Angebote zu "Authentication" (11 Treffer)

Kategorien

Shops

Nomenclatura - Encyclopedia of modern Cryptogra...
12,49 € *
ggf. zzgl. Versand

This "Encyclopedia of modern Cryptography and Internet Security" brings the latest and most relevant coverage of the topic - expanding a lot of relevant terms and central key words: It's a Nomenclatura! # Fundamental information on modern Cryptography and Internet Security in a broadband overview. # Extensive resource with most relevant explanations of keywords and terms. # Introduction article by editing authors on "Transformation of Cryptography". # Effective handbook for students, tutors and researching professionals in many fields and lecturing and developing experts of all levels to deepen the existing knowledge of the "nomenclatura" of these topics from Information Theory, Applied Mathematics, Technological Impact Assessment, for sure Linguistic, and Computational Methods of Engineering, Programming etc.. # Including the didactic game for teaching: "Cryptographic Cafeteria". # With bibliographic references to start further readings. # Appearing in an A-Z format, Nomenclatura - The Encyclopedia of modern Cryptography and Internet Security provides easy, intuitive access to scientific information on all relevant aspects of Cryptography, Encryption and Information and Internet Security. This modern Encyclopedia is broad in scope, covering everything from AutoCrypt and Exponential Encryption to Zero-Knowledge-Proof Keys including explanations on Authentication, Block Ciphers and Stream Ciphers, Cryptanalysis and Security, Cryptographic Calling and Cryptographic Discovery, Cryptographic Protocols like e.g. the Echo-Protocol, Elliptic Curve Cryptography, Fiasco Forwarding, Goldbugs, Hash Functions and MACs, Juggling Juggernauts and Juggerknot Keys, McEliece, Multi-Encryption, NTRU, OTM, Public Key Cryptography, Patch-Points, POPTASTIC, Quantum Computing Cryptography, Secret Streams, Turtle Hopping, Two-Way-Calling and many more... This introducing and cross-linking reference has been published in two popular formats: print and as eBook. The printed book edition has been created very affordable, so that each interested Reader, Researcher, Student and Tutor - and Library - is able to get this book with an investment comparable to a lunch meal to democratize easy-accessible and readable knowledge in one spot for Cryptography, Encryption and Internet Security.

Anbieter: buecher
Stand: 25.10.2020
Zum Angebot
Nomenclatura - Encyclopedia of modern Cryptogra...
12,90 € *
ggf. zzgl. Versand

This "Encyclopedia of modern Cryptography and Internet Security" brings the latest and most relevant coverage of the topic - expanding a lot of relevant terms and central key words: It's a Nomenclatura! # Fundamental information on modern Cryptography and Internet Security in a broadband overview. # Extensive resource with most relevant explanations of keywords and terms. # Introduction article by editing authors on "Transformation of Cryptography". # Effective handbook for students, tutors and researching professionals in many fields and lecturing and developing experts of all levels to deepen the existing knowledge of the "nomenclatura" of these topics from Information Theory, Applied Mathematics, Technological Impact Assessment, for sure Linguistic, and Computational Methods of Engineering, Programming etc.. # Including the didactic game for teaching: "Cryptographic Cafeteria". # With bibliographic references to start further readings. # Appearing in an A-Z format, Nomenclatura - The Encyclopedia of modern Cryptography and Internet Security provides easy, intuitive access to scientific information on all relevant aspects of Cryptography, Encryption and Information and Internet Security. This modern Encyclopedia is broad in scope, covering everything from AutoCrypt and Exponential Encryption to Zero-Knowledge-Proof Keys including explanations on Authentication, Block Ciphers and Stream Ciphers, Cryptanalysis and Security, Cryptographic Calling and Cryptographic Discovery, Cryptographic Protocols like e.g. the Echo-Protocol, Elliptic Curve Cryptography, Fiasco Forwarding, Goldbugs, Hash Functions and MACs, Juggling Juggernauts and Juggerknot Keys, McEliece, Multi-Encryption, NTRU, OTM, Public Key Cryptography, Patch-Points, POPTASTIC, Quantum Computing Cryptography, Secret Streams, Turtle Hopping, Two-Way-Calling and many more... This introducing and cross-linking reference has been published in two popular formats: print and as eBook. The printed book edition has been created very affordable, so that each interested Reader, Researcher, Student and Tutor - and Library - is able to get this book with an investment comparable to a lunch meal to democratize easy-accessible and readable knowledge in one spot for Cryptography, Encryption and Internet Security.

Anbieter: buecher
Stand: 25.10.2020
Zum Angebot
TP-LINK TL-WR 841 N 300M Wireless N-Router
23,99 € *
ggf. zzgl. Versand

Der TL-WR841N Wireless Router ist ein kombiniertes Kabel/Kabelloses Netzwerkgerät, speziell hergestellt für Small Business, Office und Home Office Bedürfnisse. Er erfüllt den IEEE 802.11n Standard mit kabellosen Verbindungsgeschwindigkeiten von bis zu 300M. Der Router verwendet die 2*2 MIMO Technologie und besitzt zwei externe Antennen die bessere Wireless Performance, Übertragungsragen, Stabilität und Reichweite anbieten. Zur selben Zeit vermeidet die CCA Technologie automatisch Kanalkonflikte, indem dessen Kanalauswahlfähigkeit verwendet wird. Ebenfalls läuft das Gerät mit anderen 11g und 11n Drahtlosprodukten. Der TL-WR841ND unterstützt multiple Sicherheitsmaßnahmen. Er bietet SSID Broadcast Kontrolle, MAC Adressen Zugangskontrolle, WEP Verschlüsselung, WPA/WPA2 und WPA-PSK/WPA2-PSK Authentifizierung. Zur selben Zeit sorgt QSS (Quick Secure Setup) - entspricht WPS - für eine sorgenfreie Wireless Sicherheitskonfiguration. Diese kombinierten Sicherheitsmaßnahmen werden sie vor Eindringlingen schützen. Der TL-WR841ND erlaubt es Firmen, Büros und Heimanwender mit mehreren Computern eine einzige Internetverbindung zu nutzen. Abseits von seinem simplen Setup und seinen geläufigeren Router Funktionen, unterstützt er ebenfalls Priority of Service. Applikationen die eine hohe Bandbreite benötigen und anfällig für Unterbrechungen sind - so wie z.B. Videos - wird Priorität gegeben um die Qualität zu sichern. Der Router unterstützt ebenfalls On-Demand-Einwahl, Online Access Management, automatische Virus Isolation, UPnP, DDNS, Advanced System Security Record. Ein benutzerfreundliches User Interface und einfache Konfiguration erlaubt es allen Benutzern den Router komfortabel zu konfigurieren. Dies ist ein modernes Produkt mit super Performance und sollte Ihre erste Wahl sein wenn Sie ein Netzwerk aufbauen. Unterstützt 802.11n(draft 2.0), 802.11g/b, 802.3/3u 1 WAN Port, 4 10/100M LAN Ports 2 abnehmbare Omni-Directional Antennen Unterstützt PPPoE, Dynamic IP und Static IP Broadband Funktionen Automatische Einwahl, On-demand Einwahl, Einwahl zu einer festen Zeit Unterstützt UPnP, DDNS, Static Routing, VPN Pass-through Unterstützt Virtual Server, Special Application und DMZ Host Unterstützt SSID Broadcast Kontrolle und MAC Access Control List Unterstützt 64/128/152-bit WEP, erfüllt 128 bit WPA Standard(TKIP/AES), Unterstützt MIC, IV Expansion, Shared Key Authentication, IEEE 802.1X Integrierte Firewall - IP, MAC, URL Filterung mit flexiblen Kontrollen für Online Zugang und Zeit Integrierter DHCP Server mit automatischer Dynamic IP Adress Verteilung User Interface unterstützt freie WEB Software Updates Unterstützt das Sichern und Wiederherstellen von Konfigurationsfiles Geschmeidige Außenhülle, kann an einer Wand befestigt werden oder horizontal auf einem Tisch platziert werden Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.

Anbieter: buecher
Stand: 25.10.2020
Zum Angebot
TP-LINK TL-WR 841 N 300M Wireless N-Router
23,99 € *
ggf. zzgl. Versand

Der TL-WR841N Wireless Router ist ein kombiniertes Kabel/Kabelloses Netzwerkgerät, speziell hergestellt für Small Business, Office und Home Office Bedürfnisse. Er erfüllt den IEEE 802.11n Standard mit kabellosen Verbindungsgeschwindigkeiten von bis zu 300M. Der Router verwendet die 2*2 MIMO Technologie und besitzt zwei externe Antennen die bessere Wireless Performance, Übertragungsragen, Stabilität und Reichweite anbieten. Zur selben Zeit vermeidet die CCA Technologie automatisch Kanalkonflikte, indem dessen Kanalauswahlfähigkeit verwendet wird. Ebenfalls läuft das Gerät mit anderen 11g und 11n Drahtlosprodukten. Der TL-WR841ND unterstützt multiple Sicherheitsmaßnahmen. Er bietet SSID Broadcast Kontrolle, MAC Adressen Zugangskontrolle, WEP Verschlüsselung, WPA/WPA2 und WPA-PSK/WPA2-PSK Authentifizierung. Zur selben Zeit sorgt QSS (Quick Secure Setup) - entspricht WPS - für eine sorgenfreie Wireless Sicherheitskonfiguration. Diese kombinierten Sicherheitsmaßnahmen werden sie vor Eindringlingen schützen. Der TL-WR841ND erlaubt es Firmen, Büros und Heimanwender mit mehreren Computern eine einzige Internetverbindung zu nutzen. Abseits von seinem simplen Setup und seinen geläufigeren Router Funktionen, unterstützt er ebenfalls Priority of Service. Applikationen die eine hohe Bandbreite benötigen und anfällig für Unterbrechungen sind - so wie z.B. Videos - wird Priorität gegeben um die Qualität zu sichern. Der Router unterstützt ebenfalls On-Demand-Einwahl, Online Access Management, automatische Virus Isolation, UPnP, DDNS, Advanced System Security Record. Ein benutzerfreundliches User Interface und einfache Konfiguration erlaubt es allen Benutzern den Router komfortabel zu konfigurieren. Dies ist ein modernes Produkt mit super Performance und sollte Ihre erste Wahl sein wenn Sie ein Netzwerk aufbauen. Unterstützt 802.11n(draft 2.0), 802.11g/b, 802.3/3u 1 WAN Port, 4 10/100M LAN Ports 2 abnehmbare Omni-Directional Antennen Unterstützt PPPoE, Dynamic IP und Static IP Broadband Funktionen Automatische Einwahl, On-demand Einwahl, Einwahl zu einer festen Zeit Unterstützt UPnP, DDNS, Static Routing, VPN Pass-through Unterstützt Virtual Server, Special Application und DMZ Host Unterstützt SSID Broadcast Kontrolle und MAC Access Control List Unterstützt 64/128/152-bit WEP, erfüllt 128 bit WPA Standard(TKIP/AES), Unterstützt MIC, IV Expansion, Shared Key Authentication, IEEE 802.1X Integrierte Firewall - IP, MAC, URL Filterung mit flexiblen Kontrollen für Online Zugang und Zeit Integrierter DHCP Server mit automatischer Dynamic IP Adress Verteilung User Interface unterstützt freie WEB Software Updates Unterstützt das Sichern und Wiederherstellen von Konfigurationsfiles Geschmeidige Außenhülle, kann an einer Wand befestigt werden oder horizontal auf einem Tisch platziert werden Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.

Anbieter: buecher
Stand: 25.10.2020
Zum Angebot
Subscriber Identity Module
29,00 € *
ggf. zzgl. Versand

Please note that the content of this book primarily consists of articles available from Wikipedia or other free sources online.A subscriber identity module (SIM) on a removable SIM card securely stores the service-subscriber key (IMSI) used to identify a subscriber on mobile telephony devices (such as computers and mobile phones). The SIM card allows users to change phones by simply removing the SIM card from one mobile phone and inserting it into another mobile phone or broadband telephony device. A SIM card contains its unique serial number, international unique number of the mobile user (IMSI), security authentication and ciphering information, temporary information related to the local network (also temporary local id that has been issued to the user), a list of the services the user has access to and two passwords (PIN for usual use and PUK for unlocking).

Anbieter: Dodax
Stand: 25.10.2020
Zum Angebot
WiMax Security
49,90 € *
ggf. zzgl. Versand

Since the first publication of the IEEE 802.16 standard, many security mechanisms and concepts have been changed. Nowadays mobile WiMAX provides high-speed broadband access for mobile users, combined with a high security. WiMAX will be used to establish broadband wireless access in areas where DSL is not yet available. Without physical boundaries, a wireless network faces many more security threats than a wired network does. Therefore, in the IEEE 802.16 standard a security sublayer is specified in the MAC layer to address the privacy issues across the fixed Broadband Wireless Access (BWA). Several articles have been published to address the flaws in IEEE 802.16 security after the IEEE standard 802.16-2001 was released. However, the IEEE standard 802.16-2004 revision does not settle all the discovered problems and additional flaws remain. This book gives an overview of the IEEE 802.16 standard, focusing on the MAC layer and especially the security sublayer. We analyze the security flaws in the standard as well as in related works, and illustrate possible attacks to the authentication and key management protocols. Possible solutions are also proposed to prevent these attacks.

Anbieter: Dodax
Stand: 25.10.2020
Zum Angebot
Nomenclatura
478,99 € *
ggf. zzgl. Versand

This "Encyclopedia of modern Cryptography and Internet Security" brings the latest and most relevant coverage of the topic - expanding a lot of relevant terms and central key words: It's a Nomenclatura! # Fundamental information on modern Cryptography and Internet Security in a broadband overview.# Extensive resource with most relevant explanations of keywords and terms.# Introduction article by editing authors on "Transformation of Cryptography".# Effective handbook for students, tutors and researching professionals in many fields and lecturing and developing experts of all levels to deepen the existing knowledge of the "nomenclatura" of these topics from Information Theory, Applied Mathematics, Technological Impact Assessment, for sure Linguistic, and Computational Methods of Engineering, Programming etc.. # Including the didactic game for teaching: "Cryptographic Cafeteria".# With bibliographic references to start further readings.# Appearing in an A-Z format, Nomenclatura - The Encyclopedia of modern Cryptography and Internet Security provides easy, intuitive access to scientific information on all relevant aspects of Cryptography, Encryption and Information and Internet Security.This modern Encyclopedia is broad in scope, covering everything from AutoCrypt and Exponential Encryption to Zero-Knowledge-Proof Keys including explanations on Authentication, Block Ciphers and Stream Ciphers, Cryptanalysis and Security, Cryptographic Calling and Cryptographic Discovery, Cryptographic Protocols like e.g. the Echo-Protocol, Elliptic Curve Cryptography, Fiasco Forwarding, Goldbugs, Hash Functions and MACs, Juggling Juggernauts and Juggerknot Keys, McEliece, Multi-Encryption, NTRU, OTM, Public Key Cryptography, Patch-Points, POPTASTIC, Quantum Computing Cryptography, Secret Streams, Turtle Hopping, Two-Way-Calling and many more...This introducing and cross-linking reference has been published in two popular formats: print and as eBook. The printed book has been created very affordable within the paperback edition, so that each interested Reader, Researcher, Student and Tutor - and Library - is able to get this book with an investment comparable to a lunch meal to democratize easy-accessible and readable knowledge in one spot for Cryptography, Encryption and Internet Security.

Anbieter: Dodax
Stand: 25.10.2020
Zum Angebot
Security in Fiber-Wireless (FiWi) Broadband Acc...
59,00 € *
ggf. zzgl. Versand

The emergence of quad-play services (i.e., voice, video, data, and mobility) leads to a stronger integration of optical and wireless networks. The resultant bimodal fiber-wireless (FiWi) access networks aim at providing wired and wireless services over the same infrastructure simultaneously, thus potentially leading to major cost savings. Ethernet passive optical network (EPON) is a promising technology to increase the per-user bit rate for bandwidth hungry-applications in fiber-to- the-home (FTTH) networks. Similarly, next-generation WLAN supports users with mobility in wireless networks. Until now, however, security has been mostly discussed separately either in wireless or optical networks. No profound research activity has been conducted on security in integrated FiWi networks so far. To our knowledge, this is the first research work on security in emerging hybrid FiWi broadband access networks. This book focuses on security issues like mutual authentication, data confidentiality, integrity, and access control in hybrid FiWi broadband access networks. Toward this end, a security policy based on IPSec is developed by adapting extensible authentication protocol (EAP).

Anbieter: Dodax
Stand: 25.10.2020
Zum Angebot
Draytek Vigor2760n-B WLAN-Router Gigabit Ethern...
126,46 € *
ggf. zzgl. Versand

- VDSL2 and ADSL2+ fall-back- 4-port Gigabit LAN switch- IPv6 & IPv4 Support- Comprehensive Firewall/Security and Robust VPN- Bandwidth Management with 4-level priority Outbound QoS- IEEE 802.11n (n model) Access Point with WMM (WiFi multimedia)- Multi-Task USB port: for printer, 3.5G/4G backup, NAS facilityThe Vigor2760 series VDSL2/ADSL2+ routers are designed for VDSL2 broadband network and can also support ADSL2/2+ fixed line. There are three models: Vigor2760, Vigor2760n (with IEEE 802.11n WLAN), and Vigor2760Vn (with VoIP and IEEE 802.11n WLAN, coming soon). With future IPv6 support for future network and higher-speed WAN throughput, the high-definition multi-media streaming is available for home entertainment and digital learning. The embedded VPN connections can allow family members to utilize ultimate broadband performance to realize home office. The MAC access control, multiple-SSID, authentication management on WLAN creates much secure wireless network. The users of your connected PCs can use Web Portal Log-in and Bulletin Board to remind each other. The content security management (CSM) prevents your family or home office from unwanted web sites/access.

Anbieter: Dodax
Stand: 25.10.2020
Zum Angebot