Vakaris_Nevulis_VPN_ND.docxYou must register on this page before doing your homework. How to use the wiki system is described in the Glossary Addendum . Do your homework in Word, send it to tinklusaugumas@gmail.com . Then upload the material to this page, don't forget the security question at the top. Get ready to present your homework: explanation of the term, necessity / use, summary; delivery time - 5 min.
Edit conflict - other version:
|
Name surname |
Work theme |
1. |
Erik Kliuk |
|
2. |
Rimgaudas Alekna |
|
3. |
Alanas Stasiulevicius |
|
4. |
Pavel Kivilša |
|
5. |
Adomas Rinkevičius |
|
6. |
Kornelijus Lisauskas |
Infrared transmission protocol |
7. |
Vakaris Nevulis |
|
8. |
Paullus Urbanavičius |
|
9. |
Jonas Medelšis |
LoRahAN Protocol Security and Drones |
10. |
Aironas Petraitis |
|
11. |
Lukas Ustila |
|
12. |
Kamil Gaidis |
|
13. |
Ignas Šambaras |
Debesų kompiuterijos saugumas |
Edit conflict - your version:
|
Work theme |
Name surname |
1. |
Erik Kliuk |
|
2. |
Ringaudas Alekna |
|
3. |
Alanas Stasiulevicius |
Interneto magistralés, ateinancios i Lietuvą |
4. |
Pavel Kivilša |
Dviejų veiksnių autentifikavimas (2FA) |
5. |
Adomas Rinkevičius |
|
6. |
Kornelijus Lisauskas |
Infrared transmission protocol |
7. |
Vakaris Nevulis |
|
8. |
Paullus Urbanavičius |
Wi-Fi saugumas |
9. |
Jonas Medelšis |
LoRahAN Protocol Security and Drones |
10. |
Aironas Petraitis |
Duomenų šifravimas ir autentifikacija. |
11. |
Lukas Ustila |
5G tinklo saugumas |
12. |
Kamil Gaidis |
|
13. |
Ignas Šambaras |
Debesų kompiuterijos saugumas |
End of edit conflict
14. |
|
|
15. |
|
|
16. |
|
|
Edit conflict - other version:
Edit conflict - your version:
End of edit conflict