Computer configuration

Results: 1629



#Item
251Network architecture / Virtual private networks / Computer architecture / Cryptographic protocols / Internet protocols / OpenVPN / IPsec / Cisco Systems VPN Client / VoIP VPN / Computer network security / Tunneling protocols / Computing

TheGreenBow IPSec VPN Client Configuration Guide Astaro Security Gateway WebSite:

Add to Reading List

Source URL: www.thegreenbow.com

Language: English - Date: 2010-06-18 13:31:06
252Data / Network architecture / Tunneling protocols / Internet privacy / IPsec / Internet Security Association and Key Management Protocol / Virtual private network / Cryptographic protocols / Computing / Computer network security

TheGreenBow IPSec VPN Client Configuration Guide AlliedTelesis AT-AR700 Series WebSite:

Add to Reading List

Source URL: www.thegreenbow.com

Language: English - Date: 2010-02-11 09:02:10
253Dynamic Host Configuration Protocol / Internet standards / Computer data / Configuration file

IEEE C802.16cProject

Add to Reading List

Source URL: wirelessman.org

Language: English - Date: 2002-09-11 21:39:21
254Mobile technology / Dynamic Host Configuration Protocol / X Window System / Thin client / Server / IP address / Session / Session Initiation Protocol / Service delivery platform / Computing / Software / Technology

Composable Ad-hoc Mobile Services for Universal Interaction Todd D. Hodes, Randy H. Katz, Edouard Servan-Schreiber, Lawrence Rowe Computer Science Division University of California at Berkeley (hodes,randy,edss,larry)@cs

Add to Reading List

Source URL: www.sigmobile.org

Language: English - Date: 2013-08-14 12:38:30
255Graph operations / Tree decomposition / Connectivity / Path decomposition / Decomposition method / Nondeterministic algorithm / Connected component / Tree / Graph theory / Theoretical computer science / Mathematics

Tackling the Partner Units Configuration Problem∗ Markus Aschinger, Conrad Drescher, Georg Gottlob, Peter Jeavons, Evgenij Thorstensen Computing Laboratory University of Oxford

Add to Reading List

Source URL: www.cs.ox.ac.uk

Language: English - Date: 2013-06-06 21:34:43
256IP address / Transmission Control Protocol / Port / Computer network security / Dynamic Host Configuration Protocol / Email authentication / Computing / Network architecture / Internet

PDF Document

Add to Reading List

Source URL: dwn.tensionsoftware.com

Language: English - Date: 2014-04-24 10:24:21
257Pinout / 5V / Computer buses

Typical 125kHz MicroRWD (Hitag) application configuration +5v SW override Red LED

Add to Reading List

Source URL: www.ibtechnology.co.uk

Language: English - Date: 2010-03-03 13:21:15
258Critical infrastructure protection / Infrastructure / Security engineering / United States Department of Homeland Security / Configuration management / Grep / Windows Registry / Diff / Unix / Computing / System software / Software

Re-Engineering Grep and Diff for NERC CIP Gabriel A. Weaver and Sean W. Smith Rakesh B. Bobba and Edmond J. Rogers Department of Computer Science

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2012-06-21 17:59:04
259Network architecture / Cryptographic protocols / Data / Internet protocols / Virtual private networks / OpenVPN / IPsec / NAT-T / Network Extrusion / Computing / Tunneling protocols / Computer network security

TheGreenBow IPSec VPN Client Configuration Guide AboCom MH2400 Firmware v3.0 WebSite:

Add to Reading List

Source URL: www.thegreenbow.com

Language: English - Date: 2007-09-27 05:32:05
260Computer buses / Out-of-band management / Serial port / Data transmission / RS-232 / Parallel port / Flow control / D-subminiature / Software flow control / Computer hardware / Computing / OSI protocols

Porter Code Activated Switch Four or eight ports Serial or parallel Configuration menu Broadcast mode

Add to Reading List

Source URL: www.rose.com

Language: English - Date: 2014-03-03 08:39:03
UPDATE