\(
\def\WIPO{World Intellectual Property Organisation}
\)
Virtual private networks / Charlie Scott, Paul Wolfe, and Mike Erwin.
1999
D 710 SCO.V
شكل
| تنسيق | |
|---|---|
| BibTeX | |
| MARCXML | |
| TextMARC | |
| MARC | |
| DataCite | |
| DublinCore | |
| EndNote | |
| NLM | |
| RefWorks | |
| RIS |
تفاصيل
Title
Virtual private networks / Charlie Scott, Paul Wolfe, and Mike Erwin.
الطبعة
Second edition.
الوصف
xiv, 211 pages : illustrations ; 24 cm.
الرقم الدولي المعياري للكتاب
1565925297
9781565925298 acid-free paper
9781565925298 acid-free paper
Alternate Call Number
D 710 SCO.V
ملخص
"How do you provide a low-cost, secure electronic network for your organization?" "The solution is a virtual private network: a collection of technologies that creates secure connections or "tunnels" over regular Internet lines - connections that can be easily used by anybody logging in from anywhere. A number of products now exist to help you develop that solution." "This book tells you how to plan and build a VPN. It starts with general concerns like costs, configuration, and how a VPN fits in with other networking technologies like firewalls. It continues with detailed descriptions of how to install and use VPN technologies that are available for Windows NT and Unix, such as PPTP and L2TP, AltaVista Tunnel, Cisco PIX Firewall, and the Secure Shell (SSH)."--Jacket.
ملاحظة
La couv. porte aussi : "Turning the Internet into your private network."
Untertitel auf dem Umschlag: Turning the internet into your private network.
"Turning the Internet into your private network"--Cover.
A la part superior de la coberta: "Turning the Internet into your private network."
¿7FTurning the Internet into your private network"--Cover.
Untertitel auf dem Umschlag: Turning the internet into your private network.
"Turning the Internet into your private network"--Cover.
A la part superior de la coberta: "Turning the Internet into your private network."
¿7FTurning the Internet into your private network"--Cover.
ملاحظة الفهرس, إلخ
Includes bibliographical references and index.
ملاحظة المحتويات المنسقة
Why build a virtual private network?
Basic VPN technologies
Wide area, remote access, and the VPN
Implementing Layer 2 connections
Configuring and testing Layer 2 connections
Implementing the AltaVista Tunnel 98
Configuring and testing the AltaVista Tunnel
Creating a VPN with the Unix Secure Shell
The Cisco PIX firewall
Managing and maintaining your VPN
A VPN scenario.
Basic VPN technologies
Wide area, remote access, and the VPN
Implementing Layer 2 connections
Configuring and testing Layer 2 connections
Implementing the AltaVista Tunnel 98
Configuring and testing the AltaVista Tunnel
Creating a VPN with the Unix Secure Shell
The Cisco PIX firewall
Managing and maintaining your VPN
A VPN scenario.
السلسلة
السلسلة
Nutshell handbooks.
Published
Beijing [China] : O'Reilly, c1999.
اللغة(لغات)
eng
السجل يظهر فى
Added Corporate Author
Review
"How do you provide a low-cost, secure electronic network for your organization?" "The solution is a virtual private network: a collection of technologies that creates secure connections or "tunnels" over regular Internet lines - connections that can be easily used by anybody logging in from anywhere. A number of products now exist to help you develop that solution." "This book tells you how to plan and build a VPN. It starts with general concerns like costs, configuration, and how a VPN fits in with other networking technologies like firewalls. It continues with detailed descriptions of how to install and use VPN technologies that are available for Windows NT and Unix, such as PPTP and L2TP, AltaVista Tunnel, Cisco PIX Firewall, and the Secure Shell (SSH)."--Jacket.