Find link

language:

jump to random article

Find link is a tool written by Edward Betts.

searching for Network access control 19 found (51 total)

alternate case: network access control

IEEE 802.1 (1,283 words) [view diff] case mismatch in snippet view article find links to article

ieee802.org. "802.1X: Port-Based Network Access Control". 1.ieee802.org. "802.1Xbx-2014: Port-Based Network Access Control–MKA Extensions". 1.ieee802.org
Check Point Integrity (341 words) [view diff] exact match in snippet view article find links to article
ZoneAlarm security technology and added central policy management and network access control functions. Integrity was integrated with network gateways (the Cisco
TACACS (1,232 words) [view diff] exact match in snippet view article find links to article
protocols handling remote authentication and related services for network access control through a centralized server. The original TACACS protocol, which
Wake-on-LAN (4,307 words) [view diff] exact match in snippet view article find links to article
Wake-on-LAN technology on enterprise networks can sometimes conflict with network access control solutions such as 802.1X MAC-based authentication, which may prevent
Symantec Endpoint Protection (1,262 words) [view diff] case mismatch in snippet view article find links to article
including Symantec Antivirus Corporate Edition 10.0, Client Security, Network Access Control, and Sygate Enterprise Edition. Endpoint Protection also included
MULTOS (705 words) [view diff] exact match in snippet view article find links to article
signature, ePassport with biometrics, health care and military base and network access control. A MULTOS implementation provides an operating system upon which
Elena Ferrari (686 words) [view diff] exact match in snippet view article find links to article
(2019) for her work "A semantic web based framework for social network access control" (2009) IEEE Computer Society Technical Achievement Award (2009)
Index of Internet-related articles (1,103 words) [view diff] no match in snippet view article find links to article
D E F G H I J K L M N O P Q R S T U V W X Y Z AARNet - Abilene Network - Access control list - Ad hoc network - Address resolution protocol - ADSL - AirPort
Virtual access layer (433 words) [view diff] exact match in snippet view article find links to article
that network administrators can provide consistent enforcement of network access control and security policies—and integrate them with configuration templates
Amazon Virtual Private Cloud (918 words) [view diff] exact match in snippet view article find links to article
firewall to control traffic at the instance level, while it also uses network access control lists as a firewall to control traffic at the subnet level. As another
NordLayer (1,724 words) [view diff] exact match in snippet view article find links to article
to NordLayer. The transition marked the introduction of advanced network access control capabilities, positioning NordLayer as part of the broader secure
RSBAC (706 words) [view diff] exact match in snippet view article find links to article
supports more object types, includes generic list management and network access control, contains several additional security models, and supports runtime
Network Policy Server (241 words) [view diff] exact match in snippet view article find links to article
single sign-on solution. The same set of credentials is used for network access control (authenticating and authorizing access to a network) and to log
HPE Networking training (507 words) [view diff] case mismatch in snippet view article find links to article
Network Management certification. The following must then be passed: Network Access Control [19] Network Immunity [20] To achieve the MASE Convergence Specialist
HID Global (1,534 words) [view diff] exact match in snippet view article find links to article
of Brasil, Employers Mutual Casualty Company HID Global provides network access control to the China Pacific Insurance Co. and Jinwan District People's
CloudPassage (905 words) [view diff] exact match in snippet view article find links to article
also administering firewall automation, vulnerability monitoring, network access control, security event alerting, and assessment. The Halo platform also
Wireless ad hoc network (6,496 words) [view diff] exact match in snippet view article find links to article
and fairness. Most wireless ad hoc networks do not implement any network access control, leaving these networks vulnerable to resource consumption attacks
YANG (2,810 words) [view diff] case mismatch in snippet view article find links to article
Model for Dual-Stack Lite (DS-Lite) RFC 8519: YANG Data Model for Network Access Control Lists (ACLs) RFC 8520: Manufacturer Usage Description Specification
List of ISO standards 8000–9999 (9,553 words) [view diff] exact match in snippet view article find links to article
bridged networks ISO/IEC/IEEE 8802-1X:2013 Part 1X: Port-based network access control ISO/IEC/IEEE 8802-1AB:2017 Part 1AB: Station and media access control