Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Creating and Implementing Virtual Private Networks: The All-encompassing Resource for Implementing VPNs

Creating and Implementing Virtual Private Networks: The All-encompassing Resource for Implementing VPNs

List Price: $39.99
Your Price: $39.99
Product Info Reviews

Description:

The time has come, the Walrus said, for virtual private networks (VPNs). Such networks allow the geographically distributed elements of an organization to share files and other resources over what acts like a connection to a local area network (LAN) but is really a secured link across the open (and inexpensive) Internet. The authors of Creating and Implementing Virtual Private Networks understand that VPNs have potentially huge appeal, and they set out to explain the technologies that make them possible. In doing so, they focus on Microsoft's Point-to-Point Tunneling Protocol (PPTP) and Novell's BorderManager, since those are the most accessible VPN technologies.

The book works through LANs and wide area networks (WANs) and then explains how VPNs can combine the strong points of each (security and geographic flexibility, respectively) with the cost-effectiveness of the Internet. It discusses emerging VPN standards, including Layer 2 Transport Protocol (L2TP), Layer 2 Forwarding (L2F), and the IP Secure (IPSec) standards that have come from those standards and PPTP. The authors walk you through two solutions to the same organization's VPN needs: one based on Novell NetWare 5 and BorderManager and one that uses Windows NT 4 and PPTP. The direct comparison of the two solutions on the same problem is helpful and should help you decide which scenario (if either) fits your needs. --David Wall

Topics covered: Technologies for implementing virtual private networks (VPNs) in both generic and proprietary terms. The authors emphasize Microsoft's Point-to-Point Tunneling Protocol (PPTP) and Novell's BorderManager, but also cover the emerging Layer 2 Transport Protocol (L2TP), Layer 2 Forwarding (L2F), and IP Secure (IPSec) standards. VPN architecture gets attention, as do universal problems like cost-effectiveness and security.

© 2004, ReviewFocus or its affiliates