VPNs illustrated tunnels, VPNs, and IPsec

Virtual private networks (VPNs) based on the Internet instead of the traditional leased lines offer organizations of all sizes the promise of a low-cost, secure electronic network. However, using the Internet to carry sensitive information can present serious privacy and security problems. By explai...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Snader, Jon C. 1944- (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Upper Saddle River, NJ Addison-Wesley 2005
Schlagworte:
Online-Zugang:lizenzpflichtig
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000cam a22000002 4500
001 ZDB-30-ORH-047357231
003 DE-627-1
005 20240228114044.0
007 cr uuu---uuuuu
008 191023s2005 xx |||||o 00| ||eng c
020 |a 9780321245441  |9 978-0-321-24544-1 
020 |a 032124544X  |c Trade Paper  |9 0-321-24544-X 
020 |a 0134171810  |9 0-13-417181-0 
020 |a 9780134171814  |9 978-0-13-417181-4 
020 |a 8131741370  |9 81-317-4137-0 
020 |a 9788131741375  |9 978-81-317-4137-5 
035 |a (DE-627-1)047357231 
035 |a (DE-599)KEP047357231 
035 |a (ORHE)032124544X 
035 |a (DE-627-1)047357231 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
082 0 |a 004.67/8  |2 22 
100 1 |a Snader, Jon C.  |d 1944-  |e VerfasserIn  |4 aut 
245 1 0 |a VPNs illustrated  |b tunnels, VPNs, and IPsec  |c Jon C. Snader 
246 3 3 |a Tunnels, VPNs, and IPsec 
264 1 |a Upper Saddle River, NJ  |b Addison-Wesley  |c 2005 
300 |a 1 online resource (480 pages)  |b illustrations 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
500 |a Includes bibliographical references and index. - Print version record 
520 |a Virtual private networks (VPNs) based on the Internet instead of the traditional leased lines offer organizations of all sizes the promise of a low-cost, secure electronic network. However, using the Internet to carry sensitive information can present serious privacy and security problems. By explaining how VPNs actually work, networking expert Jon Snader shows software engineers and network administrators how to use tunneling, authentication, and encryption to create safe, effective VPNs for any environment. Using an example-driven approach, VPNs Illustrated explores how tunnels and VPNs function by observing their behavior "on the wire." By learning to read and interpret various network traces, such as those produced by tcpdump, readers will be able to better understand and troubleshoot VPN and network behavior. Specific topics covered include: Block and stream symmetric ciphers, such as AES and RC4; and asymmetric ciphers, such as RSA and EIGamal Message authentication codes, including HMACs Tunneling technologies based on gtunnel SSL protocol for building network-to-network VPNs SSH protocols as drop-in replacements for telnet, ftp, and the BSD r-commands Lightweight VPNs, including VTun, CIPE, tinc, and OpenVPN IPsec, including its Authentication Header (AH) protocol, Encapsulating Security Payload (ESP), and IKE (the key management protocol) Packed with details, the text can be used as a handbook describing the functions of the protocols and the message formats that they use. Source code is available for download, and an appendix covers publicly available software that can be used to build tunnels and analyze traffic flow. VPNs Illustrated gives you the knowledge of tunneling and VPN technology you need to understand existing VPN implementations and successfully create your own 
650 0 |a Extranets (Computer networks) 
650 0 |a IPSec (Computer network protocol) 
650 4 |a Extranets 
650 4 |a IPSec (Protocole de réseaux d'ordinateurs) 
650 4 |a Extranets (Computer networks) 
650 4 |a IPSec (Computer network protocol) 
776 1 |z 032124544X 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 032124544X 
856 4 0 |l TUM01  |p ZDB-30-ORH  |q TUM_PDA_ORH  |u https://learning.oreilly.com/library/view/-/032124544X/?ar  |m X:ORHE  |x Aggregator  |z lizenzpflichtig  |3 Volltext 
912 |a ZDB-30-ORH 
912 |a ZDB-30-ORH 
951 |a BO 
912 |a ZDB-30-ORH 
049 |a DE-91 

Datensatz im Suchindex

DE-BY-TUM_katkey ZDB-30-ORH-047357231
_version_ 1818767357592469504
adam_text
any_adam_object
author Snader, Jon C. 1944-
author_facet Snader, Jon C. 1944-
author_role aut
author_sort Snader, Jon C. 1944-
author_variant j c s jc jcs
building Verbundindex
bvnumber localTUM
collection ZDB-30-ORH
ctrlnum (DE-627-1)047357231
(DE-599)KEP047357231
(ORHE)032124544X
dewey-full 004.67/8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 004 - Computer science
dewey-raw 004.67/8
dewey-search 004.67/8
dewey-sort 14.67 18
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03590cam a22005052 4500</leader><controlfield tag="001">ZDB-30-ORH-047357231</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228114044.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2005 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780321245441</subfield><subfield code="9">978-0-321-24544-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">032124544X</subfield><subfield code="c">Trade Paper</subfield><subfield code="9">0-321-24544-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0134171810</subfield><subfield code="9">0-13-417181-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780134171814</subfield><subfield code="9">978-0-13-417181-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">8131741370</subfield><subfield code="9">81-317-4137-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9788131741375</subfield><subfield code="9">978-81-317-4137-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047357231</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047357231</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)032124544X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047357231</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.67/8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Snader, Jon C.</subfield><subfield code="d">1944-</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">VPNs illustrated</subfield><subfield code="b">tunnels, VPNs, and IPsec</subfield><subfield code="c">Jon C. Snader</subfield></datafield><datafield tag="246" ind1="3" ind2="3"><subfield code="a">Tunnels, VPNs, and IPsec</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Upper Saddle River, NJ</subfield><subfield code="b">Addison-Wesley</subfield><subfield code="c">2005</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (480 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Virtual private networks (VPNs) based on the Internet instead of the traditional leased lines offer organizations of all sizes the promise of a low-cost, secure electronic network. However, using the Internet to carry sensitive information can present serious privacy and security problems. By explaining how VPNs actually work, networking expert Jon Snader shows software engineers and network administrators how to use tunneling, authentication, and encryption to create safe, effective VPNs for any environment. Using an example-driven approach, VPNs Illustrated explores how tunnels and VPNs function by observing their behavior "on the wire." By learning to read and interpret various network traces, such as those produced by tcpdump, readers will be able to better understand and troubleshoot VPN and network behavior. Specific topics covered include: Block and stream symmetric ciphers, such as AES and RC4; and asymmetric ciphers, such as RSA and EIGamal Message authentication codes, including HMACs Tunneling technologies based on gtunnel SSL protocol for building network-to-network VPNs SSH protocols as drop-in replacements for telnet, ftp, and the BSD r-commands Lightweight VPNs, including VTun, CIPE, tinc, and OpenVPN IPsec, including its Authentication Header (AH) protocol, Encapsulating Security Payload (ESP), and IKE (the key management protocol) Packed with details, the text can be used as a handbook describing the functions of the protocols and the message formats that they use. Source code is available for download, and an appendix covers publicly available software that can be used to build tunnels and analyze traffic flow. VPNs Illustrated gives you the knowledge of tunneling and VPN technology you need to understand existing VPN implementations and successfully create your own</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Extranets (Computer networks)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">IPSec (Computer network protocol)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Extranets</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">IPSec (Protocole de réseaux d'ordinateurs)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Extranets (Computer networks)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">IPSec (Computer network protocol)</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">032124544X</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">032124544X</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/032124544X/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection>
id ZDB-30-ORH-047357231
illustrated Illustrated
indexdate 2024-12-18T08:48:36Z
institution BVB
isbn 9780321245441
032124544X
0134171810
9780134171814
8131741370
9788131741375
language English
open_access_boolean
owner DE-91
DE-BY-TUM
owner_facet DE-91
DE-BY-TUM
physical 1 online resource (480 pages) illustrations
psigel ZDB-30-ORH
publishDate 2005
publishDateSearch 2005
publishDateSort 2005
publisher Addison-Wesley
record_format marc
spelling Snader, Jon C. 1944- VerfasserIn aut
VPNs illustrated tunnels, VPNs, and IPsec Jon C. Snader
Tunnels, VPNs, and IPsec
Upper Saddle River, NJ Addison-Wesley 2005
1 online resource (480 pages) illustrations
Text txt rdacontent
Computermedien c rdamedia
Online-Ressource cr rdacarrier
Includes bibliographical references and index. - Print version record
Virtual private networks (VPNs) based on the Internet instead of the traditional leased lines offer organizations of all sizes the promise of a low-cost, secure electronic network. However, using the Internet to carry sensitive information can present serious privacy and security problems. By explaining how VPNs actually work, networking expert Jon Snader shows software engineers and network administrators how to use tunneling, authentication, and encryption to create safe, effective VPNs for any environment. Using an example-driven approach, VPNs Illustrated explores how tunnels and VPNs function by observing their behavior "on the wire." By learning to read and interpret various network traces, such as those produced by tcpdump, readers will be able to better understand and troubleshoot VPN and network behavior. Specific topics covered include: Block and stream symmetric ciphers, such as AES and RC4; and asymmetric ciphers, such as RSA and EIGamal Message authentication codes, including HMACs Tunneling technologies based on gtunnel SSL protocol for building network-to-network VPNs SSH protocols as drop-in replacements for telnet, ftp, and the BSD r-commands Lightweight VPNs, including VTun, CIPE, tinc, and OpenVPN IPsec, including its Authentication Header (AH) protocol, Encapsulating Security Payload (ESP), and IKE (the key management protocol) Packed with details, the text can be used as a handbook describing the functions of the protocols and the message formats that they use. Source code is available for download, and an appendix covers publicly available software that can be used to build tunnels and analyze traffic flow. VPNs Illustrated gives you the knowledge of tunneling and VPN technology you need to understand existing VPN implementations and successfully create your own
Extranets (Computer networks)
IPSec (Computer network protocol)
Extranets
IPSec (Protocole de réseaux d'ordinateurs)
032124544X
Erscheint auch als Druck-Ausgabe 032124544X
TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/032124544X/?ar X:ORHE Aggregator lizenzpflichtig Volltext
spellingShingle Snader, Jon C. 1944-
VPNs illustrated tunnels, VPNs, and IPsec
Extranets (Computer networks)
IPSec (Computer network protocol)
Extranets
IPSec (Protocole de réseaux d'ordinateurs)
title VPNs illustrated tunnels, VPNs, and IPsec
title_alt Tunnels, VPNs, and IPsec
title_auth VPNs illustrated tunnels, VPNs, and IPsec
title_exact_search VPNs illustrated tunnels, VPNs, and IPsec
title_full VPNs illustrated tunnels, VPNs, and IPsec Jon C. Snader
title_fullStr VPNs illustrated tunnels, VPNs, and IPsec Jon C. Snader
title_full_unstemmed VPNs illustrated tunnels, VPNs, and IPsec Jon C. Snader
title_short VPNs illustrated
title_sort vpns illustrated tunnels vpns and ipsec
title_sub tunnels, VPNs, and IPsec
topic Extranets (Computer networks)
IPSec (Computer network protocol)
Extranets
IPSec (Protocole de réseaux d'ordinateurs)
topic_facet Extranets (Computer networks)
IPSec (Computer network protocol)
Extranets
IPSec (Protocole de réseaux d'ordinateurs)
url https://learning.oreilly.com/library/view/-/032124544X/?ar
work_keys_str_mv AT snaderjonc vpnsillustratedtunnelsvpnsandipsec
AT snaderjonc tunnelsvpnsandipsec