Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Snader J.C. — VPNs Illustrated: Tunnels, VPNs, and IPsec
Snader J.C. — VPNs Illustrated: Tunnels, VPNs, and IPsec



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: VPNs Illustrated: Tunnels, VPNs, and IPsec

Автор: Snader J.C.

Аннотация:

Virtual private networks (VPNs) based on the Internet instead of the traditional leased lines offer organizations of all sizes the promise of a low-cost, secure electronic network. However, using the Internet to carry sensitive information can present serious privacy and security problems. By explaining how VPNs actually work, networking expert Jon Snader shows software engineers and network administrators how to use tunneling, authentication, and encryption to create safe, effective VPNs for any environment.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2005

Количество страниц: 480

Добавлена в каталог: 25.03.2006

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
Johnson, D.B.      
Kalisky, B.      2nd
Kargieman, E.      2nd
Karlton, P.      
Karrenberg, D.      
Kaufman, C.      
Kent, S.      2nd 3rd 4th 5th 6th 7th 8th
kermit program      
Kernighan, B.      
key management      
Kivinen, T.      2nd
Klima, V.      
Knuth, D.E.      2nd
Kocker, P.C.      
Kohno, T.      2nd
Kolesnikov, O.      
Krawczyk, H.      2nd 3rd 4th 5th 6th
Krishnan, R.      
L2F (Layer Two Forwarding), definition of      
L2TP (Layer Two Tunneling Protocol)      2nd 3rd 4th 5th 6th
L2TP Access Concentrator      [See LAC]
L2TP Network Server      [See LNS]
L2TP, attribute value pair, definition of      
L2TP, AVP, definition of      
L2TP, common header, definition of      
L2TP, control messages      
L2TP, definition of      
L2TP, error codes      
L2TP, message type AVP      
L2TP, proxy authentication types      
L2TPv3      
Label      
Label distribution protocol      [See LDP]
Label switched path      [See LSP]
label switching router      [See LSR]
label, distribution protocol      
label, MPLS      
LAC (L2TP Access Concentrator), definition of      
Lai, X.      
LANalyzer program      
laptop work station      2nd 3rd
last      
last, received LCP CONFREQ, definition of      
last, sent LCP CONFREQ, definition of      
Layer Two Forwarding      [See L2F]
Layer Two Tunneling Protocol      [See L2TP]
layering      2nd 3rd
LCP (Link Control Protocol), definition of      
LDP (label distribution protocol), definition of      
Le Faucheur, F.      
Lear, E.      
Leased line      2nd 3rd 4th 5th 6th
Lemberg, W.      
Lenstra, A.      
Levkowetz, H.      
Li, T.      2nd 3rd 4th
liberal retention mode, definition of      
Lidl, K.      
lightweight VPN      2nd 3rd 4th
limited broadcast address      
Link Control Protocol      [See LCP]
link layer      2nd 3rd
link layer, definition of      
link-state protocol      2nd
linux work station      2nd 3rd 4th
linuxlt work station      
Little, W.A.      
LNS (L2TP Network Server), definition of      
logarithm, discrete      2nd
loom program      
LSP (label switched path), definition of      
LSR (label switching router), definition of      
MAC (message authentication code)      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th
MAC, address      
MAC, address, definition of      
MAC, definition of      
Madson, C.      2nd
Main mode, definition of      
Malkin, G.S.      
Mamakos, L.      
mandatory mode, definition of      
Mantin, I.      2nd
manual keying, definition of      
Maughan, D.      
maximum bps, definition of      
Maximum Receive Unit      [See MRU]
Maximum transmission unit      [See MTU]
McLaughlin, R.      
MD5      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th
md5 program      
Menezes, A.J.      2nd 3rd
Merkle, R.      
Message      
message authentication code      [See MAC]
message integrity code      [See MIC]
message, authentication, definition of      
message, types, SSHv1      
Messier, M.      
Messmer, E.      
Meyer, D.      
MH (mobility header), definition of      
MIC (message integrity code), definition of      
Microsoft Challenge Handshake Authentication Protocol      [See MS-CHAP]
Microsoft Point-to-Point Encryption      [See MPPE]
minimum bps, definition of      
Mister, S.      
mobility header      [See MH]
Modadugu, N.      
MODE      
mode, transport      
mode, tunnel      
modes, IPSec      
Mogul, J.      2nd
Moskowitz, R.G.      
Moy, J.      
MPLS (Multiprotocol Label Switching)      2nd 3rd
MPLS, definition of      
MPLS, label      
MPLS, tunnel      
MPLS, VPN      2nd
MPPE (Microsoft Point-to-Point Encryption)      
MRU (Maximum Receive Unit)      
ms macro      
MS-CHAP (Microsoft Challenge Handshake Authentication Protocol)      2nd
MTU (Maximum Transmission Unit)      2nd 3rd 4th 5th 6th 7th 8th
Mudge      
Multicast      
Multiprotocol label switching      [See MPLS]
mutable      
mutable, but predictable      
mutable, IP header fields (AH), definition of      
mutable, IPv6 header fields (AH), definition of      
Nadeau, T.D.      
Namprempre, C.      2nd
NAP (network access point)      
NAP, definition of      
Narten, T.      
NAT (Network Address Translation)      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st
NAT transversal      [See NAT-T]
NAT, keep-alives      
NAT-D payload, definition of      
NAT-OA payload, definition of      
NAT-T (NAT transversal)      2nd 3rd 4th 5th 6th 7th
NAT-T, definition of      2nd
National Security Agency      [See NSA]
nc program      2nd
NCP (Network Control Protocol), definition of      
netcat      2nd 3rd 4th 5th
netcat, command line options      
nettl program      
Network      
Network Access Point      [See NAP]
Network Address Translation      [See NAT]
Network Control Protocol      [See NCP]
Network Layer Security Protocol      [See NLSP]
network traces      
network, ID, definition of      
network, layer      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th
network, layer, definition of      
network-directed broadcast address      
new IPsec processing model      
newmail function      
next hop label forwarding entry      [See NHLFE]
NHLFE (next hop label forwarding entry), definition of      
Nielsen, L.      
NIST      2nd 3rd 4th
NLSP (Network Layer Security Protocol), definition of      
Nolan, C.      
nonce, definition of      
Nordmark, E.      
Notification      
notification, message types, IKE      
notification, payload, ISAKMP      
notify function      
NSA (National Security Agency)      2nd
Oakley Key Determination Protocol      [See OAKLEY]
OCCN AVPs      
OCRP AVPs      
OCRQ AVPs      
OFB (output feedback mode), definition of      
one time pad      
ones-compliment arithmetic      
open failure reason codes, SSHv2      
Open Shortest Path First Protocol      [See OSPF]
Open Systems Interconnection      [See OSI]
OpenSSH      2nd 3rd 4th 5th 6th 7th
OpenSSL      2nd 3rd 4th 5th 6th 7th 8th 9th 10th
openssl program      
OpenVPN      2nd 3rd 4th 5th
OpenVPN, control channel      
OpenVPN, control channel packet, definition of      
OpenVPN, data channel      
OpenVPN, data packet, definition of      
OpenVPN, key exchange message-1, definition of      
OpenVPN, key exchange message-2, definition of      
OpenVPN, OCC message, definition of      
OpenVPN, OCC op codes      
OpenVPN, op codes      
OpenVPN, packet header, definition of      
OpenVPN, ping and OCC protocols      
OpenVPN, security      
OpenVPN, security models      
optional ESP padding      
orderly release      
Orman, H.K.      
OSI reference model      
OSPF (Open Shortest Path First Protocol)      2nd 3rd
outbound function      2nd 3rd
output feedback mode      [See OFB]
PAC (PPTP Access Concentrator), definition of      
Pacetti, A.M.      2nd
Packet      
packet, PPP      
packet, sniffers      
packet, types, PPPoE      
PAD (peer authentication database)      
PAD, definition of      
PADI (PPPoE Active Discovery Initiation)      
PADI, definition of      
PADO (PPPoE Active Discovery Offer)      
PADO, definition of      
PADR (PPPoE Active Discovery Request)      
PADR, definition of      
PADS (PPPoE Active Discovery Session-confirmation)      
PADS, definition of      
PADT (PPPoE Active Discovery Terminate)      
PADT, definition of      
Pall, G.S.      2nd 3rd 4th
Palter, B.      2nd
PAP (Password Authentication Protocol), definition of      
Partridge, C.      
Password Authentication Protocol      [See PAP]
Patel, B.V.      
Path MTU      [See PMTU]
path-vector protocol      
payload types, IKE      
PCT (Private Communications Technology), definition of      
peer authentication database      [See PAD]
penultimate hop popping, definition of      
Pepelnjak, I.      
Pereira, R.      
perfect forward secrecy      [See PFS]
Perkins, C.      2nd
Perkins, C.E.      
Perlman, R.      2nd 3rd 4th
PFP (populate from packet flags), definition of      
PFS (perfect forward secrecy), definition of      
Phase      
phase, 1 attributes, IKE
phase, 2 attributes, IKE
physical channel ID, definition of      
pid variable      
Ping program      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th
Piper, D.      
PKCIPE      
pkcipe program      2nd
PKCIPE, message types      
PKCIPE, packet, definition of      
PKCS #1      2nd
PKI (Public Key Infrastructure)      
PKI, definition of      
Plummer, D.C.      
PMTU (path MTU)      2nd 3rd
PNS (PPTP Network Server), definition of      
Point to Point Protocol      [See PPP]
Point to Point Tunneling Protocol      [See PPTP]
policies, IPSec      
Polk, T.      
pooled mode, definition of      
popen function      
populate from packet flags      [See PFP]
Port      
port address translation      [See PAT]
port, address translation, definition of      
port, forwarding, SSH      
Postel, J.B.      2nd 3rd 4th 5th 6th
PPP (Point to Point Protocol)      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th
PPP over Ethernet      [See PPPoE]
ppp program      2nd
PPP, frame formats      
PPP, packet      
ppp.conf file      2nd
ppp.linkup file      
pppd      
pppd, command line options      
pppd, program      2nd 3rd 4th 5th
PPPoE (PPP over ethernet)      2nd 3rd
PPPoE Active Discovery Initiation      [See PADI]
PPPoE Active Discovery Offer      [See PADO]
PPPoE Active Discovery Request      [See PADR]
PPPoE Active Discovery Session-confirmation      [See PADS]
PPPoE Active Discovery Terminate      [See PADT]
pppoe program      
PPPoE tag      
PPPoe, definition of      
PPPoE, header, definition of      
PPPoE, packet types      
PPTP (Point to Point Tunneling Protocol)      2nd 3rd 4th 5th 6th 7th
PPTP Access Concentrator      [See PAC]
PPTP Network Server      [See PNS]
1 2 3 4 5
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте