Virtual Private Networks for Dummies
Virtual Private Networks for Dummies offers you a no-nonsense, practical guide to evaluating your company’s need for a VPN, understanding what it takes to implement one, and undertaking the challenging quest to set it up, make it work, and keep it safe. Whether you’re the resident expert leading the project team, or you just want to learn what makes e-commerce tick, this detailed, from-the-ground-up guide will soon have you comfortably conceptualizing:
- Security goals and strategies
- The evolution of VPNs
- Privacy in VPNs
- Remote-Access VPNs
- Custom network solutions design
- Testing VPNs
- And more
With new products and technologies offering supposedly revolutionary solutions to IT departments every day, this book focuses on the real world – you know, the one full of obstacles, mishaps, threats, delays, and errors – and gives you the background knowledge to make decisions for yourself about your VPN needs. Written with a dash of humor, Virtual Private Networks for Dummies contains both technical detail (standards, protocols, etc.) and more general concepts (such as conducting cost-benefit analyses). This clear, authoritative guide will have you securely and cost-effectively networking over the Internet in no time.
Table of Contents
PART I: Unlocking the Mysteries of VPNs.
Chapter 1: Embracing Virtual Private Networks.
Chapter 2: Touring the Land of VPNs.
Chapter 3: Putting Privacy into VPNs.
Chapter 4: Public Keys, Private Messages.
Chapter 5: Fighting for the QoS.
PART II: Applying VPNs in the Real World.
Chapter 6: Extraordinary Extranets.
Chapter 7: Remotely Possible.
Chapter 8: Branching Out All Over.
Chapter 9: Justify Yourself.
Chapter 10: Let Your Requirements Be Your Guide.
PART III: Roadmap for VPN Solutions.
Chapter 11: Designing Custom VPN Network Solutions.
Chapter 12: Evaluating and Selecting VPN and PKI Solutions.
Chapter 13: Implementing Your VPN and PKI.
Chapter 14: Testing Your VPN.
Chapter 15: Living in a VPN-Wired World.
PART IV: The Part of Tens.
Chapter 16: Ten VPN Online Information Sources.
Chapter 17: More Than Ten VPN Standards.
Chapter 18: More Than Ten Steps to an Information Privacy Checklist.
Chapter 19: Ten Security and Security- Testing Specialists.
PART V: Appendixes.
Appendix A: VPN Buyer's Guide.
Appendix B: Glossary.
Appendix C: Inside IPSec.
Book Registration Information.
Sign up now »
- FTWeb Developer- Drupal and PHP. Exciting new position- #2 in Dev team.$100k+SuperNSW
- FTR&D EngineerSA
- FT.NET - Sitecore Developer - Melbourne - PermNSW
- FTSenior Python Web Applications DeveloperNSW
- FTQuality ManagerSA
- FTSenior Python DeveloperNSW
- FTOS Web Applications DeveloperNSW
- FTSenior Python DeveloperNSW
- FTLead Software EngineerSA
With so many Information Technology solutions available to choose from today, many organizations put their trust in the experience, insight and advice of Gartner, and their industry-leading analysts. Trend Micro’s ...
"Darn those pesky laws that get in the way of commercial exploitation ..."
Larry Page wants to see your medical records
"Instead of partitioning the device between corporate and personal data, another approach ..."
Dual-Persona Smartphones Not a BYOD Panacea
"Well that's a nice back-handed compliment isn't it? So now, finally, my ..."
After two-year hiatus, EFF accepts bitcoin donations again
"Actually, both Mobile App developers and CIOs should be blamed for it. ..."
CIOs struggle to deliver timely mobile business apps: survey
"Too little too late. Spice normally has better standards than this. I ..."
Spiceworks' free management software gets integrated MDM
- Opinion varies on action against Chinese cyberattacks
- Chinese hackers resume attacks on U.S. targets
- Govt asks industry for help to stem security breaches
- Peculiar malware trail raises questions about security firm in India
- Attack on Telenor was part of large cyberespionage operation with Indian origins: report