Literatura académica sobre el tema "VPN"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "VPN".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "VPN"
Kazén, Miguel. "Problemessen vs. Spaßessen." Zeitschrift für Gesundheitspsychologie 14, no. 2 (2006): 34–45. http://dx.doi.org/10.1026/0943-8149.14.2.34.
Texto completoLeutner, Detlev, Anke Barthel, and Beate Schreiber. "Studierende können lernen, sich selbst zum Lernen zu motivieren: Ein Trainingsexperiment." Zeitschrift für Pädagogische Psychologie 15, no. 3/4 (2001): 155–67. http://dx.doi.org/10.1024//1010-0652.15.34.155.
Texto completoKempter, Guido, and Carsten Möller. "Beurteilung einzelner Stimuli des Ausdrucksverhaltens ohne ihre entsprechenden Kontext- und Begleitmerkmale." Zeitschrift für Sozialpsychologie 31, no. 2 (2000): 102–12. http://dx.doi.org/10.1024//0044-3514.31.2.102.
Texto completoAnbalagan, Srivishnupriya, Elyse Cooper, Pat Klumper, Randy R. Simonson, and Ben M. Hause. "Whole genome analysis of epizootic hemorrhagic disease virus identified limited genome constellations and preferential reassortment." Journal of General Virology 95, no. 2 (2014): 434–41. http://dx.doi.org/10.1099/vir.0.059659-0.
Texto completoFatimah, Abdulnabi Salman. "Implementation of IPsec-VPN Tunneling using GNS3." Indonesian Journal of Electrical Engineering and Computer Science 5, no. 1 (2017): 855–60. https://doi.org/10.11591/ijeecs.v7.i3.pp855-860.
Texto completoFu, Chunle, Bailing Wang, Wei Wang, et al. "A Generic High-Performance Architecture for VPN Gateways." Electronics 13, no. 11 (2024): 2031. http://dx.doi.org/10.3390/electronics13112031.
Texto completoLee, Min-Seong, Jee-Tae Park, Ui-Jun Baek, Jung-Woo Choi, and Myung-Sup Kim. "Importance Analysis of Traffic Statistics Information for VPN/NoN-VPN Classification." Journal of Korean Institute of Communications and Information Sciences 47, no. 11 (2022): 1768–75. http://dx.doi.org/10.7840/kics.2022.47.11.1768.
Texto completoAndini, Marisa Dika, Muhamad Amirullah, and Helitha Novianty Muchtar. "Penggunaan Aplikasi Virtual Private Network (VPN) Point To Point Tunneling Protocol (PPTP) Dalam Mengakses Situs Terblokir." Supremasi Hukum : Jurnal Penelitian Hukum 29, no. 2 (2020): 148–66. http://dx.doi.org/10.33369/jsh.29.2.148-166.
Texto completoKher, Bhushan, Preeti Karmore, Nutan Sonwane, et al. "Apnavpn Project." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (2022): 1828–29. http://dx.doi.org/10.22214/ijraset.2022.41646.
Texto completoMardianto, Mardianto. "Analisis Quality Of Service (QoS) pada Jaringan VPN dan MPLS VPN Menggunakan GNS3." Jurnal Sains dan Informatika 5, no. 2 (2019): 98–107. http://dx.doi.org/10.34128/jsi.v5i2.191.
Texto completoTesis sobre el tema "VPN"
Козолуп, І. М. "Інформаційна технологія проєктування сучасних віртуальних приватних мереж". Master's thesis, Сумський державний університет, 2021. https://essuir.sumdu.edu.ua/handle/123456789/86666.
Texto completoRehman, Sheikh Riaz Ur. "Investigation of different VPN Solutions." Thesis, Blekinge Tekniska Högskola, Avdelningen för telekommunikationssystem, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3364.
Texto completoFabiánek, Ondřej. "VPN kontrolér." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2019. http://www.nusl.cz/ntk/nusl-403195.
Texto completoSchreiber, Alexander, and Holm Sieber. "VPN/IPSec." Universitätsbibliothek Chemnitz, 2002. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-200200982.
Texto completoSamuelsson, Joakim, and Richard Sandsund. "Implementing a virtual private network." Thesis, KTH, Kommunikationssystem, CoS, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-91933.
Texto completoHurtig, Andreas, Thomas Gisslar, and Alexander Karlsson. "Vilken mjukvarubaserad fjärranslutningslösning är passande för ett mindre företag?" Thesis, University of Kalmar, School of Communication and Design, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hik:diva-1974.
Texto completoDahlberg, Axel, and Jonas Francén. "IPv6-adresshantering och prefixdelegering i MPLS VPN-nät." Thesis, KTH, Data- och elektroteknik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-123805.
Texto completoKrigh, Oskar, and Markus Lewin. "Mobil klientsäkerhet." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-9494.
Texto completoMiliauskas, Edvinas. "Naujos generacijos intelektualių tinklų orientuotų IMS architektūrai demonstracinės paslaugos kūrimas." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2010. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2010~D_20100826_110105-35324.
Texto completoХовріна, М. А. "VPN технології для реалізації концепції високозахищеного віддаленого доступу". Master's thesis, Сумський державний університет, 2020. https://essuir.sumdu.edu.ua/handle/123456789/82257.
Texto completoLibros sobre el tema "VPN"
Hicks, Richard M. Implementing Always On VPN. Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-7741-6.
Texto completoPeter, Giannoulis, and Hay Keli, eds. Nokia firewall, VPN, and IPSO configuration guide. Syngress Pub., 2009.
Buscar texto completoLipp, Manfred. VPN - Virtuelle Private Netzwerke: Aufbau und Sicherheit. Addison-Wesley, 2001.
Buscar texto completoLipp, Manfred. Virtuelle private Netzwerke: VPN ; Aufbau und Sicherheit. Addison-Wesley, 2006.
Buscar texto completoHooper, Howard. CCNP security VPN: 642-647 official cert guide. Cisco Press, 2012.
Buscar texto completoWade, Edwards, ed. CCSP: Secure PIX and secure VPN study guide. SYBEX, 2004.
Buscar texto completoCapítulos de libros sobre el tema "VPN"
Perez, André. "Ethernet VPN." In Network Security. John Wiley & Sons, Inc., 2014. http://dx.doi.org/10.1002/9781119043942.ch8.
Texto completoLi, Zhenbin, Zhibo Hu, and Cheng Li. "SRv6 VPN." In SRv6 Network Programming. CRC Press, 2021. http://dx.doi.org/10.1201/9781003179399-5.
Texto completoLin, Weyde. "Tunneling and VPN." In Trends in Data Protection and Encryption Technologies. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_26.
Texto completoHoogendoorn, Iwan. "NSX-T VPN." In Multi-Site Network and Security Services with NSX-T. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-7083-7_6.
Texto completoMatsuura, Hiroshi, and Naotaka Morita. "Layer 1 VPN NMS Based on Each VPN Customer." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-88623-5_2.
Texto completoHicks, Richard M. "Always On VPN Overview." In Implementing Always On VPN. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-7741-6_1.
Texto completoBök, Patrick-Benjamin, Andreas Noack, Marcel Müller, and Daniel Behnke. "Virtual Private Network (VPN)." In Computernetze und Internet of Things. Springer Fachmedien Wiesbaden, 2020. http://dx.doi.org/10.1007/978-3-658-29409-0_11.
Texto completoKappes, Martin. "Virtual Private Networks (VPN)." In Netzwerk- und Datensicherheit. Springer Fachmedien Wiesbaden, 2022. http://dx.doi.org/10.1007/978-3-658-16127-9_10.
Texto completoSchreiner, Rüdiger. "VPN – virtuelle private Netzwerke." In Computernetzwerke. Carl Hanser Verlag GmbH & Co. KG, 2014. http://dx.doi.org/10.3139/9783446441545.007.
Texto completoKappes, Martin. "Virtual Private Networks (VPN)." In Netzwerk- und Datensicherheit. Springer Fachmedien Wiesbaden, 2013. http://dx.doi.org/10.1007/978-3-8348-8612-5_10.
Texto completoActas de conferencias sobre el tema "VPN"
Sharma, Kaustubh, Mohit P. Tahiliani, and Vishal J. Rathod. "Design and Development of an Emulation Model for VPN and VPN Bonding." In 2024 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT). IEEE, 2024. http://dx.doi.org/10.1109/conecct62155.2024.10677267.
Texto completoChen, Yungui, Qian Li, Liwei Tian, and Yuxiao Jiang. "Navigating the VPN Landscape: A Comparative Study of L2TP, IPSec, and MPLS VPN Technologies." In 2024 4th International Conference on Electronic Information Engineering and Computer Science (EIECS). IEEE, 2024. https://doi.org/10.1109/eiecs63941.2024.10800571.
Texto completoAlamleh, Amneh, Ola Nasir, Ayman Abu Hannoun, et al. "Real-Time VPN Anomaly Detection System." In 2024 25th International Arab Conference on Information Technology (ACIT). IEEE, 2024. https://doi.org/10.1109/acit62805.2024.10877255.
Texto completoKulkarni, Divya, Pramila B. Shinde, Vaishnavi Y. Wani, Ashwini S. Gidge, Pradya B. Sasane, and Chetan D. Bawankar. "VPN Browser." In 2023 4th International Conference on Computation, Automation and Knowledge Management (ICCAKM). IEEE, 2023. http://dx.doi.org/10.1109/iccakm58659.2023.10449535.
Texto completoMao, Huaqing, Li Zhu, and Hang Qin. "A Comparative Research on SSL VPN and IPSec VPN." In 2012 8th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM). IEEE, 2012. http://dx.doi.org/10.1109/wicom.2012.6478270.
Texto completoFigueiredo, Francisco José Candeias, and Paulo Lício de Geus. "Acesso remoto em firewalls e topologia para gateways VPN." In Workshop em Segurança de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2001. http://dx.doi.org/10.5753/sbseg.2001.21292.
Texto completoSawalmeh, Hanan, Manar Malayshi, Sujood Ahmad, and Ahmed Awad. "VPN Remote Access OSPF-based VPN Security Vulnerabilities and Counter Measurements." In 2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT). IEEE, 2021. http://dx.doi.org/10.1109/3ict53449.2021.9581512.
Texto completoDiab, Wafaa Bou, Samir Tohme, and Carole Bassil. "VPN Analysis and New Perspective for Securing Voice over VPN Networks." In Fourth International Conference on Networking and Services (icns 2008). IEEE, 2008. http://dx.doi.org/10.1109/icns.2008.8.
Texto completoPopa, Alin-Bogdan. "QGP-VPN: QKD enhanced VPN solution for general-purpose encrypted communications." In 2023 22nd RoEduNet Conference: Networking in Education and Research (RoEduNet). IEEE, 2023. http://dx.doi.org/10.1109/roedunet60162.2023.10274931.
Texto completoBritto, Júlia Macedo de, and Rita Maira Zanine. "Os achados da colposcopia no rastreio das lesões precursoras do carcinoma cervical uterino: experiência em um hospital universitário." In 45º Congresso da SGORJ XXIV Trocando Ideias. Zeppelini Editorial e Comunicação, 2021. http://dx.doi.org/10.5327/jbg-0368-1416-20211311070.
Texto completoInformes sobre el tema "VPN"
De, J., D. Ooms, M. Carugi, and F. Le. BGP-MPLS IP Virtual Private Network (VPN) Extension for IPv6 VPN. RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4659.
Texto completoLitkowski, S., K. Patel, Z. Zhang, R. Kebler, and J. Haas. Multicast VPN State Damping. Edited by T. Morin. RFC Editor, 2016. http://dx.doi.org/10.17487/rfc7899.
Texto completoZhang, Z., and H. Tsunoda. L2L3 VPN Multicast MIB. RFC Editor, 2018. http://dx.doi.org/10.17487/rfc8502.
Texto completoFraser, Laurie, Kathryn Roose, and Greg Nix. IPSec VPN Capabilities and Interoperability. Defense Technical Information Center, 2006. http://dx.doi.org/10.21236/ada451929.
Texto completoPapadimitriou, D., R. Rabbat, and L. Berger. Layer 1 VPN Basic Mode. Edited by D. Fedyk and Y. Rekhter. RFC Editor, 2008. http://dx.doi.org/10.17487/rfc5251.
Texto completoSajassi, A., R. Aggarwal, J. Uttaro, N. Bitar, W. Henderickx, and A. Isaac. Requirements for Ethernet VPN (EVPN). RFC Editor, 2014. http://dx.doi.org/10.17487/rfc7209.
Texto completoAggarwal, R., N. Bitar, A. Isaac, J. Uttaro, J. Drake, and W. Henderickx. BGP MPLS-Based Ethernet VPN. Edited by A. Sajassi. RFC Editor, 2015. http://dx.doi.org/10.17487/rfc7432.
Texto completoMorin, T., R. Kebler, and G. Mirsky, eds. Multicast VPN Fast Upstream Failover. RFC Editor, 2021. http://dx.doi.org/10.17487/rfc9026.
Texto completoMuthukrishnan, K., and A. Malis. A Core MPLS IP VPN Architecture. RFC Editor, 2000. http://dx.doi.org/10.17487/rfc2917.
Texto completoSubramanian, K., and Z. Zhang. Ingress Replication Tunnels in Multicast VPN. Edited by E. Rosen. RFC Editor, 2016. http://dx.doi.org/10.17487/rfc7988.
Texto completo