Held | Virtual Private Networking | E-Book | sack.de
E-Book

E-Book, Englisch, 306 Seiten, E-Book

Held Virtual Private Networking

A Construction, Operation and Utilization Guide
1. Auflage 2005
ISBN: 978-0-470-02033-3
Verlag: John Wiley & Sons
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)

A Construction, Operation and Utilization Guide

E-Book, Englisch, 306 Seiten, E-Book

ISBN: 978-0-470-02033-3
Verlag: John Wiley & Sons
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)



This book provides network managers, LAN administrators and smallbusiness operators with all they need to know to "interconnect"multiple locations or travelling employees that need to access asingle location. The operation and utilization of virtual privatenetworks is discussed both in theory and practicality, covering thetechnical aspects associated with encryption and digitalcertificates as well as the manner by which readers can create VPNsusing readily available products from Microsoft, Cisco, Checkpointand possibly other vendors.
The author was among the first to write about the concept ofvirtual private networking in a series of articles published overfive years ago, and in the intervening years this has become a veryhot topic - with the technology being increasing deployed bycompanies.
Virtual Private Networking, by Gilbert Held, covers the technologyand the theory, but also shows readers, through numerous examples,'how to use ' the technology.

Held Virtual Private Networking jetzt bestellen!

Autoren/Hrsg.


Weitere Infos & Material


Preface.
Acknowledgements.
Chapter 1 Introduction to Virtual Private Networking.
1.1 THE VPN CONCEPT.
1.2 BOOK PREVIEW.
Chapter 2 Understanding Authentication and Encryption.
2.1 AUTHENTICATION.
2.2 ENCRYPTION.
Chapter 3 Understanding the TCP/IP Protocol Suite.
3.1 FRAME FORMATION.
3.2 THE NETWORK LAYER.
3.3 THE TRANSPORT LAYER.
3.4 PROXY SERVICES AND NETWORK ADDRESS TRANSLATION.
Chapter 4 Layer 2 Operations.
4.1 THE POINT-TO-POINT PROTOCOL.
4.2 POINT-TO-POINT TUNNELING PROTOCOL.
4.3 LAYER 2 FORWARDING.
4.4 LAYER 2 TUNNELING PROTOCOL.
Chapter 5 Higher Layer VPNs.
5.1 UNDERSTANDING IPSEC.
5.2 WORKING WITH IPSEC.
5.3 SSL AND TLS.
Chapter 6 VPN Hardware and Software.
6.1 USING THE ASANTE VPN SECURITY ROUTER.
6.2 WINDOWS VPN SOFTWARE.
6.3 WORKING WITHWINDOWS 2000 SERVER.
Chapter 7 Service Provider-Based VPNs.
7.1 RATIONALE FOR USE.
7.2 TRANSPORT FACILITIES AND VPN OPERATION.
7.3 SERVICE LEVEL AGREEMENTS.
7.4 VPN SERVICE PROVIDER OVERVIEW.
Appendix A VPN Checklist.
Index.


Gilbert Held is an award winning author and lecturer. Gilhas written over 50 technical books and 400 articles over the past30 years. In addition, Gil has earned many accolades and has beenpresented with an award from the Association of AmericanPublishers. He has also been selected by Federal ComputerWeek to join the Federal 100, a list of the top 100 persons inacademia, industry and the Federal Government that have made asignificant impact upon the equipment acquisition process.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.