This book explains how to plan and build a Virtual Private Network (VPN), a collection of technologies that creates secure connections or "tunnels" over regular Internet lines. It discusses costs, configuration, and how to install and use VPN technologies that are available for Windows NT and Unix, such as PPTP and L2TP, Altavista Tunnel, Cisco PIX, and the secure shell (SSH). New features in the second edition include SSH and an expanded description of the IPSec standard.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
Charlie Scott is the Senior Vice President of OuterNet Connection Strategies, Inc., an Internet service provider and outsource company based in Austin, Texas and specializing in innovative and emergent technologies. At OuterNet, he helps create and implement new products for their network operations center and co-location facilities. While an undergraduate at the University of Texas at Austin, Charlie was a research assistant in a cognitive science lab, and planned on going to graduate school in that field. He was eventually able to get his BA in Psychology. But he always enjoyed working with computers, and his exposure to the Internet at UT deviated him enough to abandon all plans for graduate school and start working with computer networks. The next few years saw him at Texas Instruments, IBM, and Wayne-Dresser before he helped found OuterNet. Charlie has also co-authored a half-dozen Internet-related books (many with Mike and Paul), on topics ranging from electronic commerce to CGI programming. He has also completed his MCSE and is working towards other certifications. When he finds spare time, Charlie likes to write and read fiction. He also enjoys spending time with his wife, Mary, and their four beautiful felines. Paul Wolfe has done everything from driving M1A1 tanks in Desert Storm to slinging computer chips for Motorola. He now divides his time between his family and his job, as well as writing. He has written four books in the last two years, covering such topics as Windows NT Web servers, Internet commerce, VRML, and Virtual Private Networks. Paul is currently a team leader for system builds, hardware inventory, and ISDN deployment for Tivoli Systems, an IBM company. He dreams of restoring his 1986 Toyota Tercel to its former glory and racing it on the stock car circuit. Mike Erwin is the President and Chief Executive Officer of OuterNet Connection Strategies, Inc. Mike has served these posts for the last four years, during which he also worked for Apple Computer, Inc., architecting and implementing connectivity, application, scripting and development support for Apple's Worldwide Support Center. Mr. Erwin is the co-author of several other works, including the CGI Bible, Building Web Commerce Sites, and the 60 Minute Guide to VRML. Mike's technology related interests involve encryption algorithms, super computing, Distributed Operating Systems, universe game simulations, and building secondary securities markets on the Net. Before becoming completely immersed in work, Mike used to find that his hobbies included playing hearts, drinking cheap vodka, staying up until dawn, and doodling with oil paints with his left hand. Mike's current favorite things include dabbling with theoretical and particle physics, martial arts training, gambling, securities prospecting, and, of course, sleeping.
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
EUR 4,01 für den Versand von Vereinigtes Königreich nach Deutschland
Versandziele, Kosten & DauerGratis für den Versand innerhalb von/der Deutschland
Versandziele, Kosten & DauerAnbieter: WorldofBooks, Goring-By-Sea, WS, Vereinigtes Königreich
Paperback. Zustand: Very Good. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged. Artikel-Nr. GOR001773552
Anzahl: 1 verfügbar
Anbieter: Reuseabook, Gloucester, GLOS, Vereinigtes Königreich
paperback. Zustand: Used; Very Good. Dispatched, from the UK, within 48 hours of ordering. Though second-hand, the book is still in very good shape. Minimal signs of usage may include very minor creasing on the cover or on the spine. Artikel-Nr. CHL10470690
Anzahl: 1 verfügbar
Anbieter: medimops, Berlin, Deutschland
Zustand: good. Befriedigend/Good: Durchschnittlich erhaltenes Buch bzw. Schutzumschlag mit Gebrauchsspuren, aber vollständigen Seiten. / Describes the average WORN book or dust jacket that has all the pages present. Artikel-Nr. M01565925297-G
Anzahl: 1 verfügbar
Anbieter: ThriftBooks-Dallas, Dallas, TX, USA
Paperback. Zustand: As New. No Jacket. Pages are clean and are not marred by notes or folds of any kind. ~ ThriftBooks: Read More, Spend Less 1.04. Artikel-Nr. G1565925297I2N00
Anzahl: 1 verfügbar
Anbieter: Better World Books: West, Reno, NV, USA
Zustand: Good. 2nd. Used book that is in clean, average condition without any missing pages. Artikel-Nr. GRP69408851
Anzahl: 1 verfügbar
Anbieter: Wonder Book, Frederick, MD, USA
Zustand: Very Good. Very Good condition. 2nd edition. A copy that may have a few cosmetic defects. May also contain light spine creasing or a few markings such as an owner's name, short gifter's inscription or light stamp. Bundled media such as CDs, DVDs, floppy disks or access codes may not be included. Artikel-Nr. N13D-02747
Anzahl: 1 verfügbar
Anbieter: moluna, Greven, Deutschland
Zustand: New. A guide to setting up systems that can utilize the Internet to access and send information from one network to another, yet remain secure from unauthorized viewers. Four specific solutions are treated, including Layer two tunneling through PPTP or L2TP. Artikel-Nr. 596324836
Anzahl: Mehr als 20 verfügbar
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Neuware - Historically, only large companies could afford secure networks, which they created from expensive leased lines. Smaller folks had to make do with the relatively untrusted Internet. Nowadays, even large companies have to go outside their private nets, because so many people telecommute or log in while they're on the road. How do you provide a low-cost, secure electronic network for your organization The solution is a virtual private network: a collection of technologies that creates secure connections or 'tunnels' over regular Internet lines--connections that can be easily used by anybody logging in from anywhere. A number of products now exist to help you develop that solution.This book tells you how to plan and build a VPN. It starts with general concerns like costs, configuration, and how a VPN fits in with other networking technologies like firewalls. It continues with detailed descriptions of how to install and use VPN technologies that are available for Windows NT and Unix, such as PPTP and L2TP, Altavista Tunnel, Cisco PIX, and the secure shell (SSH).New features in the second edition include SSH, which is a popular VPN solution for Unix systems, and an expanded description of the IPSec standard, for which several vendors have announced support.Topics include:How the VPN compares to other available networking technologies - Introduction to encryption, firewalls, the IPSec standard, and other technologies that let VPNs work - Point to Point Tunneling Protocol (PPTP) and L2TP - The Altavista Tunnel - The Cisco PIX Firewall - Secure Shell (SSH) - Maintenance and troubleshooting. Artikel-Nr. 9781565925298
Anzahl: 2 verfügbar
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
Zustand: New. In. Artikel-Nr. ria9781565925298_new
Anzahl: 3 verfügbar
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
Paperback. Zustand: Brand New. 2nd sub edition. 211 pages. 9.50x7.25x0.75 inches. In Stock. Artikel-Nr. x-1565925297
Anzahl: 2 verfügbar