Secure Network Communications

Results: 121



#Item
11

Secure External Network Communications Previous screen Lynda L. McGhie Payoff Large organizations must be able to communicate with external suppliers, partners, and

Add to Reading List

Source URL: www.ittoday.info

Language: English - Date: 2012-10-26 11:50:03
    12Vehicular communication systems / Traffic flow / Traffic / Automobile safety / Automobile / Road traffic safety / Road / National Highway Traffic Safety Administration / Vehicle infrastructure integration / Transport / Land transport / Road transport

    The U.S. Department of Transportation (USDOT) is investing in technology that will enable vehicles to communicate with each other and with roads. Through a secure wireless communications network, vehicles will connect—

    Add to Reading List

    Source URL: www.its.dot.gov

    Language: English - Date: 2015-06-08 09:29:54
    13

    WiPort NR Embedded Ethernet Device Server Proven operating system, embedded web server complete network protocol stack 256-bit AES encryption for secure communications

    Add to Reading List

    Source URL: www.lantronix.com

    Language: English - Date: 2014-03-07 17:49:27
      14Remote administration software / Internet standards / Secure Shell / Virtual Network Computing / Telnet / X Window System / Communications protocol / Oracle Database / BoKS / Software / Computing / System software

      1.3 F U D O is a complete solution for monitoring, recording and auditing remote server access. It supports many industry standard protocols, enables supervising and active monitoring of current

      Add to Reading List

      Source URL: wheelsystems.com

      Language: English - Date: 2014-02-20 19:00:23
      15Broadband / VoIP phone / Session border controller / Session Initiation Protocol / Next-generation network / Skinny Call Control Protocol / Stateful firewall / Network address translation / Media Gateway Control Protocol / Voice over IP / Network architecture / Videotelephony

      Configuring VoIP for SonicOS Enhanced Document Scope This solutions document describes how to deploy and manage SonicWALL’s integrated VoIP security features to enable the secure deployment of VoIP communications in a

      Add to Reading List

      Source URL: www.voipmechanic.com

      Language: English - Date: 2013-12-19 11:40:35
      16Network architecture / Internet protocol suite / Telnet / Port / Transmission Control Protocol / Application layer / Communications protocol / Secure Shell / NicheStack TCP/IPv4 / Computing / Data / Internet protocols

      Microsoft Word - embedded_ethernet_intro_final.doc

      Add to Reading List

      Source URL: www.digikey.com

      Language: English - Date: 2011-01-11 11:24:02
      17Internet protocols / Internet standards / Communications protocol / Data transmission / Protocols / Computer network security / SOCKS / Secure Shell / Data / Computing / Information

      Inter-Client Exchange Library - X Consortium Standard

      Add to Reading List

      Source URL: www.x.org

      Language: English - Date: 2012-06-06 02:43:17
      18VoIP phone / Session border controller / Session Initiation Protocol / Skinny Call Control Protocol / Next-generation network / Stateful firewall / Network address translation / Media Gateway Control Protocol / Quality of service / Voice over IP / Videotelephony / Broadband

      Configuring VoIP for SonicOS Standard Document Scope This solutions document describes how to deploy and manage SonicWALL’s integrated VoIP security features to enable the secure deployment of VoIP communications in a

      Add to Reading List

      Source URL: www.voipmechanic.com

      Language: English - Date: 2013-12-19 11:40:35
      19IEEE 802 / Wireless sensor network / Synchronization / Clocks / Clock synchronization / Sensor node / IEEE 802.15.4 / Communications protocol / Message authentication code / Technology / Computing / Telecommunications engineering

      TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks ∗ Kun Sun, Peng Ning

      Add to Reading List

      Source URL: discovery.csc.ncsu.edu

      Language: English - Date: 2011-11-09 13:26:02
      20Ciphertext / Triple DES / Advanced Encryption Standard / Cipher / Stream cipher / RC4 / Meet-in-the-middle attack / Block size / ICE / Cryptography / Data Encryption Standard / Block cipher

      Lecture 9: Using Block and Stream Ciphers for Secure Wired and WiFi Communications Lecture Notes on “Computer and Network Security” by Avi Kak () March 8, 2015 4:01pm

      Add to Reading List

      Source URL: engineering.purdue.edu

      Language: English - Date: 2015-03-08 16:07:20
      UPDATE