Free Shipping Automatically at $50
Shopping Cart
IPSec VPN Guide: Secure Virtual Private Networks for Remote Work & Online Privacy | Technical Setup & Best Practices
IPSec VPN Guide: Secure Virtual Private Networks for Remote Work & Online Privacy | Technical Setup & Best Practices
IPSec VPN Guide: Secure Virtual Private Networks for Remote Work & Online Privacy | Technical Setup & Best Practices

IPSec VPN Guide: Secure Virtual Private Networks for Remote Work & Online Privacy | Technical Setup & Best Practices

$71.5 $130 -45% OFF

Free shipping on all orders over $50

7-15 days international

28 people viewing this product right now!

30-day free returns

Secure checkout

27506669

Guranteed safe checkout
amex
paypal
discover
mastercard
visa
apple pay

Description

What is IPSec? What's a VPN? Why do the need each other? Virtual Private Network (VPN) has become one of the most recognized terms in our industry, yet there continuously seems to be different impressions of what VPNs really are and can become. A Technical Guide to IPSec Virtual Private Networks provides a single point of information that represents hundreds or resources and years of experience with IPSec VPN solutions. It cuts through the complexity surrounding IPSec and the idiosyncrasies of design, implementation, operations, and security. Starting with a primer on the IP protocol suite, the book travels layer by layer through the protocols and the technologies that make VPNs possible. It includes security theory, cryptography, RAS, authentication, IKE, IPSec, encapsulation, keys, and policies. After explaining the technologies and their interrelationships, the book provides sections on implementation and product evaluation. A Technical Guide to IPSec Virtual Private Networks arms information security, network, and system engineers and administrators with the knowledge and the methodologies to design and deploy VPNs in the real world for real companies.

Reviews

******
- Verified Buyer
I was lucky enough to come across this book at a book show in New York. I am happy to see that an author has seen fit to properly address what is becoming a hot technology for enterprise businesses as well as service providers. Mr. Tiller obviously speaks from the voice of experience, as opposed to some works I have seen which are products of cut and paste artists. I particularly enjoyed the section on IKE. This is a commonly misunderstood yet essential component in any secure remote access architecture. The book is easy enough for most security neophytes to understand yet still meaty enough to satisfy and teach veteran bit-heads. Read this book and then keep it nearby. I hope the author has more books planned, this was great.