Angebote zu "Network" (9 Treffer)

Kategorien

Shops

AXIS F82A06 Angled Pinhole Mount - Halterung fü...
41,30 € *
ggf. zzgl. Versand

Kurzinfo: AXIS F82A06 Angled Pinhole Mount - Halterung für Kamerasensor - für AXIS A1125 Sensor Unit, P1265 Network Camera Gruppe Eingabe Zubehör Hersteller Axis Communications Hersteller Art. Nr. 01198-001 EAN/UPC 7331021061996 Produktbeschreibung: AXIS F82A06 Angled Pinhole Mount - Halterung für Kamerasensor Produkttyp Halterung für Kamerasensor Entwickelt für AXIS A1125 Sensor Unit, P1265 Network Camera Ausführliche Details Allgemein Produkttyp Halterung für Kamerasensor Verschiedenes Leistungsmerkmale Gewinkelt Informationen zur Kompatibilität Entwickelt für AXIS A1125 Sensor Unit, P1265 Network Camera

Anbieter: JACOB Computer
Stand: 01.04.2020
Zum Angebot
AXIS F92A01 - Gehäuse für Höhenskala des Kamera...
158,10 € *
ggf. zzgl. Versand

Kurzinfo: AXIS F92A01 - Gehäuse für Höhenskala des Kamerasensors - Schwarz - für AXIS A1125, F1004, F1025, P1264, P1265, P8535 Gruppe Eingabe Zubehör Hersteller Axis Communications Hersteller Art. Nr. 01630-001 Modell F92A01 EAN/UPC 7331021066168 Produktbeschreibung: AXIS F92A01 - Gehäuse für Höhenskala des Kamerasensors Produkttyp Gehäuse für Höhenskala des Kamerasensors Abmessungen (Breite x Tiefe x Höhe) 87.1 cm x 5 cm Entwickelt für AXIS A1125 Sensor Unit, F1004 Pinhole Sensor Unit, F1025 Sensor Unit, P1264, P1265 Network Camera, P8535 Imperial, P8535 Metric Ausführliche Details Allgemein Produkttyp Gehäuse für Höhenskala des Kamerasensors Breite 87.1 cm Tiefe 5 cm Farbe Schwarz Informationen zur Kompatibilität Entwickelt für AXIS A1125 Sensor Unit, F1004 Pinhole Sensor Unit, F1025 Sensor Unit, P1264, P1265 Network Camera, P8535 Imperial, P8535 Metric

Anbieter: JACOB Computer
Stand: 01.04.2020
Zum Angebot
AXIS F92A01 - Gehäuse für Höhenskala des Kamera...
158,10 € *
ggf. zzgl. Versand

Kurzinfo: AXIS F92A01 - Gehäuse für Höhenskala des Kamerasensors - Silber - für AXIS A1125, F1004, F1025, P1264, P1265, P8535 Gruppe Eingabe Zubehör Hersteller Axis Communications Hersteller Art. Nr. 01631-001 Modell F92A01 EAN/UPC 7331021066175 Produktbeschreibung: AXIS F92A01 - Gehäuse für Höhenskala des Kamerasensors Produkttyp Gehäuse für Höhenskala des Kamerasensors Abmessungen (Breite x Tiefe x Höhe) 87.1 cm x 5 cm Entwickelt für AXIS A1125 Sensor Unit, F1004 Pinhole Sensor Unit, F1025 Sensor Unit, P1264, P1265 Network Camera, P8535 Imperial, P8535 Metric Ausführliche Details Allgemein Produkttyp Gehäuse für Höhenskala des Kamerasensors Breite 87.1 cm Tiefe 5 cm Farbe Silber Informationen zur Kompatibilität Entwickelt für AXIS A1125 Sensor Unit, F1004 Pinhole Sensor Unit, F1025 Sensor Unit, P1264, P1265 Network Camera, P8535 Imperial, P8535 Metric

Anbieter: JACOB Computer
Stand: 01.04.2020
Zum Angebot
Axis Axis P1265
389,00 € *
ggf. zzgl. Versand

Axis P1265 Network Camera is a modular camera based on a small-sized main unit (Axis P12 Mk II) and an Axis Fa1125 Pinhole Sensor Unit that is designed for extremely discreet indoor installations. The camera provides Hdtv 1080p resolution, 91° horizo

Anbieter: Rakuten
Stand: 01.04.2020
Zum Angebot
AXIS F7301 - Kabel USB / seriell - RJ-12 bis Mi...
41,30 € *
ggf. zzgl. Versand

Kurzinfo: AXIS F7301 - Kabel USB / seriell - RJ-12 bis Micro-USB Typ B - 1 m - Schwarz - für AXIS F1004, F34, F41, F44, FA1105, FA3105, FA54, P1244, P1245, p1254, P1264, P1265, P1275 Gruppe System- & Stromkabel Hersteller Axis Communications Hersteller Art. Nr. 01552-001 Modell F7301 EAN/UPC 7331021064911 Produktbeschreibung: AXIS F7301 - Kabel USB / seriell - 1 m Typ Kabel USB / seriell Länge 1 m Anschluss RJ-12 Stecker (zweites Ende) 5-poliger Micro-USB Typ B Farbe Schwarz Entwickelt für AXIS F1004 Bullet Sensor Unit, F1004 Pinhole Sensor Unit, F1004 Sensoreinheit, F34 Main Unit, F41 Main Unit, F44 Dual Audio Input Main Unit, FA1105 Sensoreinheit, FA3105-L Eyeball-Sensoreinheit, FA54 Main Unit, P1244, P1245, p1254, P1264, P1265 Network Camera, P1275 Ausführliche Details Allgemein Typ Kabel USB / seriell Länge 1 m Farbe Schwarz Konnektivität Anschluss RJ-12 Stecker (zweites Ende) 5-poliger Micro-USB Typ B Informationen zur Kompatibilität Entwickelt für AXIS F1004 Bullet Sensor Unit, F1004

Anbieter: JACOB Computer
Stand: 01.04.2020
Zum Angebot
Grandstream Grandstream GWN-7000 VPN Router
137,37 € *
ggf. zzgl. Versand

Der hoch-performante Multi-WAN Gigabit-Router GWN7000 im Enterprise-Design ist ideal, um große, mittlere und kleine Unternehmen sowie Behörden oder Logistikunternehmen mit einem oder mehreren Standorten mit stabilen und leistungsstarken VPN Anbindungen und zuverlässigen WLAN-Lösungen zu verbinden. Des Weiteren, stellt er eine sehr hohe Routing- und Switching-Leistung sowie Hardwarebeschleunigte VPN Client/Server Anbindungen bereit.>Highlights:- 7 Gigabit ports (2 WAN + 5 LAN)- Hardware beschleunigtes VPN inkl. PPTP, L2TP/IPSec und OpenVPN- Load-Balancing und Failover- Einfaches, zentrales Monitoring/Verwalten/ Provisionieren über die intuitive Web-Oberfläche- 1 Million Pakete/Sekunde Routing & 10GBit/s kombinierte Switching Leistung- Eingebetteter Provisionierungsmaster- USB Schnittstelle für Drucker, NAS, Daten-Server usw.- 7-Layer Netzwerk/Applikations-Monitoring via DPI- Firewall inkl. NAT, DMZ, Port-Forwarding, SPI und UPnP> Routereigenschaften- interner Anschluss- WAN Port 10/100/1000Mbps- DHCP-Server integriert- Integrierte Firewall- Network Address Translation (NAT)- Stateful Packet Inspection (SPI)- Telefonie-Funktion (VoIP)- Integrierter Druckserver- Power over Ethernet- VPN-Funktion- DMZ (Demilitarisierte Zone) möglich- IPv6 ready> Anschlüsse- USB- USB-Standard 3.0- Anzahl USB-Anschlüsse: 2> Stromversorgung- Steckernetzgerät- LED Anzeige- Eingangsspannung: 12 V- Strom: 2 mA- Leistungsaufnahme im Betrieb 16 W> Systemanschlüsse- Anzahl Ethernet-Ports 10/100/1000 Mbit/s: 5> Grundeigenschaften- Farbe: Schwarz/Pink- Höhe: 37 mm- Breite: 200 mm- Tiefe: 136 mm- Gewicht: 570 g- Produkttyp: Router> Technische Beschreibung- 802.3at PoE- 8 grünfarbige LED's zur Kontroll- und Statusanzeige- 1x Reset Pinhole- Montage: Im Innenraum, Tisch- oder Wandmontage>QoS- VLAN- TOS- Unterstützung mehrerer Geschwindigkeitsklassen- Portfilterung- IP Adresse- DSCP- Policing>WAN- DHCP- Static IP- PPPoE- Load Balance & Failover- Regelbasiertes Routing>LAN- DHCP Server- DNS Cache- Multiple Zones- VLAN>VPN- Protokolle: PPTP, L2TP/IPSec, OpenVPN-Client, Server oder Pass Through> Lieferumfang- Grandstream GWN7000 VPN Router- 12 V/2 A Netzteil- Kurz-Installationsanleitung- GPL Lizenz

Anbieter: mcbuero
Stand: 01.04.2020
Zum Angebot
Network Access Control (Nac)
89,90 CHF *
ggf. zzgl. Versand

Network Access Control (NAC) is an approach to computer network security that attempts to unify endpoint security technology (such as antivirus, host intrusion prevention, and vulnerability assessment), user or system authentication and network security enforcement. This book is your ultimate resource for Network Access Control (NAC). Here you will find the most up-to-date information, analysis, background and everything you need to know. In easy to read chapters, with extensive references and links to get you to know all there is to know about Network Access Control (NAC) right away, covering: Network Access Control, Network security, Administrative domain, AEGIS SecureConnect, Aladdin Knowledge Systems, Alert Logic, Anomaly-based intrusion detection system, Anti-pharming, Anti-phishing software, Anti-worm, Application-level gateway, ARP spoofing, Asprox botnet, Attack (computer), Attack tree, Authentication server, Avaya Secure Network Access, Avaya VPN Router, Bagle (computer worm), Barracuda Networks, Bastion host, Black hole (networking), BLACKER, Blue Cube Security, BNC (software), Botnet, BredoLab botnet, Bro (software), Byzantine Foothold, Captive portal, Capture the flag, Check Point, Check Point Abra, Check Point VPN-1, Christmas tree packet, Cisco ASA, Cisco Global Exploiter, Cisco PIX, Cisco Secure Integrated Software, Cisco Security Agent, Cisco Systems VPN Client, Clear Channel Assessment attack, Client Puzzle Protocol, Cloudvpn, Codenomicon, Columbitech, Computer security, Context-based access control, ContraVirus, Core Impact, Core Security, Countermeasure (computer), Cryptek, Cutwail botnet, CVSS, CyberCIEGE, Dark Internet, Data breach, Deep packet inspection, Defense in depth (computing), Denial-of-service attack, Device fingerprint, DHIPDS, Differentiated security, Digital Postmarks, Digital security, Distributed firewall, DMZ (computing), DNS hijacking, Donbot botnet, Dual-homed, Egress filtering, Entrust, Evil bit, Extensible Threat Management (XTM), Extranet, Fail2ban, Fake AP, Finjan, Firewalk (computing), Firewall (computing), Firewall pinhole, Firewalls and Internet Security, Fortinet, Forward-confirmed reverse DNS, General Dynamics C4 Systems, Generalized TTL security mechanism, Global Internet Freedom Consortium, Golden Frog Inc, Greynet, Grum botnet, Guided tour puzzle protocol, Gumblar, Hole punching, Honeyd, HoneyMonkey, Honeynet Project, Honeypot (computing), Honeytoken, Host Identity Protocol, ICMP hole punching, Identity driven networking, IEC 62351, IEEE 802.1X, IF-MAP, Ingress filtering, Institute for Applied Network Security, Integrated Windows Authentication, Inter-protocol communication, Inter-protocol exploitation, Internet censorship, Internet security, Internet Storm Center, IntruShield, Network intrusion detection system, Intrusion prevention system, IP address spoofing, IP blocking, IP fragmentation attacks, Kaspersky Anti-Virus, Kerberos (protocol), Kerio Control, Key distribution center, Knowledge-based authentication, Kraken botnet, Lethic botnet, List of cyber attack threat trends, Lock-Keeper, Lorcon, Lumeta Corporation, MAC flooding, Managed security service, Managed VoIP Service, Mariposa botnet, Mega-D botnet, Messaging Security, Metasploit Project, Middlebox, Miredo, Mobile virtual private network, Monoculture (computer science), Mu Dynamics, MySecureCyberspace, NAT traversal, NeoAccel, NetBox Blue, Network Admission Control, Network Based Application Recognition, Network encryption cracking, Network intelligence, Network security policy, Network Security Toolkit, Nfront security, NIST RBAC model, NTLM, Null session, OCML...and much more This book explains in-depth the real drivers and workings of Network Access Control (NAC). It reduces the risk of your technology, time and resources investment decisions by enabling you to compare your understanding of Network Access Control (NAC) with the objectiv

Anbieter: Orell Fuessli CH
Stand: 01.04.2020
Zum Angebot
Network Access Control (Nac)
48,99 € *
ggf. zzgl. Versand

Network Access Control (NAC) is an approach to computer network security that attempts to unify endpoint security technology (such as antivirus, host intrusion prevention, and vulnerability assessment), user or system authentication and network security enforcement. This book is your ultimate resource for Network Access Control (NAC). Here you will find the most up-to-date information, analysis, background and everything you need to know. In easy to read chapters, with extensive references and links to get you to know all there is to know about Network Access Control (NAC) right away, covering: Network Access Control, Network security, Administrative domain, AEGIS SecureConnect, Aladdin Knowledge Systems, Alert Logic, Anomaly-based intrusion detection system, Anti-pharming, Anti-phishing software, Anti-worm, Application-level gateway, ARP spoofing, Asprox botnet, Attack (computer), Attack tree, Authentication server, Avaya Secure Network Access, Avaya VPN Router, Bagle (computer worm), Barracuda Networks, Bastion host, Black hole (networking), BLACKER, Blue Cube Security, BNC (software), Botnet, BredoLab botnet, Bro (software), Byzantine Foothold, Captive portal, Capture the flag, Check Point, Check Point Abra, Check Point VPN-1, Christmas tree packet, Cisco ASA, Cisco Global Exploiter, Cisco PIX, Cisco Secure Integrated Software, Cisco Security Agent, Cisco Systems VPN Client, Clear Channel Assessment attack, Client Puzzle Protocol, Cloudvpn, Codenomicon, Columbitech, Computer security, Context-based access control, ContraVirus, Core Impact, Core Security, Countermeasure (computer), Cryptek, Cutwail botnet, CVSS, CyberCIEGE, Dark Internet, Data breach, Deep packet inspection, Defense in depth (computing), Denial-of-service attack, Device fingerprint, DHIPDS, Differentiated security, Digital Postmarks, Digital security, Distributed firewall, DMZ (computing), DNS hijacking, Donbot botnet, Dual-homed, Egress filtering, Entrust, Evil bit, Extensible Threat Management (XTM), Extranet, Fail2ban, Fake AP, Finjan, Firewalk (computing), Firewall (computing), Firewall pinhole, Firewalls and Internet Security, Fortinet, Forward-confirmed reverse DNS, General Dynamics C4 Systems, Generalized TTL security mechanism, Global Internet Freedom Consortium, Golden Frog Inc, Greynet, Grum botnet, Guided tour puzzle protocol, Gumblar, Hole punching, Honeyd, HoneyMonkey, Honeynet Project, Honeypot (computing), Honeytoken, Host Identity Protocol, ICMP hole punching, Identity driven networking, IEC 62351, IEEE 802.1X, IF-MAP, Ingress filtering, Institute for Applied Network Security, Integrated Windows Authentication, Inter-protocol communication, Inter-protocol exploitation, Internet censorship, Internet security, Internet Storm Center, IntruShield, Network intrusion detection system, Intrusion prevention system, IP address spoofing, IP blocking, IP fragmentation attacks, Kaspersky Anti-Virus, Kerberos (protocol), Kerio Control, Key distribution center, Knowledge-based authentication, Kraken botnet, Lethic botnet, List of cyber attack threat trends, Lock-Keeper, Lorcon, Lumeta Corporation, MAC flooding, Managed security service, Managed VoIP Service, Mariposa botnet, Mega-D botnet, Messaging Security, Metasploit Project, Middlebox, Miredo, Mobile virtual private network, Monoculture (computer science), Mu Dynamics, MySecureCyberspace, NAT traversal, NeoAccel, NetBox Blue, Network Admission Control, Network Based Application Recognition, Network encryption cracking, Network intelligence, Network security policy, Network Security Toolkit, Nfront security, NIST RBAC model, NTLM, Null session, OCML...and much more This book explains in-depth the real drivers and workings of Network Access Control (NAC). It reduces the risk of your technology, time and resources investment decisions by enabling you to compare your understanding of Network Access Control (NAC) with the objectiv

Anbieter: Thalia AT
Stand: 01.04.2020
Zum Angebot