Jeżeli nie znalazłeś poszukiwanej książki, skontaktuj się z nami wypełniając formularz kontaktowy.

Ta strona używa plików cookies, by ułatwić korzystanie z serwisu. Mogą Państwo określić warunki przechowywania lub dostępu do plików cookies w swojej przeglądarce zgodnie z polityką prywatności.

Wydawcy

Literatura do programów

Informacje szczegółowe o książce

Virtual Private Networking: A Construction, Operation and Utilization Guide - ISBN 9780470854327

Virtual Private Networking: A Construction, Operation and Utilization Guide

ISBN 9780470854327

Autor: Gilbert Held

Wydawca: Wiley

Dostępność: 3-6 tygodni

Cena: 580,65 zł

Przed złożeniem zamówienia prosimy o kontakt mailowy celem potwierdzenia ceny.


ISBN13:      

9780470854327

ISBN10:      

0470854324

Autor:      

Gilbert Held

Oprawa:      

Paperback

Rok Wydania:      

2004-03-02

Ilość stron:      

306

Wymiary:      

235x189

Tematy:      

TJ

A guide to delivering secure remote access to private enterprise networks.
Using the public communications infrastructure to connect remoteusers to an organization′s network is a cost–effective and efficient way to provide communication and collaboration opportunities across large distances.  But how is private information kept private in a public network? And how may access be restricted to authorized individuals? Virtual Private networks (VPNs) hold the answer.
In Virtual Private Networking, Gil Held gives a detailed overview of the various VPN solutions available, how they are constructed, the rationale for their use, and which solutions satisfy which operational requirements.  Detailed information on specific products available from vendors such as Cisco® and Checkpoint® together with hands–on examples on how to configure client and server in a Microsoft® Windows® operating environment, make this a supremely practical tutorial for practicing network managers and administrators
Read on for:Information on appropria te authenication and encryption techniquesA tutorial on TCP/IP focused specifically at creating and operating VPNsIn–depth discussion on tunneling protocols PPTP and L2TPA comparison of commonly used security protocols IPSec and SSLThe rationale for service provider–based VPNs and advice on service level agreement parameters to consider when using a VPN service providerConcluding this book  is a comprehensive checklist of VPN features and operational techniques that may be used for ′build it yourself′ applications as well as comparing the features and capabilities of third parties that provide VPN solutions.

Spis treści:
Preface.
Acknowledgements.
Chapter 1 Introduction to Virtual Private Networking.
1.1 THE VPN CONCEPT.
1.2 BOOK PREVIEW.< br>Chapter 2 Understanding Authentication and Encryption.
2.1 AUTHENTICATION.
2.2 ENCRYPTION.
Chapter 3 Understanding the TCP/IP Protocol Suite.
3.1 FRAME FORMATION.
3.2 THE NETWORK LAYER.
3.3 THE TRANSPORT LAYER.
3.4 PROXY SERVICES AND NETWORK ADDRESS TRANSLATION.
Chapter 4 Layer 2 Operations.
4.1 THE POINT–TO–POINT PROTOCOL.
4.2 POINT–TO–POINT TUNNELING PROTOCOL.
4.3 LAYER 2 FORWARDING.
4.4 LAYER 2 TUNNELING PROTOCOL.
Chapter 5 Higher Layer VPNs.
5.1 UNDERSTANDING IPSEC.
5.2 WORKING WITH IPSEC.
5.3 SSL AND TLS.
Chapter 6 VPN Hardware and Software.
6.1 USING THE ASANTE VPN SECURITY ROUTER.
6.2 WINDOWS VPN SOFTWARE.
6.3 WORKING WITHWINDOWS 2000 SERVER.
Chapter 7 Service Provider–Based VPNs.
7.1 RATIONALE FOR USE.
7.2 TRANSPORT FACILITIES AND VPN OPERATION.
7.3 SERVICE LEVEL AGREEMENTS.
7.4 VPN SERVICE PROVIDER OVERVIEW.
Appendix A VPN Checklist.
Index.

Nota biograficzna:
Gilbert Held is an award winning author and lecturer. Gil has written over 50 technical books and 400 articles over the past 30 years. In addition, Gil has earned many accolades and has been presented with an award from the Association of American Publishers. He has also been selected by Federal Computer Week to join the Federal 100, a list of the top 100 persons in academia, industry and the Federal Government that have made a significant impact upon the equipment acquisition process.

Okładka tylna:
A guide to delivering secure remote access to private enterprise networks.
Using the public communications infrastructure to connect remoteusers to an organization′s network is a cost–effective and efficient way to provide communication and collaboration opportunities across large distances.  But how is private information kept private in a public network? And how may access be restricted to authorized individuals? Virtual Private networks (VPNs) hold the answer.
In Virtual Private Networking, Gil Held gives a detailed overview of the various VPN solutions available, how they are constructed, the rationale for their use, and which solutions satisfy which operational requirements.  Detailed information on specific products available from vendors such as Cisco® and Checkpoint® together with hands–on examples on how to configure client and server in a Microsoft® Windows® operating environment, make this a supremely practical tutorial for practicing network managers and administrators
Read on for:Information on appropria te authenication and encryption techniquesA tutorial on TCP/IP focused specifically at creating and operating VPNsIn–depth discussion on tunneling protocols PPTP and L2TPA comparison of commonly used security protocols IPSec and SSLThe rationale for service provider–based VPNs and advice on service level agreement parameters to consider when using a VPN service providerConcluding this book  is a comprehensive checklist of VPN features and operational techniques that may be used for ′build it yourself′ applications as well as comparing the features and capabilities of third parties that provide VPN solutions.

Koszyk

Książek w koszyku: 0 szt.

Wartość zakupów: 0,00 zł

ebooks
covid

Kontakt

Gambit
Centrum Oprogramowania
i Szkoleń Sp. z o.o.

Al. Pokoju 29b/22-24

31-564 Kraków


Siedziba Księgarni

ul. Kordylewskiego 1

31-542 Kraków

+48 12 410 5991

+48 12 410 5987

+48 12 410 5989

Zobacz na mapie google

Wyślij e-mail

Subskrypcje

Administratorem danych osobowych jest firma Gambit COiS Sp. z o.o. Na podany adres będzie wysyłany wyłącznie biuletyn informacyjny.

Autoryzacja płatności

PayU

Informacje na temat autoryzacji płatności poprzez PayU.

PayU banki

© Copyright 2012: GAMBIT COiS Sp. z o.o. Wszelkie prawa zastrzeżone.

Projekt i wykonanie: Alchemia Studio Reklamy