Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Snader J.C. — VPNs Illustrated: Tunnels, VPNs, and IPsec
Snader J.C. — VPNs Illustrated: Tunnels, VPNs, and IPsec



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: VPNs Illustrated: Tunnels, VPNs, and IPsec

Автор: Snader J.C.

Аннотация:

Virtual private networks (VPNs) based on the Internet instead of the traditional leased lines offer organizations of all sizes the promise of a low-cost, secure electronic network. However, using the Internet to carry sensitive information can present serious privacy and security problems. By explaining how VPNs actually work, networking expert Jon Snader shows software engineers and network administrators how to use tunneling, authentication, and encryption to create safe, effective VPNs for any environment.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2005

Количество страниц: 480

Добавлена в каталог: 25.03.2006

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
encrypt-decrypt-encrypt mode      [See EDE]
Encryption      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st
encryption, symmetric      
endpoint authentication, definition of      
Enhanced interior gateway routing protocol      [See EIGRP]
errno variable      
error codes, L2TP      
Error function      2nd 3rd
ERROR macro      
ESN (extended sequence number), definition of      
ESP (encapsulating security payload)      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd
ESP, definition of      2nd
ESP, header      
ESP, header/trailer, definition of      
ESP, input processing      
ESP, IPsec protocol      
ESP, IPv6      
ESP, output processing      
ESP, processing      
ESP, transport mode      
ESP, tunnel mode      
ESPv3      
ESPv3, header, definition of      
ETCP ({Effective TCP/IP Programming})      2nd 3rd 4th 5th 6th 7th 8th 9th 10th
eth1 device      
ethereal program      
etherpeek program      
Etienne, J.      
Evarts, J.      
exchange types, IKE      
exec function      
execl function      
explicit congestion notification      [See ECN]
Extended      
extended sequence number      [See ESN]
extended, Euclidean algorithm      2nd
extended, sequence numbers      
Extensible Authenication Protocol      [See EAP]
Extension headers, IPv6      2nd
Exterior Gateway Protocol      [See EGP] [See EGP]
Farinacci, D.      2nd
FCS (frame check sequence)      2nd
FEC (forwarding equivalence class), definition of      
FEC to NHLFE map      [See FTN]
Fedorkow, G.      
Feistel cipher (Feistel network)      2nd
Feistel cipher (Feistel network), definition of      
Feistel network      [See Feistel cipher]
Feldman, N.      
Feng, D.      
Ferguson, N.      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th
Fermat's little theorem      
FIN flag, definition of      
finished message, SSL      
flooding, definition of      
Fluhrer, S.      2nd
Ford, L.R.      
Ford, W.      
fork function      2nd
Forwarding Equivalence Class      [See FEC]
four-way handshake      
frame check sequence      [See FCS]
frame formats, PPP      
Framing      
framing, capabilities, definition of      
framing, type, definition of      
Francis, P.      
Franz, M.      
Fredette, A.      
Freier, A.O.      
Friedman, A.A.      
FTN (FEC to NHLFE map), definition of      
ftp program      2nd 3rd 4th 5th
FTP, definition of      
Fulkerson, D.R.      
Fuller, V.      
function, cryptographic hash      
Futoransky, A.      2nd
Garman, J.      
GCHQ (Government Communications Headquarters)      
general authentication messages, SSH      
Generic Routing Encapsulation      [See GRE]
geqn program      
gethostbyname function      
gif device      2nd
Glenn, R.      2nd
Goldberg, I.      
Government Communications Headquarters      [See GCHQ]
gpic program      
GRE (Generic Routing Encapsulation)      2nd 3rd 4th 5th
GRE (Generic Routing Encapsulation), definition of      
gre device      
GRE header, definition of      
gretun device      
Gross, P.      
group generator, definition of      
gtbl program      
gtunnel      
gtunnel, program      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
gtunnel.c file      2nd
Guichard, J.      
Gutmann, P.      2nd 3rd 4th 5th 6th 7th
half close      
Haller, N.M.      
Hamzeh, K.      
handshake      
handshake, four-way      
handshake, messages, SSL      
handshake, three-way      
handshake, types, SSL      
Hanks, S.      
Hanson, D.      
Harding, T.      
Hardjono, T.      
Harkins, D.      2nd 3rd
Harney, H.      
hash function, cryptographic      
Hatch, B.      
HDLC (High-Level Data Link Control Protocol)      2nd 3rd
HDLC, definition of      
Header      
header, AH      
header, IP      
header, IPv6      
header, TCP      
header, UDP      
Hedrick, C.      
Heinanen, J.      
Hellman, M.      2nd 3rd
Hello      
hello done, SSL      
HELLO, AVP      
HELLO, definition of      
Henry-Stocker, S.      
Herzog, J.      
Hickman, K.E.B.      
hidden AVP, definition of      
High-Level Data Link Control Protocol      [See HDLC]
Hiltgen, A.      
Hinden, R.M.      2nd 3rd
HMAC      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd
Holdrege, M.      
Hollenbeck, S.      
host ID, definition of      
Housley, R.      
Huitema, C.      2nd
Huttunen, A.      2nd
IANA (Internet Assigned Numbers Authority), definition of      
ICCN AVPs      
ICMP (Internet Control Message Protocol)      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd
ICMP, definition of      
ICMP, echo reply      
ICMP, echo request      
ICMP, error messages      
ICMP, message types      
ICMP, protocol      
ICRP AVPs      
ICRQ AVPs      
Identification      
identification, payload, IPsec      
identification, types, IPsec      
IETF (Internet Engineering Task Force)      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th
ifconfig program      2nd 3rd
IGMP (Internet Group Management Protocol)      
IGP (Interior Gateway Protocol)      2nd
IGP, definition of      
IKE (Internet Key Exchange)      2nd 3rd 4th 5th 6th 7th 8th 9th 10th
IKE, authentication with signatures      
IKE, certificate types      
IKE, definition of      2nd 3rd
IKE, exchange types      
IKE, IPsec protocol      
IKE, key generation      
IKE, new group exchange      
IKE, notification message types      
IKE, payload types      
IKE, phase 1      
IKE, phase 1 attributes
IKE, phase 2 attributes
IKE, phase 2 quick mode
IKE, public key authentication      
IKE, revised public key authentication      
IKE, shared secret authentication      
IKEv2      2nd 3rd
IKEv2, exchanges      
IKEv2, messages      
ILM (incoming label map), definition of      
inbound function      2nd 3rd
incoming label map      [See ILM]
inetd program      
inetd. program      
inet_aton function      
ingress router, definition of      
INIT macro      2nd
initial received LCP CONFREQ, definition of      
Initialization vector      [See IV]
Integrated Services Digital Network      [See ISDN]
Integrity check value      [See ICV]
interface layer      2nd 3rd 4th 5th
interface layer, definition of      
Interior Gateway Protocol      [See IGP]
Intermediate System to Intermediate System Protocol      [See IS-IS]
International Telecommunication Union      
Internet Assigned Numbers Authority      [See IANA]
Internet control message protocol      [See ICMP]
Internet Engineering Task Force      [See IETF]
Internet Group Management Protocol      [See IGMP]
Internet Key Exchange      [See IKE]
Internet layer, definition of      
Internet Protocol      [See IP]
internet protocol numbers      
Internet Security Association and Key Management Protocol      [See ISAKMP]
Internet Service Provider      [See ISP]
Ioannidis, J.      
IP (Internet Protocol)      
ip program      
IP protocol      
IP security      [See IPsec]
ip variable      
IP, addressing      
IP, header      
IP, layer      
IP-in-IP tunnel      2nd 3rd 4th 5th 6th 7th 8th 9th
ip-up file      
ipip program      2nd
ipip.c file      
IPPROTO_IPIP socket option      
IPSec (IP Security)      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th
IPsec, and multicast      
IPsec, architecture      2nd
IPsec, definition of      
IPsec, futures      
IPsec, ICMP processing      
IPsec, identification payload      
IPsec, identification types      
IPsec, inbound processing      
IPsec, modes      
IPsec, outbound processing      
IPsec, overview      
IPSec, policies      
IPsec, policy, definition of      
IPsec, processing      
IPsec, protocol IDs      
IPsec, protocol, AH      
IPsec, protocol, ESP      
IPsec, protocol, IKE      
IPSec, protocols      
IPsec, selectors, definition of      
IPsec, sequence numbers      
IPsec, transform IDs      
iptrace program      
IPv4, definition of      
IPv6      2nd 3rd 4th 5th 6th 7th 8th
IPv6, address      
IPv6, AH      
IPv6, anycast address, definition of      
IPv6, definition of      
IPv6, ESP      
IPv6, extension headers      2nd
IPv6, header      
IPv6, muticast address, definition of      
IPv6, pseudoheader, definition of      
IPv6, unicast address, definition of      
IPX      2nd 3rd
ip_len member      
ip_p member      
IS-IS (Intermediate System to Intermediate System Protocol)      
ISAKMP (Internet Security Association and Key Management Protocol)      2nd 3rd 4th
ISAKMP, attribute, definition of      
ISAKMP, certificate payload      
ISAKMP, certificate payload, definition of      
ISAKMP, certificate request, definition of      
ISAKMP, cookies      
ISAKMP, delete payload      
ISAKMP, delete payload, definition of      
ISAKMP, generic header, definition of      
ISAKMP, hash payload      
ISAKMP, hash payload, definition of      
ISAKMP, header      
ISAKMP, header, definition of      
ISAKMP, identification payload      
ISAKMP, key exchange payload      
ISAKMP, key exchange payload, definition of      
ISAKMP, message processing      
ISAKMP, nonce payload      
ISAKMP, nonce payload, definition of      
ISAKMP, notification payload      
ISAKMP, notification payload, definition of      
ISAKMP, payloads      
ISAKMP, proposal payload, definition of      2nd
ISAKMP, SA payload, definition of      
ISAKMP, signature payload      
ISAKMP, signature payload, definition of      
ISAKMP, transform payload, definition of      
ISAKMP, vendor ID payload, definition of      
ISAKMP, vendor payload      
ISDN (Integrated Services Digital Network), definition of      
iterated tunneling, definition of      
IV (initialization vector), definition of      
Jacobson, V.      
1 2 3 4 5
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте