null
Loading... Please wait...
FREE SHIPPING on All Unbranded Items LEARN MORE
Print This Page

Virtual Private Networks (Turning the Internet Into Your Private Network)

List Price: $39.99
SKU:
9781565925298
Quantity:
Minimum Purchase
25 unit(s)
  • Availability: Confirm prior to ordering
  • Branding: minimum 50 pieces (add’l costs below)
  • Check Freight Rates (branded products only)

Branding Options (v), Availability & Lead Times

  • 1-Color Imprint: $2.00 ea.
  • Promo-Page Insert: $2.50 ea. (full-color printed, single-sided page)
  • Belly-Band Wrap: $2.50 ea. (full-color printed)
  • Set-Up Charge: $45 per decoration
FULL DETAILS
  • Availability: Product availability changes daily, so please confirm your quantity is available prior to placing an order.
  • Branded Products: allow 10 business days from proof approval for production. Branding options may be limited or unavailable based on product design or cover artwork.
  • Unbranded Products: allow 3-5 business days for shipping. All Unbranded items receive FREE ground shipping in the US. Inquire for international shipping.
  • RETURNS/CANCELLATIONS: All orders, branded or unbranded, are NON-CANCELLABLE and NON-RETURNABLE once a purchase order has been received.
  • Product Details

    Author:
    Mike Erwin, Paul Wolfe, Charlie Scott
    Format:
    Paperback
    Pages:
    228
    Publisher:
    O'Reilly Media (January 26, 1999)
    Language:
    English
    ISBN-13:
    9781565925298
    ISBN-10:
    1565925297
    Dimensions:
    7" x 9.19"
    Case Pack:
    30
    File:
    TWO RIVERS-PERSEUS-Metadata_Only_Perseus_Distribution_Customer_Group_Metadata_20251022163324-20251022.xml
    Folder:
    TWO RIVERS
    List Price:
    $39.99
    As low as:
    $34.39
    Publisher Identifier:
    P-PER
    Discount Code:
    C
    Country of Origin:
    United States
    Pub Discount:
    60
    Weight:
    14.72oz
    Imprint:
    O'Reilly Media
  • Overview

    Historically, only large companies could afford secure networks, which they created from expensive leased lines. Smaller folks had to make do with the relatively untrusted Internet. Nowadays, even large companies have to go outside their private nets, because so many people telecommute or log in while they're on the road. How do you provide a low-cost, secure electronic network for your organization?

    The solution is a virtual private network: a collection of technologies that creates secure connections or "tunnels" over regular Internet lines--connections that can be easily used by anybody logging in from anywhere. A number of products now exist to help you develop that solution.

    This book tells you how to plan and build a VPN. It starts with general concerns like costs, configuration, and how a VPN fits in with other networking technologies like firewalls. It continues with detailed descriptions of how to install and use VPN technologies that are available for Windows NT and Unix, such as PPTP and L2TP, Altavista Tunnel, Cisco PIX, and the secure shell (SSH).

    New features in the second edition include SSH, which is a popular VPN solution for Unix systems, and an expanded description of the IPSec standard, for which several vendors have announced support.

    Topics include:

    • How the VPN compares to other available networking technologies
    • Introduction to encryption, firewalls, the IPSec standard, and other technologies that let VPNs work
    • Point to Point Tunneling Protocol (PPTP) and L2TP
    • The Altavista Tunnel
    • The Cisco PIX Firewall
    • Secure Shell (SSH)
    • Maintenance and troubleshooting