-32%
99,99 €
Statt 146,99 €**
99,99 €
inkl. MwSt.
**Preis der gedruckten Ausgabe (Broschiertes Buch)
Sofort per Download lieferbar
0 °P sammeln
-32%
99,99 €
Statt 146,99 €**
99,99 €
inkl. MwSt.
**Preis der gedruckten Ausgabe (Broschiertes Buch)
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
0 °P sammeln
Als Download kaufen
Statt 146,99 €**
-32%
99,99 €
inkl. MwSt.
**Preis der gedruckten Ausgabe (Broschiertes Buch)
Sofort per Download lieferbar
0 °P sammeln
Jetzt verschenken
Statt 146,99 €**
-32%
99,99 €
inkl. MwSt.
**Preis der gedruckten Ausgabe (Broschiertes Buch)
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
0 °P sammeln
  • Format: PDF


This book provides network managers, LAN administrators and smallbusiness operators with all they need to know to "interconnect"multiple locations or travelling employees that need to access asingle location. The operation and utilization of virtual privatenetworks is discussed both in theory and practicality, covering thetechnical aspects associated with encryption and digitalcertificates as well as the manner by which readers can create VPNsusing readily available products from Microsoft, Cisco, Checkpointand possibly other vendors. The author was among the first to write about the concept…mehr

Produktbeschreibung
This book provides network managers, LAN administrators and smallbusiness operators with all they need to know to "interconnect"multiple locations or travelling employees that need to access asingle location. The operation and utilization of virtual privatenetworks is discussed both in theory and practicality, covering thetechnical aspects associated with encryption and digitalcertificates as well as the manner by which readers can create VPNsusing readily available products from Microsoft, Cisco, Checkpointand possibly other vendors. The author was among the first to write about the concept ofvirtual private networking in a series of articles published overfive years ago, and in the intervening years this has become a veryhot topic - with the technology being increasing deployed bycompanies. Virtual Private Networking, by Gilbert Held, covers the technologyand the theory, but also shows readers, through numerous examples,'how to use ' the technology.

Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, D ausgeliefert werden.

  • Produktdetails
  • Verlag: John Wiley & Sons
  • Seitenzahl: 306
  • Erscheinungstermin: 28. Januar 2005
  • Englisch
  • ISBN-13: 9780470020333
  • Artikelnr.: 37289647
Autorenporträt
Gilbert Held is an award winning author and lecturer. Gilhas written over 50 technical books and 400 articles over the past30 years. In addition, Gil has earned many accolades and has beenpresented with an award from the Association of AmericanPublishers. He has also been selected by Federal ComputerWeek to join the Federal 100, a list of the top 100 persons inacademia, industry and the Federal Government that have made asignificant impact upon the equipment acquisition process.
Inhaltsangabe
Preface.Acknowledgements.Chapter 1 Introduction to Virtual Private Networking.1.1 THE VPN CONCEPT.1.2 BOOK PREVIEW.Chapter 2 Understanding Authentication and Encryption.2.1 AUTHENTICATION.2.2 ENCRYPTION.Chapter 3 Understanding the TCP/IP Protocol Suite.3.1 FRAME FORMATION.3.2 THE NETWORK LAYER.3.3 THE TRANSPORT LAYER.3.4 PROXY SERVICES AND NETWORK ADDRESS TRANSLATION.Chapter 4 Layer 2 Operations.4.1 THE POINT-TO-POINT PROTOCOL.4.2 POINT-TO-POINT TUNNELING PROTOCOL.4.3 LAYER 2 FORWARDING.4.4 LAYER 2 TUNNELING PROTOCOL.Chapter 5 Higher Layer VPNs.5.1 UNDERSTANDING IPSEC.5.2 WORKING WITH IPSEC.5.3 SSL AND TLS.Chapter 6 VPN Hardware and Software.6.1 USING THE ASANTE VPN SECURITY ROUTER.6.2 WINDOWS VPN SOFTWARE.6.3 WORKING WITHWINDOWS 2000 SERVER.Chapter 7 Service Provider-Based VPNs.7.1 RATIONALE FOR USE.7.2 TRANSPORT FACILITIES AND VPN OPERATION.7.3 SERVICE LEVEL AGREEMENTS.7.4 VPN SERVICE PROVIDER OVERVIEW.Appendix A VPN Checklist.Index.