000012490 000__ 03502cam\a2200637\i\4500 000012490 001__ 12490 000012490 003__ SzGeWIPO 000012490 005__ 20210318092536.0 000012490 008__ 000303s1999\\\\cc\a\\\\rb\\\\001\0\eng\\ 000012490 020__ $$a1565925297 000012490 020__ $$z9781565925298$$qacid-free paper 000012490 035__ $$a(wipo)(CD )01-0126 000012490 035__ $$a(OCoLC)40800359 000012490 040__ $$aSzGeWIPO$$beng$$erda$$cSzGeWIPO$$dCaBNVSL 000012490 050_4 $$aTK5105.875.I57$$bS395 1999 000012490 050_4 $$aTK5105.875.E87$$bS26 1999 000012490 08204 $$a004.6$$221 000012490 084__ $$aD 710 SCO.V 000012490 090__ $$c12933$$d12933 000012490 1001_ $$aScott, Charlie,$$eauthor. 000012490 24510 $$aVirtual private networks /$$cCharlie Scott, Paul Wolfe, and Mike Erwin. 000012490 250__ $$aSecond edition. 000012490 264_1 $$aBeijing [China] :$$bO'Reilly,$$cc1999. 000012490 300__ $$axiv, 211 pages :$$billustrations ;$$c24 cm. 000012490 336__ $$atext$$btxt$$2rdacontent 000012490 337__ $$aunmediated$$bn$$2rdamedia 000012490 338__ $$avolume$$bnc$$2rdacarrier 000012490 4901_ $$aNutshell handbooks 000012490 500__ $$aLa couv. porte aussi : "Turning the Internet into your private network." 000012490 500__ $$aUntertitel auf dem Umschlag: Turning the internet into your private network. 000012490 500__ $$a"Turning the Internet into your private network"--Cover. 000012490 500__ $$aA la part superior de la coberta: "Turning the Internet into your private network." 000012490 500__ $$a¿7FTurning the Internet into your private network"--Cover. 000012490 504__ $$aIncludes bibliographical references and index. 000012490 5050_ $$aWhy build a virtual private network? -- Basic VPN technologies -- Wide area, remote access, and the VPN -- Implementing Layer 2 connections -- Configuring and testing Layer 2 connections -- Implementing the AltaVista Tunnel 98 -- Configuring and testing the AltaVista Tunnel -- Creating a VPN with the Unix Secure Shell -- The Cisco PIX firewall -- Managing and maintaining your VPN -- A VPN scenario. 000012490 5201_ $$a"How do you provide a low-cost, secure electronic network for your organization?" "The solution is a virtual private network: a collection of technologies that creates secure connections or "tunnels" over regular Internet lines - connections that can be easily used by anybody logging in from anywhere. A number of products now exist to help you develop that solution." "This book tells you how to plan and build a VPN. It starts with general concerns like costs, configuration, and how a VPN fits in with other networking technologies like firewalls. It continues with detailed descriptions of how to install and use VPN technologies that are available for Windows NT and Unix, such as PPTP and L2TP, AltaVista Tunnel, Cisco PIX Firewall, and the Secure Shell (SSH)."--Jacket. 000012490 650_0 $$aBusiness enterprises$$xComputer networks. 000012490 650_0 $$aComputer networks$$xSecurity measures. 000012490 650_0 $$aComputer networks. 000012490 650_0 $$aInternet. 000012490 650_0 $$aBusiness enterprises. 000012490 650_0 $$aTelecommuting. 000012490 650_0 $$aInternet$$xLaw and legislation. 000012490 650_4 $$aVIRTUAL PRIVATE NETWORKS (VPN) 000012490 650_4 $$aNETWORK SECURITY : VIRUTAL PRIVATE NETWORKS (VPN) 000012490 650_4 $$aINFORMATION SCIENCE (DOCUMENTATION) : AUTOMATED INFORMATION PROCESSING TOOLS : COMPUTER SECURITY BASIS 000012490 650_6 $$aTélétravail. 000012490 650_6 $$aRéseaux d'ordinateurs$$xSécurité$$xMesures. 000012490 7001_ $$aErwin, Mike,$$d1969- 000012490 7001_ $$aWolfe, Paul,$$eauthor. 000012490 7001_ $$aScott, Charlie,$$eauthor. 000012490 7102_ $$aSafari Tech Books Online. 000012490 830_0 $$aNutshell handbooks. 000012490 903__ $$v1 000012490 942__ $$cMON 000012490 980__ $$aBIB 000012490 999__ $$c12933$$d12933