CHF 176.00

Virtual Private Networking
A Construction, Operation and Utilization Guide

Englisch · Taschenbuch

Versand in der Regel in 1 bis 3 Wochen

Beschreibung

Mehr lesen

Informationen zum Autor Gilbert Held is an award winning author and lecturer. Gil has written over 50 technical books and 400 articles over the past 30 years. In addition, Gil has earned many accolades and has been presented with an award from the Association of American Publishers. He has also been selected by Federal Computer Week to join the Federal 100, a list of the top 100 persons in academia, industry and the Federal Government that have made a significant impact upon the equipment acquisition process. Klappentext This book provides network managers, LAN administrators and small business operators with all they need to know to "interconnect" multiple locations or travelling employees that need to access a single location. The operation and utilization of virtual private networks is discussed both in theory and practicality, covering the technical aspects associated with encryption and digital certificates as well as the manner by which readers can create VPNs using readily available products from Microsoft, Cisco, Checkpoint and possibly other vendors.The author was among the first to write about the concept of virtual private networking in a series of articles published over five years ago, and in the intervening years this has become a very hot topic - with the technology being increasing deployed by companies.Virtual Private Networking, by Gilbert Held, covers the technology and the theory, but also shows readers, through numerous examples, 'how to use ' the technology. Zusammenfassung A virtual private network (VPN) is a private data network that makes use of the public telecommunication infrastructure. It gives the user the same capabilities at much lower cost by using the shared public infrastructure rather than a private one. Inhaltsverzeichnis Preface xiii Acknowledgements xv Chapter 1 Introduction to Virtual Private Networking 1 1.1 THE VPN CONCEPT 1 1.1.1 DEFINITION 1 1.1.2 TYPES OF VPNS 2 1.1.3 CATEGORIES OF VPNS 4 1.1.4 INFRASTRUCTURE 8 1.1.5 BENEFITS OF USE 9 1.1.6 DISADVANTAGES OF VPNS 12 1.1.7 VPN PROTOCOLS 14 1.1.8 SUMMARY 17 1.1.9 ALTERNATIVES TO VPNS 18 1.1.10 ECONOMIC ISSUES 19 1.1.11 OTHER ALTERNATIVES 20 1.2 BOOK PREVIEW 20 1.2.1 UNDERSTANDING AUTHENTICATION AND CRYPTOLOGY 21 1.2.2 UNDERSTANDING THE TCP/IP PROTOCOL SUITE 21 1.2.3 LAYER 2 VPN TECHNIQUES 21 1.2.4 HIGHER LAYER VPNS 22 1.2.5 VPN HARDWARE AND SOFTWARE 22 1.2.6 SERVICE PROVIDER-BASED VPNS 22 Chapter 2 Understanding Authentication and Encryption 23 2.1 AUTHENTICATION 23 2.1.1 PASSWORD AUTHENTICATION PROTOCOL 24 2.1.2 CHALLENGE-HANDSHAKE AUTHENTICATION PROTOCOL 27 2.1.3 EXTENSIBLE AUTHENTICATION PROTOCOL - TRANSPORT LEVEL SECURITY 30 2.1.4 TOKEN AUTHENTICATION 30 2.2 ENCRYPTION 31 2.2.1 GENERALMETHOD OF OPERATION 31 2.2.2 PRIVATE VERSUS PUBLIC KEY SYSTEMS 33 2.2.3 PUBLIC KEY ENCRYPTION 34 2.2.4 THE RSA ALGORITHM 35 2.2.5 DIGITAL CERTIFICATES 40 2.2.6 HASHING AND DIGITAL SIGNATURES 49 Chapter 3 Understanding the TCP/IP Protocol Suite 53 3.1 FRAME FORMATION 53 3.1.1 HEADER SEQUENCING 54 3.1.2 SEGMENTS AND DATAGRAMS 54 3.1.3 ICMP MESSAGES 55 3.1.4 ON THE LAN 56 3.1.5 DATAFLOW CONTROL FIELDS 56 3.2 THE NETWORK LAYER 57 3.2.1 THE IPV4 HEADER 57 3.2.2 SUBNETTING 61 3.2.3 THE SUBNETMASK 63 3.2.4 THEWILDCARDMASK 63 3.2.5 ICMP 65 3.3 THE TRANSPORT LAYER 69 3.3.1 TRANSPORT LAYER PROTOCOLS 69 3.3.2 THE TCP HEADER 69 3.3.3 THE UDP HEADER 70 3.3.4 SOURCE AND DESTINATION PORT FIELDS 71 3.4 PROXY SERVICES AND NETWORK ADDRESS TRANSLATION 73 3.4.1 PROXY SERVICE 73 3.4.2 NETWORK ADDRESS TR...

Kundenrezensionen

Zu diesem Artikel wurden noch keine Rezensionen verfasst. Schreibe die erste Bewertung und sei anderen Benutzern bei der Kaufentscheidung behilflich.

Schreibe eine Rezension

Top oder Flop? Schreibe deine eigene Rezension.

Für Mitteilungen an CeDe.ch kannst du das Kontaktformular benutzen.

Die mit * markierten Eingabefelder müssen zwingend ausgefüllt werden.

Mit dem Absenden dieses Formulars erklärst du dich mit unseren Datenschutzbestimmungen einverstanden.