Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book provides network managers, LAN administrators and small business operators with all they need to know to "interconnect" multiple locations or travelling employees that need to access a single location. The operation and utilization of virtual private networks is discussed both in theory and practicality, covering the technical aspects associated with encryption and digital certificates as well as the manner by which readers can create VPNs using readily available products from Microsoft, Cisco, Checkpoint and possibly other vendors. The author was among the first to write about the…mehr
This book provides network managers, LAN administrators and small business operators with all they need to know to "interconnect" multiple locations or travelling employees that need to access a single location. The operation and utilization of virtual private networks is discussed both in theory and practicality, covering the technical aspects associated with encryption and digital certificates as well as the manner by which readers can create VPNs using readily available products from Microsoft, Cisco, Checkpoint and possibly other vendors. The author was among the first to write about the concept of virtual private networking in a series of articles published over five years ago, and in the intervening years this has become a very hot topic - with the technology being increasing deployed by companies. Virtual Private Networking, by Gilbert Held, covers the technology and the theory, but also shows readers, through numerous examples, 'how to use ' the technology.
Gilbert Held is an award winning author and lecturer. Gil has written over 50 technical books and 400 articles over the past 30 years. In addition, Gil has earned many accolades and has been presented with an award from the Association of American Publishers. He has also been selected by Federal Computer Week to join the Federal 100, a list of the top 100 persons in academia, industry and the Federal Government that have made a significant impact upon the equipment acquisition process.
Inhaltsangabe
Preface. Acknowledgements. Chapter 1 Introduction to Virtual Private Networking. 1.1 THE VPN CONCEPT. 1.2 BOOK PREVIEW. Chapter 2 Understanding Authentication and Encryption. 2.1 AUTHENTICATION. 2.2 ENCRYPTION. Chapter 3 Understanding the TCP/IP Protocol Suite. 3.1 FRAME FORMATION. 3.2 THE NETWORK LAYER. 3.3 THE TRANSPORT LAYER. 3.4 PROXY SERVICES AND NETWORK ADDRESS TRANSLATION. Chapter 4 Layer 2 Operations. 4.1 THE POINT-TO-POINT PROTOCOL. 4.2 POINT-TO-POINT TUNNELING PROTOCOL. 4.3 LAYER 2 FORWARDING. 4.4 LAYER 2 TUNNELING PROTOCOL. Chapter 5 Higher Layer VPNs. 5.1 UNDERSTANDING IPSEC. 5.2 WORKING WITH IPSEC. 5.3 SSL AND TLS. Chapter 6 VPN Hardware and Software. 6.1 USING THE ASANTE VPN SECURITY ROUTER. 6.2 WINDOWS VPN SOFTWARE. 6.3 WORKING WITHWINDOWS 2000 SERVER. Chapter 7 Service Provider-Based VPNs. 7.1 RATIONALE FOR USE. 7.2 TRANSPORT FACILITIES AND VPN OPERATION. 7.3 SERVICE LEVEL AGREEMENTS. 7.4 VPN SERVICE PROVIDER OVERVIEW. Appendix A VPN Checklist. Index.
Preface. Acknowledgements. Chapter 1 Introduction to Virtual Private Networking. 1.1 THE VPN CONCEPT. 1.2 BOOK PREVIEW. Chapter 2 Understanding Authentication and Encryption. 2.1 AUTHENTICATION. 2.2 ENCRYPTION. Chapter 3 Understanding the TCP/IP Protocol Suite. 3.1 FRAME FORMATION. 3.2 THE NETWORK LAYER. 3.3 THE TRANSPORT LAYER. 3.4 PROXY SERVICES AND NETWORK ADDRESS TRANSLATION. Chapter 4 Layer 2 Operations. 4.1 THE POINT-TO-POINT PROTOCOL. 4.2 POINT-TO-POINT TUNNELING PROTOCOL. 4.3 LAYER 2 FORWARDING. 4.4 LAYER 2 TUNNELING PROTOCOL. Chapter 5 Higher Layer VPNs. 5.1 UNDERSTANDING IPSEC. 5.2 WORKING WITH IPSEC. 5.3 SSL AND TLS. Chapter 6 VPN Hardware and Software. 6.1 USING THE ASANTE VPN SECURITY ROUTER. 6.2 WINDOWS VPN SOFTWARE. 6.3 WORKING WITHWINDOWS 2000 SERVER. Chapter 7 Service Provider-Based VPNs. 7.1 RATIONALE FOR USE. 7.2 TRANSPORT FACILITIES AND VPN OPERATION. 7.3 SERVICE LEVEL AGREEMENTS. 7.4 VPN SERVICE PROVIDER OVERVIEW. Appendix A VPN Checklist. Index.