Works matching DE "VIRTUAL private networks"
Results: 375
Unmasking the True Identity: Unveiling the Secrets of Virtual Private Networks and Proxies.
- Published in:
- Information (2078-2489), 2025, v. 16, n. 2, p. 126, doi. 10.3390/info16020126
- By:
- Publication type:
- Article
IRANIAN DEVOLUTION: Tehran Fights the Digital Future.
- Published in:
- World Affairs, 2015, v. 178, n. 3, p. 51
- By:
- Publication type:
- Article
Unilateral Taxation of the Digital Economy: The fight is not over yet--it's only beginning.
- Published in:
- Tax Executive, 2020, v. 72, n. 3, p. 26
- By:
- Publication type:
- Article
TEI Files Comments Regarding Proposed "Cloud Transactions" Regulations.
- Published in:
- Tax Executive, 2020, v. 72, n. 1, p. 55
- Publication type:
- Article
USING WEB2.0 APPLICATIONS TO CLOSE THE DIGITAL DIVIDE IN WESTERN AUSTRALIA.
- Published in:
- Education in Rural Australia, 2008, v. 18, n. 1, p. 3, doi. 10.47381/aijre.v18i1.548
- By:
- Publication type:
- Article
Putin's war: restorative reflections.
- Published in:
- International Journal of Restorative Justice, 2022, v. 5, n. 2, p. 137, doi. 10.5553/TIJRJ.000117
- By:
- Publication type:
- Article
The Use of Impression Management Strategies to Manage Stock Market Reactions to IT Failures.
- Published in:
- Journal of the Association for Information Systems, 2018, v. 19, n. 4, p. 333, doi. 10.17705/1jais.00494
- By:
- Publication type:
- Article
Analisis Quality of Services Jaringan VoIP pada VPN menggunakan InterAsteriks Exchange dan Session Initiation Protocol.
- Published in:
- Techno.com, 2020, v. 19, n. 1, p. 1, doi. 10.33633/tc.v19i1.2753
- By:
- Publication type:
- Article
DeFi and Cryptocurrency Hacks, Prospects, and Solutions.
- Published in:
- ISSA Journal, 2022, v. 20, n. 9, p. 9
- By:
- Publication type:
- Article
Zeroing on Zero Trust Architecture.
- Published in:
- ISSA Journal, 2022, v. 20, n. 2, p. 13
- By:
- Publication type:
- Article
Zeroing in on Zero Trust Architecture.
- Published in:
- ISSA Journal, 2021, v. 19, n. 12, p. 8
- By:
- Publication type:
- Article
Multi-cloud Security: Use of multi-cloud strategies is increasing in business. Cybersecurity professionals need to be flexible to adapt to their use.
- Published in:
- ISSA Journal, 2021, v. 19, n. 4, p. 18
- By:
- Publication type:
- Article
The Most Common Control Deficiencies in CMMC noncompliant DoD contractors.
- Published in:
- ISSA Journal, 2021, v. 19, n. 2, p. 31
- By:
- Publication type:
- Article
News That You Can Use...
- Published in:
- ISSA Journal, 2020, v. 18, n. 5, p. 10
- Publication type:
- Article
Managing Remote Iot Platforms for Operational Tasks.
- Published in:
- ISSA Journal, 2020, v. 18, n. 4, p. 29
- By:
- Publication type:
- Article
Why I *Really* Don’t Like Facebook.
- Published in:
- ISSA Journal, 2019, v. 17, n. 4, p. 7
- By:
- Publication type:
- Article
Mobile Application Security.
- Published in:
- ISSA Journal, 2016, v. 14, n. 3, p. 23
- By:
- Publication type:
- Article
SECURITY ACCELERATION, DRIVER ARCHITECTURE AND PERFORMANCE MEASUREMENTS FOR INTEL® EP80579 INTEGRATED PROCESSOR WITH INTEL® QUICKASSIST TECHNOLOGY.
- Published in:
- Intel Technology Journal, 2009, v. 13, n. 1, p. 66
- By:
- Publication type:
- Article
Seamless Connectivity to Wireless Local Area Networks.
- Published in:
- Intel Technology Journal, 2003, v. 7, n. 3, p. 58
- By:
- Publication type:
- Article
Towards a Secure and Scalable IoT Infrastructure: A Pilot Deployment for a Smart Water Monitoring System.
- Published in:
- Technologies (2227-7080), 2020, v. 8, n. 4, p. 50, doi. 10.3390/technologies8040050
- By:
- Publication type:
- Article
Initial Coefficients and Fekete-Szegő Inequalities for Functions Related to van der Pol Numbers (VPN).
- Published in:
- Mathematica Slovaca, 2023, v. 73, n. 5, p. 1183, doi. 10.1515/ms-2023-0087
- By:
- Publication type:
- Article
Development of Simulated Remote Monitoring and Operation System under Unstable Electric Power Supply.
- Published in:
- Journal of ICT Research & Applications, 2020, v. 14, n. 1, p. 78, doi. 10.5614/itbj.ict.res.appl.2020.14.1.6
- By:
- Publication type:
- Article
Piloting an International Comparison of Readily Accessible Online English Language Advice Surrounding Responsible Cat Ownership.
- Published in:
- Animals (2076-2615), 2023, v. 13, n. 15, p. 2434, doi. 10.3390/ani13152434
- By:
- Publication type:
- Article
Implementation and performance evaluation of pass-through PPTP relay system with authentication at each gateway.
- Published in:
- Electrical Engineering in Japan, 2006, v. 154, n. 2, p. 40, doi. 10.1002/eej.20183
- By:
- Publication type:
- Article
Overlay and Virtual Private Networks Security Performances Analysis with Open Source Infrastructure Deployment.
- Published in:
- Future Internet, 2024, v. 16, n. 8, p. 283, doi. 10.3390/fi16080283
- By:
- Publication type:
- Article
A VPN Performances Analysis of Constrained Hardware Open Source Infrastructure Deploy in IoT Environment.
- Published in:
- Future Internet, 2022, v. 14, n. 9, p. 264, doi. 10.3390/fi14090264
- By:
- Publication type:
- Article
Design and Implementation of Virtual Private Storage Framework Using Internet of Things Local Networks.
- Published in:
- Symmetry (20738994), 2020, v. 12, n. 3, p. 489, doi. 10.3390/sym12030489
- By:
- Publication type:
- Article
Investigation on Quality of Service in BGP/MPL VPN Network Based on Special Service.
- Published in:
- Majlesi Journal of Electrical Engineering, 2009, v. 3, n. 1, p. 1
- By:
- Publication type:
- Article
A Quantified Trust-Risk Assessment Approach for Enhancing Firewalls-Filtering Services.
- Published in:
- Journal of Information Assurance & Security, 2019, v. 14, n. 2, p. 30
- By:
- Publication type:
- Article
Assessing connectivity and the contribution of private lands to protected area networks in the United States.
- Published in:
- PLoS ONE, 2020, v. 14, n. 3, p. 1, doi. 10.1371/journal.pone.0228946
- By:
- Publication type:
- Article
Routing Scheme for Multiple Sources in Virtual Private Networks.
- Published in:
- International Review on Computers & Software, 2012, v. 7, n. 6, p. 2968
- By:
- Publication type:
- Article
A Framework to Improve Virtual Private Network Architecture for Secure Data Transmission Using CMT-PA and Multi-Homing.
- Published in:
- International Review on Computers & Software, 2012, v. 7, n. 4, p. 1419
- By:
- Publication type:
- Article
This Content is Unavailable in Your Geographic Region: The United States' and the European Union's Implementation of Anti-Circumvention Measures.
- Published in:
- Vanderbilt Journal of Transnational Law, 2022, v. 55, n. 2, p. 485
- By:
- Publication type:
- Article
Debate: 'K-Prevention' and South Korea's integrated financial management information system.
- Published in:
- Public Money & Management, 2021, v. 41, n. 8, p. 584, doi. 10.1080/09540962.2021.1927527
- By:
- Publication type:
- Article
The Expert's Opinion.
- Published in:
- 2004
- By:
- Publication type:
- Interview
Formative evaluation of a telemedicine model for delivering clinical neurophysiology services part I: Utility, technical performance and service provider perspective.
- Published in:
- BMC Medical Informatics & Decision Making, 2010, v. 10, n. 1, p. 48, doi. 10.1186/1472-6947-10-48
- By:
- Publication type:
- Article
From Affirmative to Assertive Patriots: Nationalism in Xi Jinping's China.
- Published in:
- Washington Quarterly, 2021, v. 44, n. 4, p. 141, doi. 10.1080/0163660X.2021.2018795
- By:
- Publication type:
- Article
Simplifying Licensed Resource Access Through Shibboleth.
- Published in:
- 2009
- By:
- Publication type:
- Proceeding
Getting Serious About HIPAA Compliance.
- Published in:
- Bio-IT World, 2003, v. 2, n. 3, p. 12
- By:
- Publication type:
- Article
SafeSearch: Obfuscated VPN Server using Raspberry Pi for Secure Network.
- Published in:
- Journal of Computing Research & Innovation, 2021, v. 6, n. 4, p. 90, doi. 10.24191/jcrinn.v6i4.230
- By:
- Publication type:
- Article
5G 专网技术及煤矿 5G 专网方案分析.
- Published in:
- Journal of Mine Automation, 2022, v. 48, n. 11, p. 6, doi. 10.13272/j.issn.1671-251x.18040
- By:
- Publication type:
- Article
A Linux-Based Integrated Structural Health Monitoring System for Bridges in Remote Regions.
- Published in:
- Instrumentation, Mesures, Métrologies, 2019, v. 18, n. 6, p. 527, doi. 10.18280/i2m.180603
- By:
- Publication type:
- Article
Warring Against Encryption: Australia is Coming for Your Communications.
- Published in:
- International Policy Digest, 2024, p. 3
- By:
- Publication type:
- Article
Enabled scalable and privacy wavelength division multiplexing-radio over fiber system based on optical virtual private networks.
- Published in:
- Optical Engineering, 2014, v. 53, n. 6, p. 1, doi. 10.1117/1.OE.53.6.066105
- By:
- Publication type:
- Article
Principle and verification of novel optical virtual private networks over multiprotocol label switching/optical packet switching networks.
- Published in:
- Optical Engineering, 2012, v. 51, n. 11, p. 1, doi. 10.1117/1.OE.51.11.115004
- By:
- Publication type:
- Article
АВТОМАТИЗАЦІЯ КОНФІГУРУВАННЯ БЕЗПЕЧНОГО ПІД'ЄДНАННЯ ДО КОРПОРАТИВНИХ МЕРЕЖ
- Published in:
- Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì, 2022, v. 12, n. 1/2, p. 73, doi. 10.15276/imms.v12.no1-2.73
- By:
- Publication type:
- Article
ОРГАНІЗАЦІЯ ДИСТАНЦІЙНОГО ДОСТУПУ ДО КОМП'ЮТЕРНОЇ НАВЧАЛЬНОЇ ЛАБОРАТОРІЇ ЗА ДОПОМОГОЮ ВЕБ-ТЕХНОЛОГІЙ.
- Published in:
- Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì, 2022, v. 12, n. 3, p. 243, doi. 10.15276/imms.v12.no3.243
- By:
- Publication type:
- Article
Enterprise-Ready Virtual Cloud Pools: Vision, Opportunities and Challenges†.
- Published in:
- Computer Journal, 2012, v. 55, n. 8, p. 995, doi. 10.1093/comjnl/bxs060
- By:
- Publication type:
- Article
Revisiting Information Technology Risks.
- Published in:
- CPA Journal, 2023, v. 93, n. 7/8, p. 56
- By:
- Publication type:
- Article
Cybersecurity Resources for Accounting Practices.
- Published in:
- CPA Journal, 2022, v. 92, n. 11/12, p. 76
- By:
- Publication type:
- Article