VPNs

Paperback | December 14, 2001

byJohn MairsEditorSteve Elliot

not yet rated|write a review
Ideal for connecting branch offices and remote workers, Virtual Private Networks (VPNs) provide a cost-effective, secure method for connecting to a network. This book is a step-by-step guide to deploying one of the fastest growing methods for remote access, global connections, and extranet connectivity. From understanding VPN technology to security features of VPN to actual implementations, this book covers it all.

Pricing and Purchase Info

$63.95

In stock online
Ships free on orders over $25

From the Publisher

Ideal for connecting branch offices and remote workers, Virtual Private Networks (VPNs) provide a cost-effective, secure method for connecting to a network. This book is a step-by-step guide to deploying one of the fastest growing methods for remote access, global connections, and extranet connectivity. From understanding VPN technolog...

From the Jacket

Design and implement a virtual private network from start to finishTake advantage of the most cost-effective and secure method for connecting branch offices and enabling remote access using "VPNs: A Beginner's Guide. This instructive guide shows you how design and implement a virtual private network from start to finish. Learn everythi...

John Mairs CCNA, CCDA,MCSE MCP+I has been a network administrator and security systems consultant for more than 14 years. He is currently a systems Engineer For GE Capital Information Technology Services where he handles the global enterprise networks and networking security for a Fortune 500 Company.
Format:PaperbackDimensions:9.1 × 7.1 × 1.48 inPublished:December 14, 2001Publisher:OsborneLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:0072191813

ISBN - 13:9780072191813

Look for similar items by category:

Customer Reviews of VPNs

Reviews

Extra Content

Table of Contents

Part I: Networks and Security

Chapter 1: Layering Architecture and the OSI Model

Chapter 2: Network Architectures

Chapter 3: The TCP/IP Protocol Stack

Chapter 4: Security

Chapter 5: Threats and Attack Methods

Chapter 6: Intrusion Detection Systems

Chapter 7: Firewalls

Part II: Virtual Private Networks

Chapter 8: VPN Basics

Chapter 9: VPN Architectures

Part III: VPN Protocols

Chapter 10: Tunneling Protocols

Chapter 11: L2F and L2TP

Part IV: Secure Communication

Chapter 12: Cryptography

Chapter 13: Cryptographic Algorithms

Chapter 14: Certificates

Chapter 15: Authentication

Part V: IPSec

Chapter 16: IPSec Components

Chapter 17: Key Management

Chapter 18: Key Management/Exchange Protocols

Chapter 19: IPSec Architecture and Implementation

Part VI: MPLS

Chapter 20: Quality of Service (QoS)

Chapter 21: Traffic Engineering—Movement of Data

Chapter 22: MPLS Background

Chapter 23: MPLS Components and Concepts