Contents
Academic literature on the topic 'VPN management'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'VPN management.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "VPN management"
Liu, Zai Ying, Ping Yang, and Li Xiao Zhang. "Research of Typical VPN Network Management Mechanisms." Applied Mechanics and Materials 380-384 (August 2013): 2510–14. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2510.
Full textHudda, Shreeram. "Uninterrupted VPN Connection Service with Mobility Management and Dead Peer Detection." Defence Science Journal 71, no. 4 (2021): 556–63. http://dx.doi.org/10.14429/dsj.71.15623.
Full textHidayat, Arif. "ANALYSIS AND DISTANCE ACCESS DESIGN FAR WITH VPN TECHNOLOGY IN BMT OFFICE. MENTARI EAST LAMPUNG." IJISCS (International Journal of Information System and Computer Science) 3, no. 2 (2019): 64. http://dx.doi.org/10.56327/ijiscs.v3i2.742.
Full textAlashi, Shahad A., and Hanaa A. Aldahawi. "Cybersecurity Management for Virtual Private Network (VPN) Applications: A Proposed Framework for the Governance of their Use in the Kingdom of Saudi Arabia." Journal of Information Security and Cybercrimes Research 3, no. 1 (2020): 31–57. http://dx.doi.org/10.26735/vsdj4585.
Full textLi, Qiang, and Hua Long Liu. "RFID Network and its Application in Management of Aviation Maintenance." Applied Mechanics and Materials 475-476 (December 2013): 920–24. http://dx.doi.org/10.4028/www.scientific.net/amm.475-476.920.
Full textSalman, Fatimah A. "Implementation of IPsec-VPN Tunneling using GNS3." Indonesian Journal of Electrical Engineering and Computer Science 7, no. 3 (2017): 855. http://dx.doi.org/10.11591/ijeecs.v7.i3.pp855-860.
Full textGaspoz, Jean-Paul, Jean-Pierre Hubaux, and Simon Znaty. "A generic architecture for VPN configuration management." Journal of Network and Systems Management 4, no. 4 (1996): 375–95. http://dx.doi.org/10.1007/bf02283161.
Full textPangestu, Sindu. "Perancangan Cloud Storage Menggunakan Freenas Melalui Jalur Tunneling." JATISI (Jurnal Teknik Informatika dan Sistem Informasi) 9, no. 2 (2022): 955–72. http://dx.doi.org/10.35957/jatisi.v9i2.1655.
Full textDamasco Jr., Loreto B., Noel Raymund F. Lacson, and Roger T. Intong. "Safeguarding Transactional Data: A Comprehensive Investigation of VPN Integration in Point-of-Sale Systems for Enhanced Security and Connectivity." Eximia 12 (December 14, 2023): 570–89. http://dx.doi.org/10.47577/eximia.v12i1.405.
Full textZhang, Guo Fang. "The Solution and Management of VPN Based IPSec Technology." Applied Mechanics and Materials 686 (October 2014): 210–19. http://dx.doi.org/10.4028/www.scientific.net/amm.686.210.
Full text