Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
The Coronado Historic Site Visitors Center (1940) happened, really, at the peak of John Gaw Meem's career - in the heart of the Great Depression. He was director of the Historic American Building Survey, completing documentations of... more
    • by 
    •   9  
      ArchaeologyArchitectureNew Deal (U.S. history)New Mexico History
Wireless technology has been increasingly popular for some year. Acceptance of wireless network depend on the case of use and level of security. Now day the most of wireless network hold over sensitive information and given access only... more
    • by 
    •   6  
      Wireless CommunicationsEncryptionWPADecryption
Atualmente é difícil encontrar um lugar que não ofereça acesso à internet, seja residencial, comercial ou espaço público, visando a mobilidade muitos destes pontos de acesso são sem fio o que os torna vulneráveis a ataques visando a... more
    • by 
    •   6  
      WirelessWPASegurançaWep
This report is the result of a cultural resources survey conducted for the Land Trust of North Alabama of their Bloucher Ford Preserve. The Preserve was the former location of a grist and saw mill that became the industrial, commercial,... more
    • by 
    •   7  
      Historical ArchaeologyRural community and cultureHistory of MillsWPA
    • by 
    •   11  
      PrivacyWireless securityWireless networksData Privacy
The wireless networks are more vulnerable than wired networks because the data is transmitted through the broadcast radio technology, instead of a dedicated cable. Although there are some advantages by using the wireless networks, like... more
    • by 
    •   6  
      Information SecurityComputer NetworksComputer SecurityCase Study
There are some demonstrable reasons for customers who like use from wireless technology and this is clear because there are various benefits for using wireless technology. The contrast between wireless usage and security techniques... more
    • by 
    •   10  
      Computer SciencePrivacyCryptographyEncryption
Computer networks have grown rapidly in term of size and complexity, leading to have a critical point especially from the perspective of computer architecture, which not only have been in usage but also have applied to businesses and... more
    • by 
    •   7  
      Computer NetworksWireless Networks (Computer Science)IEEE 802.11 WLANWPA
In the words of painter Stuart Davis, secretary of the American Artists; Congress, in the 1930s, "The artists of America do not look upon the art projects as a temporary stopgap measure, but see in them the beginning of a new and better... more
    • by 
    •   12  
      HistoryImprovisationTheatre StudiesTheatre History
    • by 
    •   4  
      Wireless CommunicationsComputer NetworksWPAWep
    • by 
    •   6  
      Composition and RhetoricCritical Race TheoryRacismDiversity Management
    • by 
    •   3  
      Upper Mississippian Societies (Archaeology)WPAIllinois Archaeology
    • by 
    •   14  
      Computer ScienceInformation SecurityComputer EngineeringComputer Networks
The focus of the study is to examine the content of the most popular, currently-used English composition textbooks. The study pulled its theoretical framework from research conducted by Dr. Richard A. Griggs who researched psychology... more
    • by 
    •   10  
      Textbook ResearchTextbookTextbook EvaluationWPA
    • by 
    • WPA
    • by 
    •   2  
      L2 writingWPA
    • by 
    •   3  
      Southeastern Archaeology (Archaeology in North America)Woodland ArchaeologyWPA
Cuando se intenta configurar una red de área local inalámbrica (WLAN) de forma manual con los procedimientos tradicionales más difundidos, se obtiene un fallo crítico que arroja un mensaje «error for wireless request "set encode" (8b2a)»... more
    • by 
    •   4  
      DHCPWPADebian (Linux)WLANs
    • by 
    •   5  
      AuthenticationWPARcWep
ABSTRACT Wireless Local Area Networks (WLANs) are gaining popularity as they are fast, cost effective, flexible and easy to use. They are, however, faced with some serious security challenges and the choice of security protocol is a... more
    • by 
    •   14  
      EngineeringComputer ScienceNetwork SecurityWireless security
This paper presents results of a safety analysis of WLAN networks in the city of Tunja, Boyacá Colombia, it is based on a random sample distributed in all over the City. The study is a research result of the project "diagnosis of... more
    • by  and +2
    •   7  
      SecurityNetworksWPAWlan
    • by 
    •   7  
      PoliticsLabor History (History)Marxist theoryLabor History and Studies
Cuando se intenta configurar una red de área local inalámbrica (WLAN) de forma manual con los procedimientos tradicionales más difundidos, se obtiene un fallo crítico que arroja un mensaje «error for wireless request "set encode" (8b2a)»... more
    • by 
    •   12  
      Tcp/IpIEEE 802.11 WLANDHCPWPA
WLANs have evolved into the best choice in a number of situations such as government institutions and airports, but because of the open transport in these networks increased the possibility of security attacks, which required the use of... more
    • by  and +1
    •   8  
      WPAWLANsCrack WPA/WPA2 by GPUWep
    • by 
    •   7  
      HistoryArt HistoryAmerican art/ Art of the United StatesPrints (Art History)
    • by 
    •   5  
      Computer ScienceNetwork SecurityWi-FiWPA
    • by 
    •   5  
      GeographyArchaeologyWPADam
    • by 
    •   10  
      Computer SciencePrivacyCryptographyEncryption
    • by 
    •   11  
      PrivacyWireless securityWireless networksData Privacy
    • by 
    •   3  
      Writing Program AdministrationWPAAssessment of Student Learning Outcomes, Educational Research
    • by 
    •   12  
      Computer SciencePrivacyWireless securityWireless networks
    • by 
    •   4  
      ArchaeologyWPADamLegacy
Pandey, Iswari. “Rhetoric and Composition for the World? A Modest Proposal.” Cross Currents: A Journal of Language, Literature and Literary Theory 1.2 (2012): 325-42. Print.
    • by 
    •   15  
      RhetoricComposition and RhetoricGlobalizationTransnationalism
    • by 
    •   4  
      ArchaeologyWPADamLegacy
    • by 
    •   8  
      Graphic DesignTypographyBiographyModernism
    • by 
    •   5  
      AssessmentWPABig TenAdd/drop
A study of the history and importance of the 2005 Supreme Court decision that expanded Title IX to include a private right of action for individuals who reveal Title IX violations even though they themselves were not subject to sex... more
    • by 
    • WPA
As mobile devices evolve, end users have ever increasing demand for ubiquitous network access. WiFi, being now commonplace, has the potential to fulfill this demand. Apart from WiFi hotspots deployed by ISPs, home users start showing... more
    • by 
    •   11  
      Open AccessAuthenticationEAPWPA
    • by 
    •   9  
      Art HistoryHumorPaintingGreat Depression
    • by 
    •   5  
      ArchaeologyMississippian Societies (Archaeology)Southeastern Archaeology (Archaeology in North America)WPA
    • by 
    •   5  
      ArchaeologyMississippian Societies (Archaeology)Southeastern Archaeology (Archaeology in North America)WPA