Secure Network Communications

Results: 121



#Item
11Secure External Network Communications Previous screen Lynda L. McGhie Payoff Large organizations must be able to communicate with external suppliers, partners, and

Secure External Network Communications Previous screen Lynda L. McGhie Payoff Large organizations must be able to communicate with external suppliers, partners, and

Add to Reading List

Source URL: www.ittoday.info

Language: English - Date: 2012-10-26 11:50:03
    12The U.S. Department of Transportation (USDOT) is investing in technology that will enable vehicles to communicate with each other and with roads. Through a secure wireless communications network, vehicles will connect—

    The U.S. Department of Transportation (USDOT) is investing in technology that will enable vehicles to communicate with each other and with roads. Through a secure wireless communications network, vehicles will connect—

    Add to Reading List

    Source URL: www.its.dot.gov

    Language: English - Date: 2015-06-08 09:29:54
    13WiPort NR Embedded Ethernet Device Server Proven operating system, embedded web server complete network protocol stack 256-bit AES encryption for secure communications

    WiPort NR Embedded Ethernet Device Server Proven operating system, embedded web server complete network protocol stack 256-bit AES encryption for secure communications

    Add to Reading List

    Source URL: www.lantronix.com

    Language: English - Date: 2014-03-07 17:49:27
      141.3  F U D O is a complete solution for monitoring, recording and auditing remote server access. It supports many industry standard protocols, enables supervising and active monitoring of current

      1.3 F U D O is a complete solution for monitoring, recording and auditing remote server access. It supports many industry standard protocols, enables supervising and active monitoring of current

      Add to Reading List

      Source URL: wheelsystems.com

      Language: English - Date: 2014-02-20 19:00:23
      15Configuring VoIP for SonicOS Enhanced Document Scope This solutions document describes how to deploy and manage SonicWALL’s integrated VoIP security features to enable the secure deployment of VoIP communications in a

      Configuring VoIP for SonicOS Enhanced Document Scope This solutions document describes how to deploy and manage SonicWALL’s integrated VoIP security features to enable the secure deployment of VoIP communications in a

      Add to Reading List

      Source URL: www.voipmechanic.com

      Language: English - Date: 2013-12-19 11:40:35
      16Microsoft Word - embedded_ethernet_intro_final.doc

      Microsoft Word - embedded_ethernet_intro_final.doc

      Add to Reading List

      Source URL: www.digikey.com

      Language: English - Date: 2011-01-11 11:24:02
      17Inter-Client Exchange Library - X Consortium Standard

      Inter-Client Exchange Library - X Consortium Standard

      Add to Reading List

      Source URL: www.x.org

      Language: English - Date: 2012-06-06 02:43:17
      18Configuring VoIP for SonicOS Standard Document Scope This solutions document describes how to deploy and manage SonicWALL’s integrated VoIP security features to enable the secure deployment of VoIP communications in a

      Configuring VoIP for SonicOS Standard Document Scope This solutions document describes how to deploy and manage SonicWALL’s integrated VoIP security features to enable the secure deployment of VoIP communications in a

      Add to Reading List

      Source URL: www.voipmechanic.com

      Language: English - Date: 2013-12-19 11:40:35
      19TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks ∗ Kun Sun, Peng Ning

      TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks ∗ Kun Sun, Peng Ning

      Add to Reading List

      Source URL: discovery.csc.ncsu.edu

      Language: English - Date: 2011-11-09 13:26:02
      20Lecture 9: Using Block and Stream Ciphers for Secure Wired and WiFi Communications Lecture Notes on “Computer and Network Security” by Avi Kak () March 8, 2015 4:01pm

      Lecture 9: Using Block and Stream Ciphers for Secure Wired and WiFi Communications Lecture Notes on “Computer and Network Security” by Avi Kak () March 8, 2015 4:01pm

      Add to Reading List

      Source URL: engineering.purdue.edu

      Language: English - Date: 2015-03-08 16:07:20