Network Admission Control

Results: 37



#Item
1Chapter 1 PROVIDING QOS IN LARGE NETWORKS: STATISTICAL MULTIPLEXING AND ADMISSION CONTROL Nikolay B. Likhanov Institute for Problems of Information Transmission, Moscow, Russia

Chapter 1 PROVIDING QOS IN LARGE NETWORKS: STATISTICAL MULTIPLEXING AND ADMISSION CONTROL Nikolay B. Likhanov Institute for Problems of Information Transmission, Moscow, Russia

Add to Reading List

Source URL: ece.uwaterloo.ca

Language: English - Date: 2004-02-14 20:37:40
2Ofir Arkin, NAC (in)Security  © Ofir Arkin, 2006 Bypassing Network Access Control

Ofir Arkin, NAC (in)Security © Ofir Arkin, 2006 Bypassing Network Access Control

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:36
3ADVANCES IN QOS  Admission Control for Providing QoS in DiffServ IP Networks: The TEQUILA Approach Eleni Mykoniati and Charalampos Charalampous, National Technical University of Athens

ADVANCES IN QOS Admission Control for Providing QoS in DiffServ IP Networks: The TEQUILA Approach Eleni Mykoniati and Charalampos Charalampous, National Technical University of Athens

Add to Reading List

Source URL: www.ee.ucl.ac.uk

Language: English - Date: 2004-05-25 12:10:37
4Sentara Healthcare Improves Data Security with Access Control

Sentara Healthcare Improves Data Security with Access Control

Add to Reading List

Source URL: www.cisco.com

Language: English
5Chapter one  Introduction Chapter One Introduction

Chapter one Introduction Chapter One Introduction

Add to Reading List

Source URL: repository.sustech.edu

Language: English - Date: 2015-03-15 05:26:06
6Chapter two  Literature Review Chapter Two Literature Review

Chapter two Literature Review Chapter Two Literature Review

Add to Reading List

Source URL: repository.sustech.edu

Language: English
7Cisco IT Article Cisco IT and Identity Services Engine Cisco IT and the Identity Services Engine A multiyear deployment journey. By Greg Rasner

Cisco IT Article Cisco IT and Identity Services Engine Cisco IT and the Identity Services Engine A multiyear deployment journey. By Greg Rasner

Add to Reading List

Source URL: www.cisco.com

Language: English
8At-A-Glance  Cisco Identity-Based Firewall Security What Is the Value of Cisco Identity-Based Firewall Security? Work has evolved from a place you go to something you do. The workforce is becoming increasingly mobile, of

At-A-Glance Cisco Identity-Based Firewall Security What Is the Value of Cisco Identity-Based Firewall Security? Work has evolved from a place you go to something you do. The workforce is becoming increasingly mobile, of

Add to Reading List

Source URL: www.cisco.com

Language: English
9Network Access Control A newsletter for IT Professionals Issue 9 Education Sector Updates  I. Background of Network Access Control (NAC)

Network Access Control A newsletter for IT Professionals Issue 9 Education Sector Updates I. Background of Network Access Control (NAC)

Add to Reading List

Source URL: www.istf.jucc.edu.hk

Language: English - Date: 2011-07-10 22:02:59
10CISCO SELF-DEFENDING NETWORKS INTEGRATED SOLUTIONS TO IDENTIFY, PREVENT AND ADAPT TO SECURITY THREATS CISCO SECURITY PRODUCTS CISCO SELF-DEFENDING OVERVIEW A Cisco Self-Defending Network provides a proactive defense agai

CISCO SELF-DEFENDING NETWORKS INTEGRATED SOLUTIONS TO IDENTIFY, PREVENT AND ADAPT TO SECURITY THREATS CISCO SECURITY PRODUCTS CISCO SELF-DEFENDING OVERVIEW A Cisco Self-Defending Network provides a proactive defense agai

Add to Reading List

Source URL: www.extraxi.com

Language: English - Date: 2008-09-11 05:40:34