of Wireless Virtual Private Network." Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/12607094/index.pdf.
Der volle Inhalt der QuelleLiang, Huan. "Minimal cost design of virtual private network." Thesis, University of Ottawa (Canada), 2003. http://hdl.handle.net/10393/26513.
Der volle Inhalt der QuelleRüegg, Maurice. "Virtual private network provisioning in the hose model /." Zürich : ETH, Eidgenössische Technische Hochschule Zürich, Institut für Technische Informatik und Kommunikationsnetze, 2003. http://e-collection.ethbib.ethz.ch/show?type=dipl&nr=119.
Der volle Inhalt der QuelleLin, Zhangxi. "Virtual private network traffic pricing : an exploratory study /." Digital version accessible at:, 1999. http://wwwlib.umi.com/cr/utexas/main.
Der volle Inhalt der QuelleBazama, Muneer I. "Investigation into Layer 3 Multicast Virtual Private Network Schemes." Thèse, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/22653.
Der volle Inhalt der QuelleBücher zum Thema "Virtual Private Network"
Carmouche, James Henry. IPsec virtual private network fundamentals. Indianapolis, Ind: Cisco Press, 2007.
Den vollen Inhalt der Quelle findenCarmouche, James Henry. IPsec virtual private network fundamentals. Indianapolis, Ind: Cisco Press, 2007.
Den vollen Inhalt der Quelle finden(Corporation), NIIT, ed. Building a virtual private network. Cincinnati, Ohio: Premier Press, 2003.
Den vollen Inhalt der Quelle findenKosiur, David R. Building and managing virtual private networks. New York: Wiley, 1998.
Den vollen Inhalt der Quelle findenCovill, Randall J. Implementing extranets: The Internet as a virtual private network. Boston: Digital Press, 1998.
Den vollen Inhalt der Quelle findenNg, Walfrey. MIBlet approach to virtual private network management: Design, applications and implementation. Ottawa: National Library of Canada, 1999.
Den vollen Inhalt der Quelle findenRaud, Matthieu. A study of virtual private network technologies and analysis of the implementations. Oxford: Oxford Brookes University, 2003.
Den vollen Inhalt der Quelle findenFrahim, Jazib. SSL and Remote Access VPNs: An introduction to designing and configuring SSL virtual private networks. Indianapolis, IN: Cisco Systems, 2008.
Den vollen Inhalt der Quelle finden1969-, Erwin Mike, and Wolfe Paul, eds. Virtual Private Networks. Sebastopol, CA: O'Reilly, 1998.
Den vollen Inhalt der Quelle findenInc, NetLibrary, ed. Virtual private networks. New York: McGraw-Hill, 2000.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Virtual Private Network"
Bök, Patrick-Benjamin, Andreas Noack, Marcel Müller, and Daniel Behnke. "Virtual Private Network (VPN)." In Computernetze und Internet of Things, 211–24. Wiesbaden: Springer Fachmedien Wiesbaden, 2020. http://dx.doi.org/10.1007/978-3-658-29409-0_11.
Der volle Inhalt der QuelleMasuda, Mineyoshi, Yutaka Yoshimura, Toshiaki Tarui, Toni Shonai, and Mamoru Sugie. "VPDC: Virtual Private Data Center." In Integrated Network Management VIII, 473–76. Boston, MA: Springer US, 2003. http://dx.doi.org/10.1007/978-0-387-35674-7_47.
Der volle Inhalt der QuelleSinha, Sanjib. "Virtual Private Network or VPN." In Beginning Ethical Hacking with Python, 185–89. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2541-7_28.
Der volle Inhalt der QuellePrenn, Caroline, and Paul van Marcke. "Value-chain, virtual private network (VPN)." In Projektkompass eLogistik, 235–40. Wiesbaden: Vieweg+Teubner Verlag, 2002. http://dx.doi.org/10.1007/978-3-322-84977-9_16.
Der volle Inhalt der QuelleCabianca, Dario. "Implementing Virtual Private Cloud Instances." In Google Cloud Platform (GCP) Professional Cloud Network Engineer Certification Companion, 87–180. Berkeley, CA: Apress, 2023. http://dx.doi.org/10.1007/978-1-4842-9354-6_3.
Der volle Inhalt der QuelleWang, Lina, Ge Yu, Guoren Wang, Xiaochun Yang, Dan Wang, Xiaomei Dong, Daling Wang, and Zhe Mei. "A Virtual Private Network for Virtual Enterprise Information Systems." In Web-Age Information Management, 165–76. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-45151-x_16.
Der volle Inhalt der QuelleGali, Alex, and Stefan Covaci. "Active Virtual Private Network Services on Demand." In Next Generation Networks. Networks and Services for the Information Society, 160–73. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-40019-2_14.
Der volle Inhalt der QuelleBrehon, Yannick, Daniel Kofman, and Augusto Casaca. "Virtual Private Network to Spanning Tree Mapping." In NETWORKING 2007. Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet, 703–13. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-72606-7_60.
Der volle Inhalt der QuelleEisenbrand, Friedrich, Fabrizio Grandoni, Gianpaolo Oriolo, and Martin Skutella. "New Approaches for Virtual Private Network Design." In Automata, Languages and Programming, 1151–62. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11523468_93.
Der volle Inhalt der QuelleEzra, Paul Joan, Sanjay Misra, Akshat Agrawal, Jonathan Oluranti, Rytis Maskeliunas, and Robertas Damasevicius. "Secured Communication Using Virtual Private Network (VPN)." In Lecture Notes on Data Engineering and Communications Technologies, 309–19. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-3961-6_27.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Virtual Private Network"
Garg, Mohan, S. Senthurya, Jagtej Singh, Anila Bajpai, Nakul S. Sharma, and K. Yuvaraj. "Investigating the Use of Virtual Private Networks on ATM Network Security." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT), 1–6. IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10724957.
Der volle Inhalt der QuelleSaad, Muhammad, Waseem Ahmed, and Muhammad Mubashir Khan. "Design and Analysis of Quantum Safe Virtual Private Network." In 2024 4th International Conference on Innovations in Computer Science (ICONICS), 1–8. IEEE, 2024. https://doi.org/10.1109/iconics64289.2024.10824365.
Der volle Inhalt der QuelleShim, Hyoungsub, Bongho Kang, Haejung Im, Duhyun Jeon, and Seok-min Kim. "Virtual Private Network (VPN) with Post-Quantum Cryptography (PQC)." In 2024 15th International Conference on Information and Communication Technology Convergence (ICTC), 1009–11. IEEE, 2024. https://doi.org/10.1109/ictc62082.2024.10827179.
Der volle Inhalt der QuelleWang, Xu, Dahua Zhang, Ziqing Lin, Yayun Zhu, Xin Liu, Rui Wang, and Baiji Hu. "Research on Security Risk Assessment Model for Power 5G Virtual Private Network." In 2024 International Conference on Artificial Intelligence and Power Systems (AIPS), 457–61. IEEE, 2024. http://dx.doi.org/10.1109/aips64124.2024.00100.
Der volle Inhalt der QuelleZhang, Guoyi, Hailong Zhu, Junyi Xie, Jiaqi Hu, Yu Huang, and Tianyu Chen. "Research on Terminal Multi-Operator Network Access and Switching Control Technology Based on 5G Power Virtual Private Network." In 2024 IEEE 4th International Conference on Data Science and Computer Application (ICDSCA), 555–60. IEEE, 2024. https://doi.org/10.1109/icdsca63855.2024.10859952.
Der volle Inhalt der QuelleZhu, Hailong, Guoyi Zhang, Junyi Xie, Jiaqi Hu, Yu Huang, and Tianyu Chen. "Intelligent Management and Control of Massive Terminal Access Based on 5G Power Virtual Private Network." In 2024 IEEE 4th International Conference on Data Science and Computer Application (ICDSCA), 561–65. IEEE, 2024. https://doi.org/10.1109/icdsca63855.2024.10860110.
Der volle Inhalt der QuelleBenzid, Djedjiga, and Michel Kadoch. "Virtual Private Network over Wireless Mesh Networks." In 2014 2nd International Conference on Future Internet of Things and Cloud (FiCloud). IEEE, 2014. http://dx.doi.org/10.1109/ficloud.2014.60.
Der volle Inhalt der QuelleGupta, Anupam, Jon Kleinberg, Amit Kumar, Rajeev Rastogi, and Bulent Yener. "Provisioning a virtual private network." In the thirty-third annual ACM symposium. New York, New York, USA: ACM Press, 2001. http://dx.doi.org/10.1145/380752.380830.
Der volle Inhalt der QuelleTakeda, Tomonori. "Layer 1 Virtual Private Network." In OFC/NFOEC 2007 - 2007 Conference on Optical Fiber Communication and the National Fiber Optic Engineers Conference. IEEE, 2007. http://dx.doi.org/10.1109/ofc.2007.4348578.
Der volle Inhalt der QuelleNawej, Claude Mukatshung, and Shengzhi Du. "Virtual Private Network’s Impact on Network Performance." In 2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC). IEEE, 2018. http://dx.doi.org/10.1109/iconic.2018.8601281.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Virtual Private Network"
Andersson, L., and T. Madsen. Provider Provisioned Virtual Private Network (VPN) Terminology. RFC Editor, March 2005. http://dx.doi.org/10.17487/rfc4026.
Der volle Inhalt der QuelleDaggett, David. Analyzing Risks of Virtual Private Network Connections. Office of Scientific and Technical Information (OSTI), December 2024. https://doi.org/10.2172/2483602.
Der volle Inhalt der QuelleBocci, M., S. Boutros, and A. Sajassi. Applicability of Ethernet Virtual Private Network (EVPN) to Network Virtualization over Layer 3 (NVO3) Networks. Edited by J. Rabadan. RFC Editor, September 2023. http://dx.doi.org/10.17487/rfc9469.
Der volle Inhalt der QuelleRosen, E., Y. Cai, and A. Boers. Multicast Virtual Private Network (MVPN): Using Bidirectional P-Tunnels. RFC Editor, July 2015. http://dx.doi.org/10.17487/rfc7582.
Der volle Inhalt der QuelleSchliesser, B., and T. Nadeau. Definition of Textual Conventions for Virtual Private Network (VPN) Management. RFC Editor, November 2005. http://dx.doi.org/10.17487/rfc4265.
Der volle Inhalt der QuelleGont, F. Layer 3 Virtual Private Network (VPN) Tunnel Traffic Leakages in Dual-Stack Hosts/Networks. RFC Editor, August 2014. http://dx.doi.org/10.17487/rfc7359.
Der volle Inhalt der QuelleAdrangi, F., and H. Levkowetz, eds. Problem Statement: Mobile IPv4 Traversal of Virtual Private Network (VPN) Gateways. RFC Editor, August 2005. http://dx.doi.org/10.17487/rfc4093.
Der volle Inhalt der QuelleNadeau, T., and H. van, eds. MPLS/BGP Layer 3 Virtual Private Network (VPN) Management Information Base. RFC Editor, February 2006. http://dx.doi.org/10.17487/rfc4382.
Der volle Inhalt der QuelleDe, J., D. Ooms, M. Carugi, and F. Le. BGP-MPLS IP Virtual Private Network (VPN) Extension for IPv6 VPN. RFC Editor, September 2006. http://dx.doi.org/10.17487/rfc4659.
Der volle Inhalt der QuelleBaker, F., and P. Bose. Quality of Service (QoS) Signaling in a Nested Virtual Private Network. RFC Editor, August 2007. http://dx.doi.org/10.17487/rfc4923.
Der volle Inhalt der Quelle