Magnificent Marvel Supersale
 
 

Special Offers see all

Enter to WIN a $100 Credit

Subscribe to PowellsBooks.news
for a chance to win.
Privacy Policy

Visit our stores


    Recently Viewed clear list


    Interviews | March 10, 2015

    Shawn Donley: IMG Claire Fuller: The Powells.com Interview



    Claire FullerOur Endless Numbered Days tells the story of eight-year-old Peggy and her survivalist father, James, who inexplicably leave behind their London home... Continue »

    spacer
Qualifying orders ship free.
$2.75
Used Trade Paper
Ships in 1 to 3 days
Add to Wishlist
Qty Store Section
1 Local Warehouse Networking- General

More copies of this ISBN

Virtual Private Networks 2ND Edition

by

Virtual Private Networks 2ND Edition Cover

 

Synopses & Reviews

Publisher Comments:

Historically, only large companies could afford secure networks, which they created from expensive leased lines. Smaller folks had to make do with the relatively untrusted Internet. Nowadays, even large companies have to go outside their private nets, because so many people telecommute or log in while they're on the road. How do you provide a low-cost, secure electronic network for your organization?The solution is a virtual private network: a collection of technologies that creates secure connections or "tunnels" over regular Internet lines--connections that can be easily used by anybody logging in from anywhere. A number of products now exist to help you develop that solution.This book tells you how to plan and build a VPN. It starts with general concerns like costs, configuration, and how a VPN fits in with other networking technologies like firewalls. It continues with detailed descriptions of how to install and use VPN technologies that are available for Windows NT and Unix, such as PPTP and L2TP, Altavista Tunnel, Cisco PIX, and the secure shell (SSH).New features in the second edition include SSH, which is a popular VPN solution for Unix systems, and an expanded description of the IPSec standard, for which several vendors have announced support.Topics include:

  • How the VPN compares to other available networking technologies
  • Introduction to encryption, firewalls, the IPSec standard, and other technologies that let VPNs work
  • Point to Point Tunneling Protocol (PPTP) and L2TP
  • The Altavista Tunnel
  • The Cisco PIX Firewall
  • Secure Shell (SSH)
  • Maintenance and troubleshooting

Book News Annotation:

A guide to setting up systems that can utilize the Internet to access and send information from one network to another, yet remain secure from unauthorized viewers. Four specific solutions are treated, including Layer 2 tunneling through PPTP or L2TP, the Cisco PIX firewall, the AltaVista Tunnel, and Secure Shell. The authors also discuss basics on how VPNs work, how much they cost, and when to use them. Annotation c. by Book News, Inc., Portland, OR (booknews@booknews.com)

Synopsis:

This book explains how to plan and build a Virtual Private Network (VPN), a collection of technologies that creates secure connections or "tunnels" over regular Internet lines. The book discusses costs, configuration, and how to install and use VPN technologies that are available for Windows NT and UNIX.

Synopsis:

Historically, only large companies could afford secure networks, which they created from expensive leased lines. Smaller businesses had to make do with the relatively untrusted Internet. Now, even large companies have to go outside their private nets because so many people telecommute or log in while they're on the road. How do you provide a low-cost, secure electronic network for your organization? The solution is a Virtual Private Network (VPN): a collection of technologies that creates secure connections or "tunnels" over regular Internet lines--connections that can be easily used by anybody logging in from anywhere. This book tells you how to plan and build a VPN. It starts with general concerns like costs, configuration, and how a VPN fits in with other networking technologies like firewalls. It continues with detailed descriptions of how to install and use technologies that are available for Windows NT and Unix, such as PPTP and L2TP, Altavista Tunnel, Cisco PIX, and the secure shell (SSH). New features in the second edition include SSH and an expanded description of the IPSec standard, for which several vendors have announced support.

About the Author

Mike Erwin CISSP is a founder of Symbiot, Inc., an information security company specializing in computer crime, forensics, and threat modeling. Prior to Symbiot, he thwarted spam at an ISP and data center company he founded in 1994, and prior to that was an Internet services manager at Apple Computer. He has given conference presentations on a variety of topics, including how to stop a spammer.
Charlie Scott is an Information Security Analyst for the City of Austin, where he helps maintain the City's network security infrastructure and helps analyze intrusion detection data. He has nearly ten years of experience in the Internet industry and has been an avid user of open source security software that entire time. Charlie is a Certified Information Systems Security Professional (CISSP) and a Cisco Certified Network Professional (CCNP).

Bert Hayes is a Security Technical Analyst for the State of Texas, where he maintains network security for a medium sized agency. In Bert's ten years of IT industry experience, he has done everything from managing a corporate IT shop during a successful IPO to performing white hat penetration tests for corporate and government offices. He has long been a proponent of open source solutions, and is a Red Hat Certified Engineer (RHCE).

Paul Wolfe is an independent information security consultant and author, specializing in open source security.

Paul Wolfe is an independent information security consultant and author. Before going freelance, he spent eight years in the data center industry (the source and destination of much spam), where he implemented secure electronic commerce and e-mail systems for small to mid-sized companies. Paul has performed information security work for Fortune 500 companies, law enforcement, and government.

Table of Contents

PrefaceChapter 1: Why Build a Virtual Private Network?Chapter 2: Basic VPN TechnologiesChapter 3: Wide Area, Remote Access, and the VPNChapter 4: Implementing Layer 2 ConnectionsChapter 5: Configuring and Testing Layer 2 ConnectionsChapter 6: Implementing the AltaVista Tunnel 98Chapter 7: Configuring and Testing the AltaVista TunnelChapter 8: Creating a VPN with the Unix Secure ShellChapter 9: The Cisco PIX FirewallChapter 10: Managing and Maintaining Your VPNChapter 11: A VPN ScenarioEmerging Internet TechnologiesResources, Online and OtherwiseColophon

Product Details

ISBN:
9781565925298
Editor:
Oram, Andy
Author:
Oram, Andy
Author:
Wolfe, Paul
Author:
Erwin, Mike
Author:
Scott, Charlie
Author:
Scott Wolfe Erwin
Publisher:
O'Reilly Media
Location:
Sebastopol, CA :
Subject:
Internet - General
Subject:
Networking - General
Subject:
Computer networks
Subject:
Computers
Subject:
Business enterprises
Subject:
Virtual Reality
Subject:
Extranets (computer networks)
Subject:
Internet - Security
Subject:
Security
Subject:
Security measures
Subject:
Business Software - General
Subject:
Internet
Subject:
Telecommuting
Subject:
Extranets
Subject:
Computer Bks - Communications; Networking
Subject:
Computer operating systems
Subject:
Books; Computers & Internet; Web Development; Security & Encryption; Network Security
Subject:
Books; Computers & Internet; Web Development; Security & Encryption; Encryption
Subject:
Computer Books: General
Subject:
Security - General
Subject:
Computer networks -- Security measures.
Subject:
VPN;Virtual Private Networks;encryption;firewall;internet;security
Copyright:
Edition Number:
2
Edition Description:
Second Edition
Series:
O'Reilly Nutshell
Publication Date:
19981231
Binding:
TRADE PAPER
Language:
English
Illustrations:
Yes
Pages:
230
Dimensions:
9.17x7.03x.62 in. .92 lbs.

Other books you might like

  1. Programming Internet Email Used Hardcover $1.00
  2. Knitting in Plain English
    Used Trade Paper $8.95
  3. Crocheting in Plain English
    Used Trade Paper $5.95
  4. Take off Your Glasses & See: How to... Used Hardcover $10.95
  5. Virtual Private Networks: Making the... New Trade Paper $75.25

Related Subjects

Computers and Internet » Artificial Intelligence » General
Computers and Internet » Internet » General
Computers and Internet » Internet » Information
Computers and Internet » Internet » Web Publishing
Computers and Internet » Networking » Computer Security
Computers and Internet » Networking » General

Virtual Private Networks 2ND Edition Used Trade Paper
0 stars - 0 reviews
$2.75 In Stock
Product details 230 pages O'Reilly & Associates - English 9781565925298 Reviews:
"Synopsis" by ,
This book explains how to plan and build a Virtual Private Network (VPN), a collection of technologies that creates secure connections or "tunnels" over regular Internet lines. The book discusses costs, configuration, and how to install and use VPN technologies that are available for Windows NT and UNIX.
"Synopsis" by , Historically, only large companies could afford secure networks, which they created from expensive leased lines. Smaller businesses had to make do with the relatively untrusted Internet. Now, even large companies have to go outside their private nets because so many people telecommute or log in while they're on the road. How do you provide a low-cost, secure electronic network for your organization? The solution is a Virtual Private Network (VPN): a collection of technologies that creates secure connections or "tunnels" over regular Internet lines--connections that can be easily used by anybody logging in from anywhere. This book tells you how to plan and build a VPN. It starts with general concerns like costs, configuration, and how a VPN fits in with other networking technologies like firewalls. It continues with detailed descriptions of how to install and use technologies that are available for Windows NT and Unix, such as PPTP and L2TP, Altavista Tunnel, Cisco PIX, and the secure shell (SSH). New features in the second edition include SSH and an expanded description of the IPSec standard, for which several vendors have announced support.
spacer
spacer
  • back to top

FOLLOW US ON...

     
Powell's City of Books is an independent bookstore in Portland, Oregon, that fills a whole city block with more than a million new, used, and out of print books. Shop those shelves — plus literally millions more books, DVDs, and gifts — here at Powells.com.