VPNs: A Beginner's Guide
John Mairs, Michael Mueller, Jackie Sieben
- 出版商: McGraw-Hill Education
- 出版日期: 2001-12-14
- 售價: $1,860
- 貴賓價: 9.5 折 $1,767
- 語言: 英文
- 頁數: 592
- 裝訂: Paperback
- ISBN: 0072191813
- ISBN-13: 9780072191813
已絕版
買這商品的人也買了...
-
$1,029Fundamentals of Data Structures in C
-
$680$537 -
$550$539 -
$980$774 -
$970Introduction to Algorithms, 2/e
-
$1,274Computer Architecture: A Quantitative Approach, 3/e(精裝本)
-
$450$360 -
$560$504 -
$690$587 -
$780$741 -
$650$553 -
$760$600 -
$580$458 -
$590$466 -
$280$221 -
$750$585 -
$620$527 -
$690$538 -
$720$562 -
$720$569 -
$640$576 -
$560$442 -
$750$675 -
$560$504 -
$750$593
相關主題
商品描述
Design and implement a virtual private network from start to finish
Take advantage of the most cost-effective and secure method for connecting branch offices and enabling remote access using VPNs: A Beginners Guide. This instructive guide shows you how design and implement a virtual private network from start to finish. Learn everything you need to know about VPNs beginning with networking fundamentals and layering principles to VPN protocols and security methods. Get details on the latest in tunneling technologies, including point-to-point tunneling protocol (PPTP) and layer two tunneling protocol (L2TP), and find out how to prevent hacker attacks. Learn about the latest and most advanced VPNs, such as IP Overlay VPNs and MPLS. Eight pages of blueprints depicting various types of VPNs help illustrate the concepts youve just read about. If you want a solid introduction to the inner workings of virtual private networks, this is the ideal book for you.
Get an overview of networking basics--including the OSI model, LANs, WANS, and TCP
Learn all about security components--policies, concepts, and architectures
Discover ways to filter out malicious information, and prevent threats and intrusions
Understand how VPNs relate to both public and private networks
Know the different types of tunneling methods and where they are usually implemented
Get details on the various VPN protocols--GRE, PPTP, L2F, and L2TP, and IPSec
Identify the components that define QoS--delay, bandwidth, jitter, and reliability
Preview the future of VPNs and understand MPLS, IP over ATM, tag switching, and more
Contents
Part I: Networks and Security
Chapter 1: Layering Architecture and the OSI Model
Chapter 2: Network Architectures
Chapter 3: The TCP/IP
Protocol Stack
Chapter 4: Security
Chapter 5: Threats and Attack Methods
Chapter 6:
Intrusion Detection Systems
Chapter 7:
Firewalls
Part II: Virtual Private
Networks
Chapter 8: VPN Basics
Chapter 9: VPN Architectures
Part III: VPN
Protocols
Chapter 10: Tunneling
Protocols
Chapter 11: L2F and L2TP
Part IV: Secure Communication
Chapter 12:
Cryptography
Chapter 13: Cryptographic
Algorithms
Chapter 14:
Certificates
Chapter 15:
Authentication
Part V: IPSec
Chapter
16: IPSec Components
Chapter 17: Key
Management
Chapter 18: Key Management/Exchange
Protocols
Chapter 19: IPSec Architecture and
Implementation
Part VI: MPLS
Chapter
20: Quality of Service (QoS)
Chapter 21: Traffic
Engineering¿Movement of Data
Chapter 22: MPLS
Background
Chapter 23: MPLS Components and
Conceptsts