[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Skip header Section
Virtual private networksMarch 1998
Publisher:
  • O'Reilly & Associates, Inc.
  • 103A Morris St. Sebastopol, CA
  • United States
ISBN:978-1-56592-319-5
Published:01 March 1998
Pages:
180
Skip Bibliometrics Section
Reflects downloads up to 31 Dec 2024Bibliometrics
Abstract

No abstract available.

Cited By

  1. Nakhila O, Amjad M, Dondyk E and Zou C (2018). Gateway independent user-side wi-fi Evil Twin Attack detection using virtual wireless clients, Computers and Security, 74:C, (41-54), Online publication date: 1-May-2018.
  2. Liu X and Trappe W (2016). Overlay tunneling as a policy tool for defending mobile ad hoc networks, Security and Communication Networks, 9:17, (4482-4494), Online publication date: 25-Nov-2016.
  3. Quynh N and Takefuji Y A central and secured logging data solution for Xen virtual machine Proceedings of the 24th IASTED international conference on Parallel and distributed computing and networks, (218-224)
  4. Kim D, Jung Y and Chung T (2005). PRISM, The Journal of Supercomputing, 33:1, (103-121), Online publication date: 1-Jul-2005.
  5. Kamara S, Davis D, Ballard L, Caudy R and Monrose F An Extensible Platform for Evaluating Security Protocols Proceedings of the 38th annual Symposium on Simulation, (204-213)
  6. ACM
    Shaikh S Information security education in the UK Proceedings of the 1st annual conference on Information security curriculum development, (53-58)
  7. Steinder M and Sethi A (2004). Probabilistic fault diagnosis in communication systems through incremental hypothesis updating, Computer Networks: The International Journal of Computer and Telecommunications Networking, 45:4, (537-562), Online publication date: 15-Jul-2004.
  8. ACM
    Gupta A, Kleinberg J, Kumar A, Rastogi R and Yener B Provisioning a virtual private network Proceedings of the thirty-third annual ACM symposium on Theory of computing, (389-398)
  9. Prevelakis V A secure station for network monitoring and control Proceedings of the 8th conference on USENIX Security Symposium - Volume 8, (10-10)
  10. ACM
    Sirer E, Grimm R, Gregory A and Bershad B (1999). Design and implementation of a distributed virtual machine for networked computers, ACM SIGOPS Operating Systems Review, 33:5, (202-216), Online publication date: 12-Dec-1999.
  11. ACM
    Sirer E, Grimm R, Gregory A and Bershad B Design and implementation of a distributed virtual machine for networked computers Proceedings of the seventeenth ACM symposium on Operating systems principles, (202-216)
Contributors
Please enable JavaScript to view thecomments powered by Disqus.

Recommendations