Searched for: "securing wireless networks internally"
- Networking (89)
- Security (65)
- Mobility (44)
- Hardware (20)
- Microsoft (14)
- Banking (12)
- Cxo (12)
- Data Centers (11)
- Software (11)
- Collaboration (9)
- Open Source (8)
- Enterprise Software (6)
- After Hours (5)
- Apple (3)
- Consumerization (3)
- Developer (3)
- Storage (3)
- Android (2)
- Cloud (2)
- Google (2)
- Project Management (2)
- Social Enterprise (2)
- Asean (1)
- Data Management (1)
- Tech & Work (1)
About 331 results for "securing wireless networks internally"
Thync is a revolutionary new wearable which provides the capability to control user mood and motivation. Find out what it does and how it works.
TCP is a reliable transport protocol designed to perform well in wired networks where packet losses are due congestion. However in wireless ad hoc networks, where packet losses are...
Bring your own network (BYON) is what you get when you don't handle BYOD properly, says SysAid's Sarah Lahav. To secure your data, embrace BYOD and provide wireless access and supp...
Denial-of-Service Attacks on 6LoWPAN-RPL Networks: Threats and An Intrusion Detection System Proposition
RPL (Routing Protocol for Low-power and lossy networks) is a specific routing protocol designed to optimize 6LoWPAN (IPv6 over Low power Wireless Personal Area Network) operation. ...
Jesus Vigo compares the different features of the iPhone 6, iPhone 6 Plus, and iPhone 5S to find which one is right for you.
Learn about a smartphone charging cable intended to back up your smartphone data privately and securely.
Jack Wallen shows you how to easily share files between an LG G Pad and a desktop/laptop with wireless sharing.
PAuthKey: A Pervasive Authentication Protocol and Key Establishment Scheme for Wireless Sensor Networks in Distributed IoT Applications
Wireless Sensor Networks (WSNs) deployed in distributed Internet of Things (IoT) applications should be integrated into the Internet. According to the distributed architecture, sen...
Secured Solution and Detection Against Black Hole Attack in MANET by Finding the Optimum Path in AODV Protocol and High Secured Data Transmission using Steganography
The mobile ad-hoc network is an autonomous system of mobile nodes, a kind of a wireless network where the mobile nodes dynamically form a network to exchange information without ut...
Recently secure access to the private sources is considered as of the essential needs. Thus, one of the most efficient and cost-effective ways for granting secure access needs from...