A guide for network administrators, MIS managers, information technologists, and technicians with experience in networking. Shows how to create and maintain a Virtual Private Network (VPN) that allows companies to send data across the Internet through an encrypted "tunnel." Screenshots and step-by-step examples are used to further explain concepts. Wilson has researched design and installation of data interfaces. Doak is a professor of electronics and computer systems technology at the College of the Mainland in Texas. Annotation c. Book News, Inc., Portland, OR (booknews.com)
"synopsis" may belong to another edition of this title.
The time has come, the Walrus said, for virtual private networks (VPNs). Such networks allow the geographically distributed elements of an organization to share files and other resources over what acts like a connection to a local area network (LAN) but is really a secured link across the open (and inexpensive) Internet. The authors of Creating and Implementing Virtual Private Networks understand that VPNs have potentially huge appeal, and they set out to explain the technologies that make them possible. In doing so, they focus on Microsoft's Point-to-Point Tunneling Protocol (PPTP) and Novell's BorderManager, since those are the most accessible VPN technologies.
The book works through LANs and wide area networks (WANs) and then explains how VPNs can combine the strong points of each (security and geographic flexibility, respectively) with the cost-effectiveness of the Internet. It discusses emerging VPN standards, including Layer 2 Transport Protocol (L2TP), Layer 2 Forwarding (L2F), and the IP Secure (IPSec) standards that have come from those standards and PPTP. The authors walk you through two solutions to the same organization's VPN needs: one based on Novell NetWare 5 and BorderManager and one that uses Windows NT 4 and PPTP. The direct comparison of the two solutions on the same problem is helpful and should help you decide which scenario (if either) fits your needs. --David Wall
Topics covered: Technologies for implementing virtual private networks (VPNs) in both generic and proprietary terms. The authors emphasize Microsoft's Point-to-Point Tunneling Protocol (PPTP) and Novell's BorderManager, but also cover the emerging Layer 2 Transport Protocol (L2TP), Layer 2 Forwarding (L2F), and IP Secure (IPSec) standards. VPN architecture gets attention, as do universal problems like cost-effectiveness and security.
Peter Doak (Texas City, TX) has more than 20 years experience in the computer field. He has been a tenured associate professor in electronics and computer systems technology for more than eleven years. At the College of the Mainland in Texas, Doak is administrator for the courses in Electronics Technology, Microcomputer Systems Specialist, and Industrial Instrumentation.
Casey Wilson (Ridgecrest, CA) worked for 37 years as a civil servant with the federal government. Part of his work in infrared technology was designing and installing data interfaces between computers and infrared radiometers. Since becoming a freelance writer, his articles have appeared in national and regional magazines, two of his scripts have been produced for television and he has edited an anthology.
"About this title" may belong to another edition of this title.
Shipping:
FREE
Within U.S.A.
Seller: Better World Books, Mishawaka, IN, U.S.A.
Condition: Good. 1st. Used book that is in clean, average condition without any missing pages. Seller Inventory # GRP98001632
Quantity: 1 available
Seller: ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.
Paperback. Condition: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 2.2. Seller Inventory # G1576104303I4N00
Quantity: 1 available
Seller: ThriftBooks-Dallas, Dallas, TX, U.S.A.
Paperback. Condition: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less 2.2. Seller Inventory # G1576104303I3N00
Quantity: 1 available
Seller: HPB-Red, Dallas, TX, U.S.A.
Paperback. Condition: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority! Seller Inventory # S_324612678
Quantity: 1 available
Seller: Infinity Books Japan, Tokyo, TKY, Japan
Condition: Very Good. A copy that has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged. A guide for network administrators, MIS managers, information technologists, and technicians with experience in networking. Shows how to create and maintain a Virtual Private Network (VPN) that allows companies to send data across the Internet through an encrypted "tunnel." Screenshots and step-by-step examples are used to further explain concepts. Wilson has researched design and installation of data interfaces. Doak is a professor of electronics and computer systems technology at the College of the Mainland in Texas. Annotation c. Book News, Inc., Portland, OR. Seller Inventory # RWARE0000041835
Quantity: 1 available
Seller: The Book Spot, Sioux Falls, MN, U.S.A.
Paperback. Condition: New. Seller Inventory # Abebooks376930
Quantity: 1 available