TY - GEN AB - "How do you provide a low-cost, secure electronic network for your organization?" "The solution is a virtual private network: a collection of technologies that creates secure connections or "tunnels" over regular Internet lines - connections that can be easily used by anybody logging in from anywhere. A number of products now exist to help you develop that solution." "This book tells you how to plan and build a VPN. It starts with general concerns like costs, configuration, and how a VPN fits in with other networking technologies like firewalls. It continues with detailed descriptions of how to install and use VPN technologies that are available for Windows NT and Unix, such as PPTP and L2TP, AltaVista Tunnel, Cisco PIX Firewall, and the Secure Shell (SSH)."--Jacket. AU - Scott, Charlie, AU - Erwin, Mike, AU - Wolfe, Paul, AU - Scott, Charlie, CN - TK5105.875.I57 CN - TK5105.875.E87 ET - Second edition. ID - 12490 KW - Business enterprises KW - Computer networks KW - Computer networks. KW - Internet. KW - Business enterprises. KW - Telecommuting. KW - Internet KW - VIRTUAL PRIVATE NETWORKS (VPN) KW - NETWORK SECURITY : VIRUTAL PRIVATE NETWORKS (VPN) KW - INFORMATION SCIENCE (DOCUMENTATION) : AUTOMATED INFORMATION PROCESSING TOOLS : COMPUTER SECURITY BASIS KW - Télétravail. KW - Réseaux d'ordinateurs N1 - La couv. porte aussi : "Turning the Internet into your private network." N1 - Untertitel auf dem Umschlag: Turning the internet into your private network. N1 - "Turning the Internet into your private network"--Cover. N1 - A la part superior de la coberta: "Turning the Internet into your private network." N1 - ¿7FTurning the Internet into your private network"--Cover. N2 - "How do you provide a low-cost, secure electronic network for your organization?" "The solution is a virtual private network: a collection of technologies that creates secure connections or "tunnels" over regular Internet lines - connections that can be easily used by anybody logging in from anywhere. A number of products now exist to help you develop that solution." "This book tells you how to plan and build a VPN. It starts with general concerns like costs, configuration, and how a VPN fits in with other networking technologies like firewalls. It continues with detailed descriptions of how to install and use VPN technologies that are available for Windows NT and Unix, such as PPTP and L2TP, AltaVista Tunnel, Cisco PIX Firewall, and the Secure Shell (SSH)."--Jacket. SN - 1565925297 T1 - Virtual private networks / TI - Virtual private networks / ER -