هذا الكتاب عن الشبكات الأفتراضية virual Private Network وطريقة أعدادها وشرح مفصل لهذه التقنية الحديثة ومدى أمنيتها ومزايها وعيوبها
VPN Security
Page
1
of
23
TABLE OF CONTENTS
Summary
3
I. What is VPN?
4
VPN Security
4
II.
Business Considerations
.
6
VPN Deployment
6
Types of VPN product
....
7
III. Common VPN Tunneling Technologies
................................
................................
......
8
IPsec
(Internet Protocol Security)
................................
................................
...................
8
PPTP (Point
-
to
-
Point Tunneling Protocol)
................................
................................
...
12
L2TP (Layer 2 Tunneling Protocol)
13
SSL / TLS
14
IV. Risks & Limitations of VPN
16
Hacking Attacks
16
User Authentication
16
Client Side Risks
...
...........
17
Virus / Malware Infections
17
Incorrect Network Access Rights
18
Interoperability
18
V.
Security
Considerations
19
General VPN Security Considerations
19
Extranet VPN Security Considerations
.........
20
VPN Security
Page
2
of
23
Client Side VPN Security Considerations
....
20
Common Security Features in VPN Products
21
VI. Co
nclusion
..............................
-
من كتب شبكات الحاسوب - مكتبة كتب تقنية المعلومات.
هذا الكتاب عن الشبكات الأفتراضية virual Private Network وطريقة أعدادها وشرح مفصل لهذه التقنية الحديثة ومدى أمنيتها ومزايها وعيوبها
VPN Security
Page
1
of
23
TABLE OF CONTENTS
Summary
3
I. What is VPN?
4
VPN Security
4
II.
Business Considerations
.
6
VPN Deployment
6
Types of VPN product
....
7
III. Common VPN Tunneling Technologies
................................
................................
......
8
IPsec
(Internet Protocol Security)
................................
................................
...................
8
PPTP (Point
-
to
-
Point Tunneling Protocol)
................................
................................
...
12
L2TP (Layer 2 Tunneling Protocol)
13
SSL / TLS
14
IV. Risks & Limitations of VPN
16
Hacking Attacks
16
User Authentication
16
Client Side Risks
...
...........
17
Virus / Malware Infections
17
Incorrect Network Access Rights
18
Interoperability
18
V.
Security
Considerations
19
General VPN Security Considerations
19
Extranet VPN Security Considerations
.........
20
VPN Security
Page
2
of
23
Client Side VPN Security Considerations
....
20
Common Security Features in VPN Products
21
VI. Co
nclusion
..............................
عدد مرات التحميل : 26383 مرّة / مرات.
تم اضافته في : الأحد , 11 مايو 2008م.
حجم الكتاب عند التحميل : 137.9 كيلوبايت .
VPN Security
Page
1
of
23
TABLE OF CONTENTS
Summary
3
I. What is VPN?
4
VPN Security
4
II.
Business Considerations
.
6
VPN Deployment
6
Types of VPN product
....
7
III. Common VPN Tunneling Technologies
................................
................................
......
8
IPsec
(Internet Protocol Security)
................................
................................
...................
8
PPTP (Point
-
to
-
Point Tunneling Protocol)
................................
................................
...
12
L2TP (Layer 2 Tunneling Protocol)
13
SSL / TLS
14
IV. Risks & Limitations of VPN
16
Hacking Attacks
16
User Authentication
16
Client Side Risks
...
...........
17
Virus / Malware Infections
17
Incorrect Network Access Rights
18
Interoperability
18
V.
Security
Considerations
19
General VPN Security Considerations
19
Extranet VPN Security Considerations
.........
20
VPN Security
Page
2
of
23
Client Side VPN Security Considerations
....
20
Common Security Features in VPN Products
21
VI. Co
nclusion
..............................
تحميل مباشر بدون روابط الشبكات الأفتراضية pdf VPN
قراءة وتصفح أولاين كتاب الشبكات الأفتراضية pdf VPN
قراءة و تحميل كتاب الوصول السريع لأدوات مدير النظام For fast access PDF مجانا
قراءة و تحميل كتاب مركز الخدمات والدعم Help And Center Supported PDF مجانا