feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Akademie d. Wiss.  (2)
  • SB Ulrich Plenzdorf Seelow
  • Wolfe, Paul  (2)
Type of Medium
Language
Region
Library
Years
Subjects(RVK)
  • 1
    UID:
    b3kat_BV023691034
    Format: XI, 177 S. , Ill., graph. Darst. , 24 cm
    Edition: 1. ed.
    ISBN: 1565923197
    Language: Undetermined
    Keywords: Virtuelles privates Netzwerk
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    gbv_243738323
    Format: XI, 177 S , Ill., graph. Darst
    Edition: 1. ed.
    ISBN: 1565923197
    Content: Klappentext: Historically, only large companies could afford secure networks, which they created from expensive leased lines. Smaller folks had to make do with the relatively untrusted Internet. Nowadays, even large companies have to go outside their private nets, because so many people telecommute or log in while they're on the road. How do you provide a low-cost, secure electronic network for your organization? The solution is a virtual private network: a collection of technologies that creates secure connections or "tunnels" over regular Internet lines -- connections that can be easily used by anybody logging in from anywhere. A number of products now exist to help you develop that solution. This book tells you how to plan and build a VPN. It starts with general concerns like costs, configuration, and how a VPN fits in with other networking technologies like firewalls. It continues with detailed descriptions of how to install and use VPN technologies that are available for Windows NT and UNIX, such as PPTP and L2TP, Altavista Tunnel, Cisco PIX, and the secure shell (SSH). New features in the second edition include SSH, which is a popular VPN solution for UNIX systems, and an expanded description of the IPSec standard, for which several vendors have announced support. Topics include: How the VPN compares to other available networking technologies Introduction to encryption, firewalls, the IPSec standard, and other technologies that let VPNs work Point to Point Tunneling Protocol (PPTP) and LT2P The Altavista Tunnel The Cisco PIX Firewall Secure Shell (SSH) Maintenance and troubleshooting.
    Note: Dt. Ausg. u.d.T.: Scott, Charlie: Virtuelle private Netzwerke
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Virtuelles privates Netzwerk ; Virtuelles privates Netzwerk
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages