Providing of security in enterprise network based on Juniper equipment the SRX seriesThis paper describes method to improve security on systems that were originally designed as stand-alone or where security issues were ignored. It’s provides an example for configuring next-generation security features on an SRX Series device in an enterprise network
Model of migration of base stations between radio access technologies using SDR and cloud controlle...
Кузьмич, Л. В. Методичні вказівки з вищої геометрії / Л. В. Кузьмич. – Херсон : Вид-во ХДПУ, 2002. ...
This article proposes a taxonomy and a general scheme for improving approaches and methods for class...
Methods to Improve Security in Wireless Sensor Network Currently, wireless sensor networks (BSN) ar...
This article focuses on clinical cybernetics as the basis of new information technologies developmen...
Features of interaction between the controller and network devices in Software-Defined Networks usi...
A general and experimental survey of new threats security in confidential oral information due to wi...
Analysis features of construction wireless networks of standard ІЕЕЕ 802.11 The features of decision...
МЕТОД АДАПТАЦІЇ БЕЗПРОВОДОВИХ СЕНСОРНИХ МЕРЕЖ, ПОБУДОВАНИХ НА РГБ, В УМОВАХ ДЕСТРУКТИВНИХ ВПЛИВІВThe...
The paper presents the indices of susceptibility assignment of IT systems relative the violator’s ac...
Main principles of network resource management within Software-Defined Networking architecture This...
Analysis of existing algorithms of load-balancing in mobile network based on cloud infrastructure A...
Analysis and identify opportunities for the use of telemetry equipment through the study of satelli...
Саган, О. В. МЕТОДИКА НАВЧАННЯ ІНФОРМАТИКИ В ПОЧАТКОВИХ КЛАСАХ / О. В. Саган // ІНФОРМАТИКА В ШКОЛІ....
Some technologies that accelerate the development of infocommunication and formation of information...
Model of migration of base stations between radio access technologies using SDR and cloud controlle...
Кузьмич, Л. В. Методичні вказівки з вищої геометрії / Л. В. Кузьмич. – Херсон : Вид-во ХДПУ, 2002. ...
This article proposes a taxonomy and a general scheme for improving approaches and methods for class...
Methods to Improve Security in Wireless Sensor Network Currently, wireless sensor networks (BSN) ar...
This article focuses on clinical cybernetics as the basis of new information technologies developmen...
Features of interaction between the controller and network devices in Software-Defined Networks usi...
A general and experimental survey of new threats security in confidential oral information due to wi...
Analysis features of construction wireless networks of standard ІЕЕЕ 802.11 The features of decision...
МЕТОД АДАПТАЦІЇ БЕЗПРОВОДОВИХ СЕНСОРНИХ МЕРЕЖ, ПОБУДОВАНИХ НА РГБ, В УМОВАХ ДЕСТРУКТИВНИХ ВПЛИВІВThe...
The paper presents the indices of susceptibility assignment of IT systems relative the violator’s ac...
Main principles of network resource management within Software-Defined Networking architecture This...
Analysis of existing algorithms of load-balancing in mobile network based on cloud infrastructure A...
Analysis and identify opportunities for the use of telemetry equipment through the study of satelli...
Саган, О. В. МЕТОДИКА НАВЧАННЯ ІНФОРМАТИКИ В ПОЧАТКОВИХ КЛАСАХ / О. В. Саган // ІНФОРМАТИКА В ШКОЛІ....
Some technologies that accelerate the development of infocommunication and formation of information...
Model of migration of base stations between radio access technologies using SDR and cloud controlle...
Кузьмич, Л. В. Методичні вказівки з вищої геометрії / Л. В. Кузьмич. – Херсон : Вид-во ХДПУ, 2002. ...
This article proposes a taxonomy and a general scheme for improving approaches and methods for class...