HomeGroupsTalkZeitgeist
Hide this

Results from Google Books

Click on a thumbnail to go to Google Books.

Guide to Virtual Private Networks by Tim A.…
Loading...

Guide to Virtual Private Networks

by Tim A. Bourne

MembersReviewsPopularityAverage ratingConversations
1None3,689,591NoneNone
Recently added bygrahamhay

No tags.

None.

None
Loading...

Sign up for LibraryThing to find out whether you'll like this book.

No current Talk conversations about this book.

No reviews
no reviews | add a review
You must log in to edit Common Knowledge data.
For more help see the Common Knowledge help page.
Series (with order)
Canonical title
Original title
Alternative titles
Original publication date
People/Characters
Important places
Important events
Related movies
Awards and honors
Epigraph
Dedication
First words
Quotations
Last words
Disambiguation notice
Publisher's editors
Blurbers
Publisher series
Original language

References to this work on external resources.

Wikipedia in English

None

Book description
Haiku summary

Amazon.com Amazon.com Review (ISBN 0130839647, Paperback)

What makes Internet Protocol Security Architecture (IPSec) virtual private networks (VPNs) secure? A Guide to Virtual Private Networks does a great job of explaining the processes that--in theory, anyway--do. The book covers the data-handling and security aspects of these VPNs with an eye toward implementing one. You'll find a comprehensive portrait of the technologies that define VPNs governed by the IPSec specification.

This book clearly explains how the Internet Security Association and Key Management Protocol (ISAKMP) and the Oakley key-exchange protocol work. It also provides details on how Internet Key Exchange (IKE) works under ISAKMP/Oakley. The workings of all these protocols are explained by dissecting transactions into their individual phases, enabling you to follow what happens and design your VPN to be as efficient and secure as possible.

Three VPN implementation scenarios are presented, including individual users accessing a VPN via dial-up connections to the Internet, geographically separate organizational LANs linked to each other across the public network, and an extranet that includes semitrusted customers or suppliers. Each of these scenarios includes information on router and firewall configuration. --David Wall

(retrieved from Amazon Thu, 12 Mar 2015 18:00:06 -0400)

No library descriptions found.

Quick Links

Swap Ebooks Audio
1 avail.

Popular covers

Rating

Average: No ratings.

Is this you?

Become a LibraryThing Author.

 

You are using the new servers! | About | Privacy/Terms | Help/FAQs | Blog | Store | APIs | TinyCat | Legacy Libraries | Early Reviewers | Common Knowledge | 117,020,117 books! | Top bar: Always visible