Computer networking device

Results: 175



#Item
11Mobile computers / Wireless networking / Information appliances / Bluetooth / Wireless / Wi-Fi / Medical device / IHealth / Computer security / Personal digital assistant

Adrasteia: A Smartphone App for Securing Legacy Mobile Medical Devices Vahab Pournaghshband David Meyer

Add to Reading List

Source URL: lasr.cs.ucla.edu

Language: English - Date: 2014-11-18 00:47:59
12Network architecture / Computer networking / Emerging technologies / Ethernet / Data Plane Development Kit / Software-defined networking / Network function virtualization / OpenFlow / Field-programmable gate array / Open vSwitch / Packet processing / Multi-core processor

Lagopus FPGA - a reprogrammable data plane for high-performance software SDN switches K. Yamazaki*, Y. Nakajima†, T. Hatano* and A. Miyazaki* *NTT Device Innovation Center, NTT Corporation, †NTT Network Innovation La

Add to Reading List

Source URL: www.hotchips.org

Language: English - Date: 2015-08-21 02:18:29
13Computer network security / Wireless networking / Local area networks / Wi-Fi / IEEE 802.11 / Wi-Fi Protected Access / Protected Extensible Authentication Protocol / Wireless security / Comparison of wireless LAN clients

Connecting to the Rovernet WPA2 Secured Wireless Network with Windows 7 Configuring your wireless device to use WPA2 takes a few minutes. You will, however, need to meet the following system requirements in order to conn

Add to Reading List

Source URL: www.it.mtu.edu

Language: English - Date: 2015-09-21 08:47:24
14Computer architecture / Computing / Computer network security / Microsoft Windows / Wireless networking / IEEE 802.11 / Cryptographic protocols / Wi-Fi Protected Access / Wi-Fi / Control Panel / Windows Vista / Wireless security

Connecting to the Rovernet WPA2 Secured Wireless Network with Windows Vista Configuring your wireless device to use WPA2 takes a few minutes. You will, however, need to meet the following system requirements in order to

Add to Reading List

Source URL: www.it.mtu.edu

Language: English - Date: 2015-09-21 08:47:24
15Computer network security / Computing / Cryptographic protocols / Wi-Fi / IEEE 802.11 / Wireless networking / Wi-Fi Protected Access / IEEE 802.1X / IEEE 802.11i-2004 / AirPort / Wireless security

Connecting to the Rovernet WPA2 Secured Wireless Network with the Mac OS XLeopard) Configuring your wireless device to use WPA2 takes a few minutes. You will, however, need to meet the following system requirement

Add to Reading List

Source URL: www.it.mtu.edu

Language: English - Date: 2015-09-21 08:47:24
16Wireless networking / Computing / IEEE 802.11 / Wireless / Computer network security / Wi-Fi / Local area networks / Technology / Wi-Fi Protected Access / Password / Wireless access point / Wireless network

Connecting to the Rovernet WPA2 Secured Wireless Network with the Windows Mobile 6 Configuring your wireless device to use WPA2 takes a few minutes. You will, however, need to meet the following system requirements in or

Add to Reading List

Source URL: www.it.mtu.edu

Language: English - Date: 2015-09-21 08:47:24
17Computing / Wireless networking / IEEE 802.11 / Wireless / Wi-Fi / Computer network security / Technology / Local area networks / Wi-Fi Protected Access / Wireless access point / Password / Wireless security

Connecting to the Rovernet WPA2 Secured Wireless Network with the Droid (Android 2.x OS) Configuring your wireless device to use WPA2 takes a few minutes. You will, however, need to meet the following system requirements

Add to Reading List

Source URL: www.it.mtu.edu

Language: English - Date: 2015-09-21 08:47:24
18Cryptography / Computer network security / Wireless networking / Local area networks / Cryptographic protocols / IEEE 802.11 / Wi-Fi Protected Access / Wireless security / GlobalSign / Root certificate / Cracking of wireless networks

Connecting to the Rovernet WPA2 Secured Wireless Network with UbuntuHardy Heron) Configuring your wireless device to use WPA2 takes a few minutes. You will, however, need to meet the following system requirements

Add to Reading List

Source URL: www.it.mtu.edu

Language: English - Date: 2015-09-21 08:47:24
19Computing / Wireless networking / IEEE 802.11 / Wireless / Local area networks / Wi-Fi / Technology / Computer network security / IPhone / Wireless security / Network cloaking

Connecting to the Rovernet WPA2 Secured Wireless Network with the iPhone Configuring your wireless device to use WPA2 takes a few minutes. You will, however, need to meet the following system requirements in order to con

Add to Reading List

Source URL: www.it.mtu.edu

Language: English - Date: 2015-09-21 08:47:24
20IEEE 802.11 / Wireless networking / Wi-Fi / Local area networks / Computer network security / IPod / Wireless security / Network cloaking

Connecting to the Rovernet WPA2 Secured Wireless Network with the iPod Touch Configuring your wireless device to use WPA2 takes a few minutes. You will, however, need to meet the following system requirements in order to

Add to Reading List

Source URL: www.it.mtu.edu

Language: English - Date: 2015-09-21 08:47:24
UPDATE