Condizione: Very Good. Very Good Condition. Five star seller - Buy with confidence!
Hardcover. Condizione: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less.
Hardcover. Condizione: Very Good. No Jacket. Missing dust jacket; May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less.
Hardcover. Condizione: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less.
Condizione: very_good. Gently read. May have name of previous ownership, or ex-library edition. Binding tight; spine straight and smooth, with no creasing; covers clean and crisp. Minimal signs of handling or shelving. 100% GUARANTEE! Shipped with delivery confirmation, if you're not satisfied with purchase please return item for full refund. Ships USPS Media Mail.
Lingua: Inglese
Editore: Pearson Education, Limited, 2000
ISBN 10: 1578701813 ISBN 13: 9781578701810
Da: Better World Books: West, Reno, NV, U.S.A.
Condizione: Good. Pages intact with minimal writing/highlighting. The binding may be loose and creased. Dust jackets/supplements are not included. Stock photo provided. Product includes identifying sticker. Better World Books: Buy Books. Do Good.
Editore: Cisco Systems, 2000
Da: Evergreen Goodwill, Seattle, WA, U.S.A.
hardcover. Condizione: Good.
Lingua: Inglese
Editore: Pearson Education, Limited, 2000
ISBN 10: 1578701813 ISBN 13: 9781578701810
Da: Better World Books Ltd, Dunfermline, Regno Unito
EUR 7,00
Quantità: 1 disponibili
Aggiungi al carrelloCondizione: Good. Pages intact with minimal writing/highlighting. The binding may be loose and creased. Dust jackets/supplements are not included. Stock photo provided. Product includes identifying sticker. Better World Books: Buy Books. Do Good.
Condizione: very_good. Book is in very good condition. Clean with little to no signs of wear or markings highlights.
Condizione: good. A copy that has been read, remains in good condition. All pages are intact, and the cover is intact. The spine and cover show signs of wear. Pages can include notes and highlighting and show signs of wear, and the copy can include "From the library of" labels or previous owner inscriptions. 100% GUARANTEE! Shipped with delivery confirmation, if you're not satisfied with purchase please return item for full refund. Ships via media mail.
Paperback. Condizione: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority!
Da: medimops, Berlin, Germania
EUR 32,78
Quantità: 1 disponibili
Aggiungi al carrelloCondizione: good. Befriedigend/Good: Durchschnittlich erhaltenes Buch bzw. Schutzumschlag mit Gebrauchsspuren, aber vollständigen Seiten. / Describes the average WORN book or dust jacket that has all the pages present.
hardcover. Condizione: As New.
Hardcover. Condizione: New. In shrink wrap. Looks like an interesting title!
Paperback. Condizione: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less.
ISBN 10: 7115295778 ISBN 13: 9787115295774
Da: liu xing, Nanjing, JS, Cina
EUR 61,41
Quantità: 1 disponibili
Aggiungi al carrellopaperback. Condizione: New. Ship out in 2 business day, And Fast shipping, Free Tracking number will be provided after the shipment.Paperback. Pub Date :2012-11-01 Pages: 297 Publisher: basic information about the title of the People's Posts and Telecommunications Press: the IPSec VPN designed ISBN: 9787115295774 Press: People's Posts and Telecommunications Press Author: of Vijay Bollapragada Mohamed Khalid Scott Wainner with original price: 55 yuan Publication Date :2012-11-1 Price: the 38.5 yuan Revision: 1 Binding: Paperback word count: 410.000 yds: 297 Folio: 16 Weight: Editor's Choice IPSec VPN Design guidance manual secure VPN communication the IPSec protocol design pioneer for help readers deploy efficient. secure VPN solutions Summary IPSec VPN technology is a popular and a lot of books about technical details and product-level configuration of the IPSec protocol. but did not discuss the the IPSec VPN overall design problem. IPSec The VPN design aims to fill this gap. and to help the reader to deploy efficient. secure IPSec VPN solutions in a variety of environments. IPSec VPN Design detailed discussion of the IPSec VPN design guide readers in-depth understanding of the design and architecture of large-scale IPSec VPN solutions. IPSec VPN Design is divided into three parts. the first part of a comprehensive the IPSec architecture including IPSec protocols and Cisco IOS IPSec implementation details; discussed in the second part of the IPSec VPN design principles. including the star (hub-and-spoke) and interconnect topology and fault-tolerant design. dynamic configuration models used to simplify IPSec VPN configuration; third section discusses applications such as voice and multicast support IPSec VPN involved. to explore how to effectively integrate IPSec VPN and MPLS VPN. IPSec VPN Design fit in IPSec VPN design. network deployment and troubleshooting practitioners read. also suitable for the pro forma Cisco certified candidates to read. 11.1 VPN deployment motives of Contents Table of Contents Chapter 1 Introduction to VPN 11.2 VPN 31.2.1 Layer 2 VPN 31.2.2 Layer 3 VPN 41.2.3 remote access VPN 51.3 Summary 7 Chapter 2 the IPSec Overview 92.1 encrypt terminology 102.1.1 the symmetric algorithm 102.1.2 the asymmetric algorithms 102.1.3 digital signature 122.2 IPSec security protocol 132.2.1 IPSec transport mode the 132.2.2 IPSec tunnel mode 142.2.3 Encapsulating Security effective load (ESP) 152.2.4 Authentication Header (AH) 162.3 key management and security association 172.3.1 Diffie-Hellman key exchange 182.3.2 security associations and IKE works 192.3.3 IKE Phase 1 works 212.3.4 IKE Phase 2 works 252.3.5 IPSec packet processing 272.4 summarizes 33 Chapter 3 Enhanced of IPSec features 353.1 IKE survival messages failure peer detection 353.2 363.3 idle timeout 413.4 reverse route injection 433.5 stateful failover 493.5.1 SADB transmission the 493.5.2 SADB synchronization 503.6 IPSec and segmentation 573.6.1 IPSec the first subparagraph 603.7 GRE and IPSec 613.8 IPSec and the NAT 663.8.1 NAT the AH 663.8.2 NAT on ESP. of 673.8.3 NAT on IKE impact 673.8.4 IPSec and NAT solutions coexistence and PMTUD 583.6.2 673.9 Summary 76 Chapter 4 IPSec authentication and authorization model 794.1 Extensible Authentication mode configuration 794.2 mode configuration 824.3 844.3.2 Network the Easy VPN 844.3.1 EzVPN client mode expansion mode 874.4 IPSec VPN using digital certificates of 904.4.1 digital certificate 914.4. 2 application for a certificate 914.4.3 revoked certificates connection model of 975.1.1 IPSec model the 985.1.2 GRE model 995.1.3 995.1.4 IPSec remote access client model summary 1005.2 924.5 Summary 94 Chapter 5 IPSec VPN architecture 975.1 IPSec VPN connection model star architecture 1015.2.1 use the the IPSec model of 1025.2.2 GRE model 1135.2.3 remote access client connection model 1285.3 the full interconnection architecture 1375.3.1 intrinsic the IPSec connection model 1385.3.2 GRE model 1445.4 148 Chapter 6 summarizes design of fault-to.