Virtual Private Networks: Technologies and Solutions
Book Details
Description
Authors Ruixi Yuan and Timothy Strayer take a scholarly approach: Each topic is introduced, and new terms described, as the functions of each piece in VPN systems are explained. Books and papers relevant to the topic are referenced frequently, along with standards documents, and the book uses pseudocode and mathematical expressions to explain encryption and authentication. If you study the book--along with the other publications-carefully, you'll be rewarded with a deep understanding of how to build a good VPN. --David Wall
Topics covered: The state of the art in virtual private networks (VPNs), with special coverage of tunneling (via PPTP, L2F, L2TP, IPsec, and MPLS), the IPsec protocol, authentication, public key infrastructure (PKI), gateways, and clients. VPNs for static links as well as for remote access solutions are covered.
