ARTÍCULO
TITULO

SECURE REMOTE ACCESS FROM OFFICE TO HOME

Kara    
A.    

Resumen

No disponible

 Artículos similares

       
 
Ahmed Bahaa, Ahmed Abdelaziz, Abdalla Sayed, Laila Elfangary and Hanan Fahmy    
In many enterprises and the private sector, the Internet of Things (IoT) has spread globally. The growing number of different devices connected to the IoT and their various protocols have contributed to the increasing number of attacks, such as denial-of... ver más
Revista: Information

 
Pavel Smirnov,Stanislav Smyshlyaev     Pág. 77 - 84
The task of providing security to remote digital signature systems (?cloud? signature) for cases of end user running client-side components on devices without potential of ensuring trusted environment (most common examples of such devices are smartphones... ver más

 
Nicolas Guillou, Jean-Frédéric Charpentier and Mohamed Benbouzid    
Refined assessments of the available tidal stream energy resource are required to optimize turbines design and guarantee successful implementations and operations of devices in the marine environment. Investigations primary focused on identifying areas w... ver más

 
Yu-Jie (Jessica) Kuo and Jiann-Cherng Shieh    
The advent and rapid rise of network technology and cloud computing have led to new opportunities for ushering in a new era in telehealth. Thanks to the Internet of Things (IoT) and advances in 5G communication, telehealth is expanding and shows no signs... ver más
Revista: Applied Sciences

 
Adnan Mohsin Abdulazeez,Baraa Wasfi Salim,Diyar Qader Zeebaree,Dana Doghramachi     Pág. pp. 157 - 177
The key point of this paper is to assess and look over the top of the line network layer-based VPN (Virtual Private Network) protocols because data link layer is hardly ever found to be in use in organizations, the reason is because of its exceedingly hi... ver más