Newsletter
Home > Suche
Suchergebnisse
 
1-10 von 94 Treffern
< 1 2 3 4 5 6 ... 10 >
...or damage your data or networking devices. No amount of firewall protection is going to save a server if someone steals it. Take the time to look at who has access to what, keep essential network devices under lock and key, and implement password a...
...Black Box Explains: Networking Standards • As a result of research done at Xerox Corporation in the early 1970s, Ethernet has evolved into the most widely implemented physical and Data link layer protocol today and, in 1978, the International St...
OSI Model • The OSI Model for Open Systems Interconnection. • In 1978, the International Standards Organisation (ISO) created a universal standard for exchanging information between and within networks and across geographical boundaries. This ...
...Interface (FDDI) is a networking standard developed in the early 1980s by the American National Standards Institute (ANSI) for operating at speeds up to 100 Mbps. The standard FDDI network is set up in a ring topology with two rings that transmit ...
Five key elements of effective network security. • Identity • Accurate and positive identification of network users, hosts, applications, services, and resources is a must. Kerberos, password tools, and protocols such as RADIUS and TACACS+ ena...
...not support existing networking standards. This is important if you need extra distance in your distribution application. If they do support Ethernet standards, you can extend video through networking switches to get extra-long distances, beyond ...
Wireless Network • In ad-hoc mode, wireless user devices such as laptop computers and PDAs communicate directly with each other in a peer-to-peer manner without the benefit of access points. • Ad-hoc mode is generally used to form very small s...
< 1 2 3 4 5 6 ... 10 >

 
Top Produkte