Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Snader J.C. — VPNs Illustrated: Tunnels, VPNs, and IPsec
Snader J.C. — VPNs Illustrated: Tunnels, VPNs, and IPsec



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: VPNs Illustrated: Tunnels, VPNs, and IPsec

Автор: Snader J.C.

Аннотация:

Virtual private networks (VPNs) based on the Internet instead of the traditional leased lines offer organizations of all sizes the promise of a low-cost, secure electronic network. However, using the Internet to carry sensitive information can present serious privacy and security problems. By explaining how VPNs actually work, networking expert Jon Snader shows software engineers and network administrators how to use tunneling, authentication, and encryption to create safe, effective VPNs for any environment.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2005

Количество страниц: 480

Добавлена в каталог: 25.03.2006

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
symmetric, encryption      
SYN flag, definition of      
synchronization segment      [See SYN]
synchronization segment, definition of      
synchronous line      
s_client program      2nd
s_server program      
Taarud, J.      
tag, PPPoE      
Tappan, D.      
tar program      
Tavares, S.E.      
TCP (Transmission Control Protocol)      
TCP, data delivery      
TCP, definition of      
TCP, header      
TCP, protocol      
TCP, segment, definition of      
TCP/IP      
TCP/IP, stack      
tcpdump program      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th
tcp_client function      
tcp_server function      2nd
telnet program      2nd 3rd 4th 5th 6th 7th
Testbed      
TFC (traffic flow confidentiality), definition of      
Thomas, B.      
Three-way handshake      
Tian, X.      
tie breaker, definition of      
Time to live      [See TTL]
tinc      2nd 3rd 4th 5th 6th
tinc, binary packet, definition of      
tinc, binary protocol      
tinc, metaprotocol      
tinc, metaprotocol message types      
tinc, security      
TLS (Transport Layer Security)      2nd 3rd
TLS, definition of      
tohex function      
Townsley, W.M.      2nd
traces, network      
Traffic      
traffic flow confidentiality      [See TFC]
traffic, analysis, definition of      
traffic, selectors      
Traina, P.      
transform IDs, IPsec      
Transmission Control Protocol      [See TCP]
Transport      
Transport Layer Security      [See TLS]
transport, adjacency, definition of      
transport, layer      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
transport, layer, definition of      
transport, message types, SSHv2      
transport, mode      
triple DES      [See 3DES]
TTL (time to live)      2nd 3rd 4th 5th 6th
tun device      2nd 3rd 4th 5th 6th
TUN/TAP device      
tun0 device      2nd
tunnel      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd
tunnel, definition of      
tunnel, IP-in-IP      2nd 3rd 4th 5th 6th 7th 8th 9th
tunnel, mode      
tunnel, MPLS      
Tunneling      2nd 3rd 4th
tunneling, definition of      
Turner, J.      
Tx connect speed, definition of      
UDP (User Datagram Protocol)      
UDP, definition of      2nd
UDP, header      
UDP, protocol      
UNIX      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
unreliable, definition of      
unsolicited downstream mode, definition of      
unsolicited email      [See SPAM]
urandom device      
urandom device, definition of      
URG flag, definition of      
User Datagram Protocol      [See UDP]
Vaananen, P.      
Valencia, A.J.      2nd
van Oorschot, P.C.      2nd 3rd 4th
Vanstone, S.A.      2nd 3rd
Varadhan, K.      
Varghese, G.      
Vaudenay, S.      
Verthein, W.      
Viega, J.      
Virtual Private Network      [See VPN]
Viswanathan, A.      
Vollbrecht, J.R.      
Volpe, V.      2nd
voluntary mode, definition of      
Voydock, V.L.      
VPN (virtual private network)      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd
VPN, definition of      
VPN, lightweight      2nd 3rd 4th
VPN, MPLS      2nd
VPN, SSH      
VPN, SSL      
Vtun      2nd 3rd 4th 5th 6th 7th
VTun, authentication      
VTun, security      
VTun, tunnel parameter options      
vtund program      
Vuagnoux, M.      
Wagner, D.      2nd 3rd 4th
Waissbein, A.      
WAN error notify message      [See WEN]
Wang, X.      
Weis, B.      
WEN (WAN error notify message)      
WEN, AVPs      
WEN, definition of      
WEP (wired equivalent privacy), definition of      
Wheeler, R.      
Wilson, S.      
Wired Equivalent Privacy      [See WEP]
Wright, G.      
write function      
Wu, L.
X.509      
X.509, certificate      
X.509, certificate, definition of      
X11 forwarding      2nd 3rd 4th
Yin, Y.L.      
Ylonen, T.      
Yu
Yu, H.
Yu, J.
zero length body message      [See ZLB]
Zheng, P.      
ZLB message, definition of      
Zorn, G.      2nd 3rd 4th 5th
1 2 3 4 5
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте