Skip to content

VPNs A Beginner's Guide

Best in textbook rentals since 2012!

ISBN-10: 0072191813

ISBN-13: 9780072191813

Edition: 2002

Authors: John L. Mairs

List price: $39.99
Shipping box This item qualifies for FREE shipping.
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Customers also bought

Book details

List price: $39.99
Copyright year: 2002
Publisher: McGraw-Hill Osborne
Publication date: 12/14/2001
Binding: Paperback
Pages: 592
Size: 7.25" wide x 9.00" long x 1.50" tall
Weight: 2.684
Language: English

Acknowledgmentsp. xvii
Introductionp. xix
Networks and Security
Layering Architecture and the OSI Modelp. 3
Layering Principlesp. 4
Open Systems Interconnection (OSI) Modelp. 4
Peer Communications and Encapsulationp. 8
Layer Interactionsp. 10
Summaryp. 19
Network Architecturesp. 21
Networks and Network Topologiesp. 22
Local Area Networks (LANs)p. 25
Wide Area Networks (WANs)p. 46
The TCP/IP Protocol Stackp. 73
The DOD Reference Model Layersp. 75
Protocol Descriptionsp. 77
TCP/IP Application Layer Protocolsp. 99
Securityp. 105
What Is Security?p. 106
Information Security Domainsp. 108
General Security Considerationsp. 111
Planning Your Security Approachp. 113
Components of a Sound Security Architecturep. 117
The Five Security Characteristics of Informationp. 118
The Three States of Informationp. 127
Threats and Attack Methodsp. 129
Packet Sniffingp. 130
Spoofing and Denial of Service Threatsp. 134
Spoofingp. 135
Denial of Servicep. 151
Password Attacksp. 154
Application Layer Attacksp. 154
Summaryp. 157
Intrusion Detection Systemsp. 159
Why Is Intrusion Detection Necessary?p. 160
What Are Intrusion Detection Systems?p. 161
IDS Detection Methodsp. 164
Assessment Architecturesp. 165
How to Know When You Have Been Attackedp. 172
Honey Potsp. 176
Firewallsp. 179
What Is a Firewall?p. 180
Types of Firewallsp. 182
Firewall Architecturesp. 198
Virtual Private Networks
VPN Basicsp. 207
What Is a VPN?p. 208
Internets, Intranets, and Extranetsp. 210
History of VPNsp. 213
What Is Tunneling?p. 217
Tunneling Protocolsp. 217
A Tunnel from the Pastp. 219
Tunnel Typesp. 220
Summaryp. 222
VPN Architecturesp. 223
VPN Components and General Requirementsp. 224
VPN Architecturesp. 226
Types of VPNsp. 234
Summaryp. 238
VPN Protocols
Tunneling Protocolsp. 241
Generic Routing Encapsulation (GRE)p. 242
Point-to-Point Tunneling Protocol (PPTP)p. 249
Summaryp. 259
L2F and L2TPp. 261
Access VPNs or VPDNsp. 262
Layer 2 Forwarding (L2F) PROTOCOLp. 263
Layer 2 Tunneling Protocol (L2TP)p. 273
Summaryp. 296
Secure Communication
Cryptographyp. 299
Cryptographyp. 300
Steganographyp. 305
Cryptographic Algorithm Methodsp. 307
Cryptanalysisp. 309
Future Cryptographic Methodsp. 311
Summaryp. 312
Cryptographic Algorithmsp. 313
Hash Algorithmsp. 314
Private-Key (Symmetric) Algorithmsp. 316
Public-Key (Asymmetric) Algorithmsp. 319
Summaryp. 326
Certificatesp. 327
Digital Signaturesp. 329
Certificatesp. 334
Digital Signatures, Certificates, and Public Key Infrastructure (PKI)p. 343
Summaryp. 346
Authenticationp. 347
Human Identificationp. 348
Entity Authenticationp. 350
Authentication Protocolsp. 351
Terminal Access Controller Access Control System (TACACS), XTACACS, and TACACS+p. 364
Summaryp. 372
IPSec
IPSec Componentsp. 375
IPSec Backgroundp. 376
IPSec Components and Concept Overviewp. 380
The Authentication Header (AH) Protocolp. 385
The Encapsulating Security Payload (ESP) Protocolp. 390
Why Two Authentication Protocols?p. 394
Security Associations and Policiesp. 395
Security Databasesp. 399
Summaryp. 402
Key Managementp. 403
Key Management Concepts and Overviewp. 404
Perfect Forward Secrecy (PFS)p. 406
Diffie-Hellmanp. 407
The Pseudo-Random Functionp. 408
Domain of Interpretation (DOI)p. 408
Internet Security Association and Key Management Protocol (ISAKMP)p. 408
IPSec IKEp. 410
Summaryp. 416
Key Management/Exchange Protocolsp. 417
In-Band and Out-of-Band Key Exchangesp. 418
Diffie-Hellman Key Exchangep. 419
Simple Key-Management for Internet Protocols (SKIP)p. 420
Photurisp. 421
SKEMEp. 422
Oakleyp. 423
ISAKMPp. 424
The Internet Key Exchange (IKE) or ISAKMP/Oakleyp. 441
Negotiating Multiple Security Associationsp. 459
Using ISAKMP/Oakley with Remote Accessp. 460
Summaryp. 461
IPSec Architecture and Implementationp. 463
IPSec Architecture and Implementationp. 464
Managing the Security Associationsp. 473
Security Association Databasesp. 479
Summaryp. 486
MPLS
Quality of Service (QoS)p. 491
Basic Termsp. 492
What is Quality of Service (QoS)?p. 494
Why do we need QoS?p. 495
The QoS Frameworkp. 509
QoS Protocolsp. 510
Traffic Engineeringp. 520
Summaryp. 522
Traffic Engineering--Movement of Datap. 523
Routing to Switching to Routing?p. 524
Traffic Engineering 101p. 526
Summaryp. 534
MPLS Backgroundp. 535
What Is MPLS?p. 536
Why Do We Need MPLS?p. 537
History Behind MPLSp. 539
Summaryp. 545
MPLS Components and Conceptsp. 547
MPLS Components and Conceptsp. 548
Distribution of Label Informationp. 556
MPLS Virtual Private Networks (MPLS VPNs)p. 561
Summaryp. 565
Indexp. 567
Table of Contents provided by Syndetics. All Rights Reserved.