Atjaunināt sīkdatņu piekrišanu

E-grāmata: Complete Book of Remote Access: Connectivity and Security

Edited by (TechWrite, Pomeroy, Ohio, USA)
  • Formāts: 392 pages
  • Sērija : Best Practices
  • Izdošanas datums: 10-Dec-2002
  • Izdevniecība: Auerbach
  • Valoda: eng
  • ISBN-13: 9781420000429
  • Formāts - PDF+DRM
  • Cena: 56,34 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Bibliotēkām
  • Formāts: 392 pages
  • Sērija : Best Practices
  • Izdošanas datums: 10-Dec-2002
  • Izdevniecība: Auerbach
  • Valoda: eng
  • ISBN-13: 9781420000429

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

Overviews the different approaches and technologies available for implementing remote access to help managers select which are best suited to their company's needs. The guide also explores some of the issues surrounding security and management that arise when accessing a computer system remotely. Topics of the 28 chapters include extranets, virtual private networking, the wireless application protocol, centralized authentication services, the top ten dial-up security mistakes, and evaluating organizational readiness for telecommuting. Annotation (c) Book News, Inc., Portland, OR (booknews.com)

As technology advances, the demand and necessity for seamless connectivity and stable access to servers and networks is increasing exponentially. Unfortunately the few books out there on remote access focus on Cisco certification preparation, one aspect of network connectivity or security. This text covers both-the enabling technology and how to make remote access secure.

The definitive resource for network administrators and IT professionals implementing and maintaining remote access systems, The Complete Book of Remote Access: Connectivity and Security provides the technical background needed to confidently select and implement the best remote access technologies for your company's network. It provides basic technical information on remote access network technologies and the functional information on the role that remote access networks play in moving information.

In-depth coverage shows you how to assess remote access needs and identify appropriate solutions for different platforms. The author includes discussions of remote access configuration, security considerations from strong authentication to VPN, troubleshooting, maintenance, and disaster recovery. With coverage on the enabling technologies and how to make remote access secure, The Complete Book of Remote Access is truly the definitive resource for network administrators and IT professionals looking to achieve seamless connectivity and stable remote access to servers and networks.
UNIT 1 INTRODUCTION TO REMOTE ACCESS 1(72)
Fundamentals of Remote Access
3(10)
David A. Zimmer
Naaman Mustafa
Thomas R. Peltier
Designing a Remote Access Solution
13(16)
Naaman Mustafa
Thomas R. Peltier
Remote Access Functions
29(10)
Nathan J. Muller
Gerald L. Bahr
Extranets: Borderless Internet/Intranet Networking
39(8)
Duane E. Sharp
Implementing and Supporting Extranets
47(12)
Phillip Q. Maier
Providing Access to External Databases
59(6)
Gilbert Held
Remote LAN Access Technology
65(8)
Michael Van Patten
UNIT 2 TECHNOLOGY 73(90)
Communication Servers
75(10)
Denise M. Jones
Virtual Private Networking
85(10)
Matthew Wallace
James S. Tiller
Overview of Traditional Carrier Virtual Private Networks
95(12)
Nathan J. Muller
James S. Tiller
VPN Design Approaches
107(20)
Gilbert Held
James S. Tiller
Wireless Technology
127(10)
Andres Llana, Jr.
Wireless Application Protocol (WAP)
137(20)
Mahesh S. Raisinghani
Carlson Colomb
Choosing a Remote Access Strategy
157(6)
John R. Vacca
UNIT 3 SECURITY 163(142)
An Introduction to Secure Remote Access
165(18)
Christina M. Bird
Centralized Authentication Services
183(18)
Bill Stackpole
Remote Access Authentication
201(12)
Ellen Bonsall
Security Risks in Telecommuting
213(8)
Pirkka Palomaki
Secure External Network Communications
221(12)
John R. Vacca
Dial-Up Security Controls
233(12)
Alan Berman
Jeffrey L. Ott
Top 10 Dial-In Security Mistakes
245(6)
Heather Smartt
Virtual Private Network Security
251(18)
John R. Vacca
VPNs: Secure Remote Access over the Internet
269(14)
John R. Vacca
Wireless Internet Security
283(22)
Dennis Seymour Lee
UNIT 4 MANAGEMENT 305(48)
Telecommuting: Issues for the IS Manager
307(8)
Sheila M. Jacobs
Mary Van Sell
Evaluating Organizational Readiness for Telecommuting
315(8)
Nancy Blumenstalk Mingus
Supporting Telework
323(10)
Heikki Topi
Assuming Command of Your Network
333(20)
David A. Zimmer
Andres Llana, Jr.
Index 353
Victor Kasacavage