Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Snader J.C. — VPNs Illustrated: Tunnels, VPNs, and IPsec
Snader J.C. — VPNs Illustrated: Tunnels, VPNs, and IPsec



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: VPNs Illustrated: Tunnels, VPNs, and IPsec

Автор: Snader J.C.

Аннотация:

Virtual private networks (VPNs) based on the Internet instead of the traditional leased lines offer organizations of all sizes the promise of a low-cost, secure electronic network. However, using the Internet to carry sensitive information can present serious privacy and security problems. By explaining how VPNs actually work, networking expert Jon Snader shows software engineers and network administrators how to use tunneling, authentication, and encryption to create safe, effective VPNs for any environment.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2005

Количество страниц: 480

Добавлена в каталог: 25.03.2006

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
PPTP, control message header, definition of      
PPTP, control messages      
PPTP, definition of      
PPTP, extended GRE header, definition of      
Preneel, B.      
printf function      
PRIVATE      
private address      2nd 3rd 4th 5th
private address, ranges      
Private Communications Technology      [See PCT]
private, group, definition of      
private, peering      
Protocol      
protocol, distance vector      2nd
Protocol, ICMP      
protocol, IDs, IPsec      
protocol, IP      
protocol, label distribution      
protocol, link-state      2nd
protocol, path-vector      
protocol, TCP      
Protocol, UDP      
protocol, version, definition of      
protocols, IPSec      
Provan, D.      
Proxy      
proxy, ARP, definition of      
proxy, authen challenge, definition of      
proxy, authen ID, definition of      
proxy, authen name, definition of      
proxy, authen response, definition of      
proxy, authen type, definition of      
pseudo-header      2nd
pseudo-randomness, definition of      
pseudowire      
PSH flag, definition of      
Public Key Infrastructure      [See PKI]
public key signature data, SSHv2      
Pyle, E.      
python program      2nd 3rd 4th 5th
Quick mode, definition of      
rand function      2nd
Random      
random device      
random, device, definition of      
random, vector, definition of      
random/urandom device      
RAS (remote access server), definition of      
rbiff program      
rbiffd program      2nd
RC4      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
RC4, alleged      
rcp program      2nd
read function      2nd
receive window, definition of      
record layer      
record layer, message types, SSL      
record layer, SSL      
recv_char() program      
reference model, OSI      
Rekhter, Y.      2nd 3rd 4th 5th 6th
reliable      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
remote access server      [See RAS]
remote variable      
Rescorla, E.      2nd 3rd 4th 5th 6th
Result code AVP      
result codes, StopCCN      
resumed session, SSL      
rexec program      
Reynold, J.K.      
Rijndael      [See AES]
RIP      
Rivest, R.      2nd 3rd 4th 5th
rlogin program      
Robshaw, M.      2nd
Romkey, J.L.      
Roos, A.      
rootcert.pem file      
Rosen, E.C.      2nd
round keys      
round trip time      [See RTT]
route program      
Routing      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th
RSA      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st
RSA, Laboratories      2nd
rsh program      2nd
RST flag, definition of      
RTT (round trip time)      
Rubens, A.      2nd
Rx connect speed, definition of      
S-box (substitution box), definition of      
SA (security association)      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
SA, definition of      2nd
SA, proposal and transform payloads      
SAD (security association database), definition of      
SCCCN AVPs      
SCCRP AVPs      
SCCRQ AVPs      
Schertler, M.      
Schiller, J.I.      
Schneider, M.      
Schneier, B.      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th
scp (Secure Copy Program)      
scp program      2nd 3rd 4th
Secure Copy Program      [See SCP]
Secure Data Network System      [See SP3]
Secure Hash Algorithm      [See SHA]
Secure Shell      [See SSH]
Secure Sockets Layer      [See SSL]
security association 3rd 4th 5th 6th 7th 8th [See SA]      
security association database      [See SAD]
security parameter index      [See SPI]
security policy database      [See SPD]
select function      2nd
sendto function      
send_char() program      
sequencing required, definition of      
SEQ_LT macro      
SEQ_LT, definition of      
Serial Line Protocol      [See SLIP]
server      
server, hello, SSL      
server, key, SSH      
session      
session, key generation, SSHv2      
session, key, definition of      
set link info message      [See SLI]
setkey program      2nd
sftp program      
sh program      
SHA (Secure Hash Algorithm)      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st
Shamir, A.      2nd 3rd 4th 5th
Shea, R.      2nd
SHELL variable      
shortest path, definition of      
Signature, digital      2nd 3rd 4th 5th 6th 7th 8th
Silverman, R.E.      
Simone, D.      
Simpson, W.A.      2nd
Siverman, R.E.      2nd
sleep function      
SLI (set link info message)      
SLI, AVPs      
SLI, definition of      
SLIP (Serial Line Protocol)      2nd
Smurf attack      
Snader, J.C.      
Snader, M      
Snader, R.      
snoop program      
SOCKADDR macro      
sockaddr structure      
sockaddr_in structure      
SOCK_RAW socket option      
soft state      2nd
solaris work station      2nd 3rd
Solo, D.      
Song, D.X.      
SopCCN AVPs      
SP3 (Secure Data Network System), definition of      
Spam      
SPD (security policy database)      
SPD, definition of      
Speciner, M.      
SPI (security parameter index), definition of      
Srisuresh, P.      
SSH (Secure Shell)      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
ssh program      2nd 3rd 4th 5th 6th 7th 8th
SSH, general authentication messages      
SSH, port forwarding      
SSH, server key      
SSH, VPN      
sshd program      2nd 3rd 4th 5th 6th
SSHv1      
SSHv1, authentication      
SSHv1, binary packet, definition of      
SSHv1, message types      
SSHv1, remote commands      
SSHv1, security      
SSHv1, user authentication      
SSHv2      
SSHv2, authentication      
SSHv2, binary packet, definition of      
SSHv2, channel messages      
SSHv2, connection protocol      
SSHv2, data transfer      
SSHv2, Diffie-Hellman key exchange      
SSHv2, exchange hash      
SSHv2, key generation      
SSHv2, keyboard interactive authentication      
SSHv2, none authentication      
SSHv2, open failure reason codes      
SSHv2, parameter negotiation      
SSHv2, password authentication      
SSHv2, port forwarding      
SSHv2, public key authentication      
SSHv2, public key signature data      
SSHv2, remote commands      
SSHv2, security      
SSHv2, services      
SSHv2, session key generation      
SSHv2, subsystems      
SSHv2, transport message types      
SSHv2, transport protocol      
SSHv2, user authentication request, definition of      
sshvpn      
sshvpn, program      
SSH_CMSG_PORT_FORWARD_REQUEST, definition of      
SSH_CMSG_REQUEST_PTY, definition of      
SSH_CMSG_SESSION_KEY, definition of      
SSH_CMSG_X11_REQUEST_FORWARDING, definition of      
SSH_MSG_CHANNEL_DATA, definition of      
SSH_MSG_CHANNEL_EXTENDED_DATA, definition of      
SSH_MSG_CHANNEL_OPEN, definition of      
SSH_MSG_CHANNEL_OPEN_CONFIRMATION, definition of      2nd
SSH_MSG_CHANNEL_OPEN_FAILURE, definition of      
SSH_MSG_CHANNEL_REQUEST, definition of      
SSH_MSG_GLOBAL_REQUEST, definition of      
SSH_MSG_KEXDH_GEX_REPLY, definition of      
SSH_MSG_KEXDH_REQUEST, definition of      
SSH_MSG_KEXINIT, definition of      
SSH_MSG_PORT_OPEN, definition of      
SSH_MSG_USERAUTH_FAILURE, definition of      
SSH_MSG_USERAUTH_INFO_REQUEST, definition of      
SSH_MSG_USERAUTH_INFO_RESPONSE, definition of      
SSH_MSG_USERAUTH_PASSWD_CHANGEREQ, definition of      
SSH_SMSG_PUBLIC_KEY, definition of      
SSL (Secure Sockets Layer)      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th
SSL, alert      
SSL, alert message types      
SSL, alert message, definition of      
SSL, certificate      2nd 3rd 4th 5th 6th 7th 8th
SSL, certificate message, definition of      
SSL, change cipher spec      
SSL, cipher suite      
SSL, cipher suite, definition of      
SSL, cipher suites      
SSL, client authentication      
SSL, client cert. request, definition of      
SSL, client hello      
SSL, client hello, definition of      
SSL, client key exchange      
SSL, client key exchange message, definition of      
SSL, closure notification      
SSL, definition of      
SSL, Diffie-Hellman key exchange      
SSL, finished message      
SSL, finished message, definition of      
SSL, handshake header, definition of      
SSL, handshake messages      
SSL, handshake types      
SSL, hello done      
SSL, MasterSecret, definition of      
SSL, PreMasterSecret, definition of      
SSL, protocol      
SSL, record format, definition of      
SSL, record layer      
SSL, record layer message types      
SSL, resumed session      
SSL, security      
SSL, server hello      
SSL, server hello done, definition of      
SSL, server hello, definition of      
SSL, server key exchange message, definition of      
SSL, v2 client hello      
SSL, v2 record-client hello, definition of      
SSL, VPN      
ssldump      
ssldump program      2nd 3rd 4th 5th 6th 7th
sslecho program      2nd 3rd
sslecho.pem file      
SSL_accept function      
SSL_read function      2nd
SSL_set_bio function      
SSL_write function      
STACK      
stack, definition of      
stack, TCP/IP      
Staddon, J.      2nd
startup function      2nd
static mode, definition of      
Stenberg, M.      2nd
Stevens, W.R.      2nd 3rd 4th 5th 6th
Stevenson, F.A.      
StopCCN result codes      
Stream cipher      2nd 3rd 4th 5th 6th 7th 8th 9th 10th
strerror function      
strong collision resistance, definition of      
stunnel      
stunnel, program      2nd 3rd 4th
stunnel. program      
stunnel.client file      
stunnel.server file      2nd
subaddress, definition of      
subnetting      
substitution box      [See S-box]
subsystems, SSHv2      
Swander, B.      2nd
symmetric      
symmetric, cipher      2nd 3rd 4th
1 2 3 4 5
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте