Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Snader J.C. — VPNs Illustrated: Tunnels, VPNs, and IPsec
Snader J.C. — VPNs Illustrated: Tunnels, VPNs, and IPsec



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: VPNs Illustrated: Tunnels, VPNs, and IPsec

Автор: Snader J.C.

Аннотация:

Virtual private networks (VPNs) based on the Internet instead of the traditional leased lines offer organizations of all sizes the promise of a low-cost, secure electronic network. However, using the Internet to carry sensitive information can present serious privacy and security problems. By explaining how VPNs actually work, networking expert Jon Snader shows software engineers and network administrators how to use tunneling, authentication, and encryption to create safe, effective VPNs for any environment.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2005

Количество страниц: 480

Добавлена в каталог: 25.03.2006

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
/dev/urandom device      
/etc/ppp/auth-down file      
/etc/ppp/auth-up file      
/etc/ppp/ip-down file      
/etc/ppp/ip-up file      
/etc/ppp/ppp.conf file      
/etc/ppp/ppp.linkdown file      
/etc/ppp/ppp.linkup file      
2nd 3rd 4th 5th 6th [See AS]      
2nd [See AVP]      
3DES (triple DES)      2nd 3rd 4th 5th 6th 7th 8th
3DES, definition of      
Aboba, B.      2nd 3rd 4th
Accept function      
access concentrator, definition of      
ACCM (asynchronous control character map)      
ACCM, attribute value field      
ACCM, definition of      
ACK flag, definition of      
Adams, R.      
Address      
Address Resolution Protocol      [See ARP]
Address, broadcast      
Address, IPv6      
address, limited broadcast      
address, network-directed broadcast      
address, private      2nd 3rd 4th 5th
Addressing      
addressing, classful      
addressing, IP      
Adleman, L.M.      2nd 3rd
Advanced Encryption Standard      [See AES]
AES (Rijndael)      2nd 3rd 4th 5th 6th 7th 8th
Agarwal, P.      
aggressive mode, definition of      
AH (Authentication Header protocol)      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th
AH, definition of      2nd
AH, header      
AH, header, definition of      
AH, input processing      
AH, IPsec protocol      
AH, IPv6      
AH, output processing      
AH, processing      
AH, transport mode      
AH, tunnel mode      
Akyol, B.      
Albaugh, T.      
alert      
alert, message types, SSL      
alert, SSL      
Algorithm      
algorithm, Bellman-Ford      
Algorithm, Dijkstra's      
Algorithm, extended Euclidean      
alleged RC4      
Allen, C.      
Alvestrand, H.T.      
Anderson, R.      
Andersson, L.      
AppleTalk      2nd
Application layer      2nd 3rd
application layer, definition of      
arithmetic, ones-compliment      
Arkko, J.      
ARP (Address Resolution Protocol), definition of      
assigned      
assigned, session ID, definition of      
assigned, tunnel AVP, definition of      
asymmetric cipher      2nd 3rd 4th
Asynchronous Control Character Map      [See ACCM]
Atkinson, R.      2nd 3rd 4th 5th 6th 7th
Attack      
attack, DOS      
attack, Smurf      
auth-up file      
Authentication      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th
Authentication Header protocol      [See AH]
authentication, VTun      
avalanche effect, definition of      
AVP (attribute value pair)      
AVP, definition of      
AVP, HELLO      
AVP, L2TP message type      
AVP, Result code      
AVPs      
AVPs, CDN      
AVPs, ICCN      
AVPs, ICRP      
AVPs, ICRQ      
AVPs, OCCN      
AVPs, OCRP      
AVPs, OCRQ      
AVPs, SCCCN      
AVPs, SCCRP      
AVPs, SCCRQ      
AVPs, SLI      
AVPs, SopCCN      
AVPs, WEN      
Barrett, D.J.      2nd 3rd
bash program      
Baugher, M.      
Baze, M.      
bc program      2nd
bearer      
bearer, capabilities, definition of      
bearer, type, definition of      
Begley, L.      
Bellare, M.      2nd 3rd 4th 5th 6th
Bellman-Ford algorithm      
Bellovin, S.M.      2nd
Bentley, J.      
BGP (Border Gateway Protocol)      2nd 3rd
Birthday paradox      2nd
bit-flipping, definition of      
BITS (bump-in-the-stack), definition of      
BITW (bump-in-the-wire), definition of      
Bleichenbacher, D.      2nd
Block cipher      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
Blowfish      2nd 3rd 4th 5th 6th 7th 8th 9th
Blunk, L.J.      
Boneh, D.      
Booth, S.      
BOOTP      
Border gateway protocol      [See BGP]
border router, definition of      
Borman, D.      
Braden, R.T.      
Broadcast address      
Brumley, D.      
BSD r-commands      2nd 3rd 4th
bsd work station      2nd
bump-in-the-stack      [See BITS]
bump-in-the-wire      [See BITW]
CA (certificate authority)      2nd 3rd 4th 5th 6th
CA, definition of      
call serial number, definition of      
called number, definition of      
calling number, definition of      
Callon, R.      
Canetti, R.      2nd 3rd 4th
Canvel, B.      
Carlson, J.      2nd 3rd 4th 5th
Carrel, D.      2nd
cat program      
CBC mode, definition of      
CCP (Compression Control Protocol), definition of      
CDN AVPs      
Certificate      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
Certificate authority      [See CA]
certificate, chain      
certificate, revocation      
certificate, SSL      2nd 3rd 4th 5th 6th 7th 8th
certificate, types, IKE      
certificate, X.509      
CFB (cipher feedback mode), definition of      
challenge, definition of      
Challenge-Handshake Authentication Protocol      [See CHAP]
Chandra, P.      
change cipher spec, SSL      
channel messages, SSHv2      
CHAP (Challenge-Handshake Authentication Protocol), definition of      
Cheval, P.      
CIDR (classless interdomain routing)      2nd 3rd
CIPE      2nd 3rd 4th 5th
CIPE, binary packet      
CIPE, binary packet, definition of      
CIPE, configuration data, definition of      
CIPE, control message types      
CIPE, control messages      
CIPE, key exchange packet, definition of      
CIPE, key exchange types      
CIPE, key negotiation      
CIPE, P byte, definition of      
CIPE, security      
ciped program      2nd
Cipher      
cipher block chaining mode      [See CBC]
cipher feedback mode      [See CFB]
cipher, asymmetric      2nd 3rd 4th
cipher, block      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
cipher, Feistel      2nd
cipher, stream      2nd 3rd 4th 5th 6th 7th 8th 9th 10th
cipher, suite, SSL      
cipher, symmetric      2nd 3rd 4th
Clark, J.      
classful      
classful, address ranges      
classful, addressing      
Classless interdomain routing      [See CIDR]
Client      
client, authentication, SSL      
client, hello, SSL      
client, key exchange, SSL      
closure notification, SSL      
Cobb, S.      
combined      
combined, mode cryptographic algorithms      
combined, security associations      
Comer, D.E.      2nd
Compression Control Protocol      [See CCP]
computationally infeasible, definition of      
Connection      
connection, set up      
connection, shutdown      
connection-based      2nd
Connectionless      2nd 3rd
connectionless, definition of      
conservative label retention mode, definition of      
Conta, A.      
control messages      
control messages, L2TP      
control messages, PPTP      
counter mode      [See CTR]
CRC (Cyclic Redundancy Check)      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
CRC-32 compensation attack detector
Crocker, S.D.      
cryptographic      
cryptographic, hash function      
cryptographic, implementations      
cryptographically secure random number      
Cryptography      2nd
cryptography, elliptic curve      
csh program      
CTR mode, definition of      
Cyclic redundancy check      [See CRC]
Dai, W.      
Data Encryption Standard      [See DES]
Datagram Transport Layer Security      [See DTLS]
datalink layer, definition of      
Davari, S.      
Davie, B.      
Davis, C.R.      
Dawson, E.      
dc1 device      
de Groot, J.G.      
de Wegner, B.      
decorrelation, definition of      
Deep Crack      
Deering, S.      
Deering, S.E.      2nd
Denial of Service      [See DOS]
DES (Data Encryption Standard)      2nd 3rd 4th 5th
DHCP (Dynamic Host Configuration Protocol)      2nd
DiBurro, L.      2nd
Dierks, T.      
Diffie, W.      2nd 3rd
Diffie-Hellman key      
Diffie-Hellman key, exchange      2nd 3rd
Diffie-Hellman key, exchange, SSL      
Digital signature      2nd 3rd 4th 5th 6th 7th 8th
Digital Signature Algorithm      [See DSA]
Digital Signature Standard      [See DSS]
Digital Subscriber Line      [See DSL]
Dijkstra's algorithm      
Dijkstra, E.W.      
Discrete logarithm      2nd
DISPLAY variable      
distance vector protocol      2nd
Dixon, W.      2nd 3rd
DNS (Domain Name System)      2nd 3rd 4th 5th
DOI (Domain of Interpretation), definition of      
Domain Name System      [See DNS]
Domain of Interpretation      [See DOI]
Dommety, G.      
Doolan, P.      
Doraswamy, N.      2nd
DoS (Denial of Service)      2nd 3rd
DOS (denial of service), attack      
downstream on demand mode, definition of      
Dreyfus, S.      
DSA (Digital Signature Algorithm)      2nd
DSL (Digital Subscriber Line)      
DSL (Digital Subscriber Line), definition of      
DSS (Digital Signature Standard)      2nd 3rd 4th
DSS (Digital Signature Standard), definition of      
DTLS (Datagram Transport Layer Security), definition of      
Dynamic Host Configuration Protocol      [See DHCP]
EAP (Extensible Authenication Protocol), definition of      
Eastlake, D.E., 3rd      
EBC mode, definition of      
echo      
echo, function      
echo, program      
echoit program      2nd
ECP, definition of      
EDE mode, definition of      
Effective TCP/IP Programming      [See ETCP]
Egevang, K.B.      
EGP (Exterior Gateway Protocol)      
EGP (Exterior Gateway Protocol), definition of      
egress router, definition of      
EIGRP (Enhanced Interior Gateway Routing Protocol)      
electronic code book mode      [See ECB]
Electronic Frontier Foundation      
ElGamal      2nd 3rd 4th 5th
ElGamal, T.      
elliptic curve cryptography      
Encapsulating security payload      [See ESP]
Encapsulation      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd
1 2 3 4 5
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте