La lecture à portée de main
Découvre YouScribe en t'inscrivant gratuitement
Je m'inscrisDécouvre YouScribe en t'inscrivant gratuitement
Je m'inscrisDescription
VPNs are frequently used by remote workers or companies with remote offices to share private data and network resources. VPNs may also allow users to bypass regional internet restrictions such as firewalls, and web filtering, by ""tunneling"" the network connection to a different region.
Technically, the VPN protocol encapsulates network data transfers using a secure cryptographic method between two or more networked devices which are not on the same private network, to keep the data private as it passes through the connecting nodes of a local or wide area network.
This book is your ultimate resource for Virtual Private Networks. Here you will find the most up-to-date information, analysis, background and everything you need to know.
In easy to read chapters, with extensive references and links to get you to know all there is to know about Virtual Private Networks right away, covering: Virtual private network, AEP Netilla Secure Remote Access SSL VPN, Darknet (file sharing), Decentralized network 42, DirectAccess, Gbridge, IP-VPN Lite, IPREDator, Kerio Control, Layer 2 Tunneling Protocol, Network Extrusion, OpenVPN, Racoon (KAME), SoftEther Corporation, StrongSwan, Virtual file server, Vyatta, WinGate, Wippien, Zeroshell
This book explains in-depth the real drivers and workings of Virtual Private Networks. It reduces the risk of your technology, time and resources investment decisions by enabling you to compare your understanding of Virtual Private Networks with the objectivity of experienced professionals.
Sujets
Informations
Publié par | Emereo Publishing |
Date de parution | 24 octobre 2012 |
Nombre de lectures | 0 |
EAN13 | 9781743331637 |
Langue | English |
Poids de l'ouvrage | 1 Mo |
Informations légales : prix de location à la page 0,1598€. Cette information est donnée uniquement à titre indicatif conformément à la législation en vigueur.
Extrait