Da: World of Books (was SecondSale), Montgomery, IL, U.S.A.
Condizione: Good. Item in good condition. Textbooks may not include supplemental items i.e. CDs, access codes etc.
Da: World of Books (was SecondSale), Montgomery, IL, U.S.A.
Condizione: Very Good. Item in very good condition! Textbooks may not include supplemental items i.e. CDs, access codes etc.
Da: Orion Tech, Kingwood, TX, U.S.A.
paperback. Condizione: Fair.
Da: World of Books (was SecondSale), Montgomery, IL, U.S.A.
Condizione: Very Good. Item in very good condition! Textbooks may not include supplemental items i.e. CDs, access codes etc.
Da: HPB-Diamond, Dallas, TX, U.S.A.
paperback. Condizione: Very Good. Connecting readers with great books since 1972! Used books may not include companion materials, and may have some shelf wear or limited writing. We ship orders daily and Customer Service is our top priority!
Da: ThriftBooks-Dallas, Dallas, TX, U.S.A.
Paperback. Condizione: As New. No Jacket. Pages are clean and are not marred by notes or folds of any kind. ~ ThriftBooks: Read More, Spend Less.
Lingua: Inglese
Editore: O'Reilly Media, Incorporated, 1999
ISBN 10: 1565925297 ISBN 13: 9781565925298
Da: Better World Books, Mishawaka, IN, U.S.A.
Condizione: Very Good. 2nd. Former library copy. Pages intact with possible writing/highlighting. Binding strong with minor wear. Dust jackets/supplements may not be included. Includes library markings. Stock photo provided. Product includes identifying sticker. Better World Books: Buy Books. Do Good.
Lingua: Inglese
Editore: O'Reilly Media (edition 2), 1999
ISBN 10: 1565925297 ISBN 13: 9781565925298
Da: BooksRun, Philadelphia, PA, U.S.A.
Paperback. Condizione: Good. 2. It's a preowned item in good condition and includes all the pages. It may have some general signs of wear and tear, such as markings, highlighting, slight damage to the cover, minimal wear to the binding, etc., but they will not affect the overall reading experience.
Da: WorldofBooks, Goring-By-Sea, WS, Regno Unito
EUR 3,94
Quantità: 1 disponibili
Aggiungi al carrelloPaperback. Condizione: Good. The book has been read but remains in clean condition. All pages are intact and the cover is intact. Some minor wear to the spine.
EUR 8,68
Quantità: 1 disponibili
Aggiungi al carrelloCondizione: very good. Gut/Very good: Buch bzw. Schutzumschlag mit wenigen Gebrauchsspuren an Einband, Schutzumschlag oder Seiten. / Describes a book or dust jacket that does show some signs of wear on either the binding, dust jacket or pages.
Condizione: New.
EUR 24,05
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. Brand New! Not Overstocks or Low Quality Book Club Editions! Direct From the Publisher! We're not a giant, faceless warehouse organization! We're a small town bookstore that loves books and loves it's customers! Buy from Lakeside Books!
EUR 24,05
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. Brand New! Not Overstocks or Low Quality Book Club Editions! Direct From the Publisher! We're not a giant, faceless warehouse organization! We're a small town bookstore that loves books and loves it's customers! Buy from Lakeside Books!
EUR 29,35
Quantità: Più di 20 disponibili
Aggiungi al carrelloPaperback. Condizione: New. Second. Historically, only large companies could afford secure networks, which they created from expensive leased lines. Smaller folks had to make do with the relatively untrusted Internet. Nowadays, even large companies have to go outside their private nets, because so many people telecommute or log in while they're on the road. How do you provide a low-cost, secure electronic network for your organization? The solution is a virtual private network: a collection of technologies that creates secure connections or "tunnels" over regular Internet lines -- connections that can be easily used by anybody logging in from anywhere. A number of products now exist to help you develop that solution. This book tells you how to plan and build a VPN. It starts with general concerns like costs, configuration, and how a VPN fits in with other networking technologies like firewalls. It continues with detailed descriptions of how to install and use VPN technologies that are available for Windows NT and UNIX, such as PPTP and L2TP, Altavista Tunnel, Cisco PIX, and the secure shell (SSH).New features in the second edition include SSH, which is a popular VPN solution for UNIX systems, and an expanded description of the IPSec standard, for which several vendors have announced support. Topics include: How the VPN compares to other available networking technologies Introduction to encryption, firewalls, the IPSec standard, and other technologies that let VPNs work Point to Point Tunneling Protocol (PPTP) and LT2P The Altavista Tunnel The Cisco PIX Firewall Secure Shell (SSH) Maintenance and troubleshooting.
Condizione: As New. Unread book in perfect condition.
Da: Libros Tobal, Ajalvir, M, Spagna
EUR 9,48
Quantità: 2 disponibili
Aggiungi al carrelloTapa blanda. Condizione: Bien. O Reilly Media, Inc., 1999. Texto en inglés. Programación. Informática. 211 páginas. 23 x 18. Tapa blanda de editorial ilustrada. Sin subrayados ni anotaciones. Muy Buen estado de conservación. ISBN: 9781565925298. Libro.
EUR 36,83
Quantità: 2 disponibili
Aggiungi al carrelloPaperback. Condizione: New. Second. Historically, only large companies could afford secure networks, which they created from expensive leased lines. Smaller folks had to make do with the relatively untrusted Internet. Nowadays, even large companies have to go outside their private nets, because so many people telecommute or log in while they're on the road. How do you provide a low-cost, secure electronic network for your organization? The solution is a virtual private network: a collection of technologies that creates secure connections or "tunnels" over regular Internet lines -- connections that can be easily used by anybody logging in from anywhere. A number of products now exist to help you develop that solution. This book tells you how to plan and build a VPN. It starts with general concerns like costs, configuration, and how a VPN fits in with other networking technologies like firewalls. It continues with detailed descriptions of how to install and use VPN technologies that are available for Windows NT and UNIX, such as PPTP and L2TP, Altavista Tunnel, Cisco PIX, and the secure shell (SSH).New features in the second edition include SSH, which is a popular VPN solution for UNIX systems, and an expanded description of the IPSec standard, for which several vendors have announced support. Topics include: How the VPN compares to other available networking technologies Introduction to encryption, firewalls, the IPSec standard, and other technologies that let VPNs work Point to Point Tunneling Protocol (PPTP) and LT2P The Altavista Tunnel The Cisco PIX Firewall Secure Shell (SSH) Maintenance and troubleshooting.
EUR 30,87
Quantità: 3 disponibili
Aggiungi al carrelloCondizione: new.
Da: BargainBookStores, Grand Rapids, MI, U.S.A.
Paperback or Softback. Condizione: New. Virtual Private Networks: Turning the Internet Into Your Private Network. Book.
EUR 32,01
Quantità: 2 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
EUR 32,36
Quantità: 2 disponibili
Aggiungi al carrelloCondizione: New.
EUR 32,82
Quantità: 3 disponibili
Aggiungi al carrelloBook. Condizione: New. New copy - Usually dispatched within 4 working days.
Lingua: Inglese
Editore: O'Reilly Media, Incorporated, 1999
ISBN 10: 1565925297 ISBN 13: 9781565925298
Da: Majestic Books, Hounslow, Regno Unito
EUR 43,21
Quantità: 3 disponibili
Aggiungi al carrelloCondizione: New. pp. 232.
Da: Revaluation Books, Exeter, Regno Unito
EUR 39,68
Quantità: 2 disponibili
Aggiungi al carrelloPaperback. Condizione: Brand New. 2nd sub edition. 211 pages. 9.50x7.25x0.75 inches. In Stock.
EUR 45,78
Quantità: 1 disponibili
Aggiungi al carrelloCondizione: New. A guide to setting up systems that can utilize the Internet to access and send information from one network to another, yet remain secure from unauthorized viewers. Four specific solutions are treated, including Layer two tunneling through PPTP or L2TP. Num Pages: 211 pages, Ill. BIC Classification: URY; UT; UYV. Category: (P) Professional & Vocational. Dimension: 232 x 178 x 16. Weight in Grams: 450. . 1999. 2nd Edition. Paperback. . . . .
Condizione: New. A guide to setting up systems that can utilize the Internet to access and send information from one network to another, yet remain secure from unauthorized viewers. Four specific solutions are treated, including Layer two tunneling through PPTP or L2TP. Num Pages: 211 pages, Ill. BIC Classification: URY; UT; UYV. Category: (P) Professional & Vocational. Dimension: 232 x 178 x 16. Weight in Grams: 450. . 1999. 2nd Edition. Paperback. . . . . Books ship from the US and Ireland.
Da: BennettBooksLtd, Los Angeles, CA, U.S.A.
paperback. Condizione: New. In shrink wrap. Looks like an interesting title!
EUR 32,37
Quantità: Più di 20 disponibili
Aggiungi al carrelloPaperback. Condizione: New. Second. Historically, only large companies could afford secure networks, which they created from expensive leased lines. Smaller folks had to make do with the relatively untrusted Internet. Nowadays, even large companies have to go outside their private nets, because so many people telecommute or log in while they're on the road. How do you provide a low-cost, secure electronic network for your organization? The solution is a virtual private network: a collection of technologies that creates secure connections or "tunnels" over regular Internet lines -- connections that can be easily used by anybody logging in from anywhere. A number of products now exist to help you develop that solution. This book tells you how to plan and build a VPN. It starts with general concerns like costs, configuration, and how a VPN fits in with other networking technologies like firewalls. It continues with detailed descriptions of how to install and use VPN technologies that are available for Windows NT and UNIX, such as PPTP and L2TP, Altavista Tunnel, Cisco PIX, and the secure shell (SSH).New features in the second edition include SSH, which is a popular VPN solution for UNIX systems, and an expanded description of the IPSec standard, for which several vendors have announced support. Topics include: How the VPN compares to other available networking technologies Introduction to encryption, firewalls, the IPSec standard, and other technologies that let VPNs work Point to Point Tunneling Protocol (PPTP) and LT2P The Altavista Tunnel The Cisco PIX Firewall Secure Shell (SSH) Maintenance and troubleshooting.
EUR 33,83
Quantità: Più di 20 disponibili
Aggiungi al carrelloKartoniert / Broschiert. Condizione: New. A guide to setting up systems that can utilize the Internet to access and send information from one network to another, yet remain secure from unauthorized viewers. Four specific solutions are treated, including Layer two tunneling through PPTP or L2TP.
Da: AHA-BUCH GmbH, Einbeck, Germania
EUR 42,50
Quantità: 2 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. Neuware - Historically, only large companies could afford secure networks, which they created from expensive leased lines. Smaller folks had to make do with the relatively untrusted Internet. Nowadays, even large companies have to go outside their private nets, because so many people telecommute or log in while they're on the road. How do you provide a low-cost, secure electronic network for your organization The solution is a virtual private network: a collection of technologies that creates secure connections or 'tunnels' over regular Internet lines--connections that can be easily used by anybody logging in from anywhere. A number of products now exist to help you develop that solution.This book tells you how to plan and build a VPN. It starts with general concerns like costs, configuration, and how a VPN fits in with other networking technologies like firewalls. It continues with detailed descriptions of how to install and use VPN technologies that are available for Windows NT and Unix, such as PPTP and L2TP, Altavista Tunnel, Cisco PIX, and the secure shell (SSH).New features in the second edition include SSH, which is a popular VPN solution for Unix systems, and an expanded description of the IPSec standard, for which several vendors have announced support.Topics include:How the VPN compares to other available networking technologies - Introduction to encryption, firewalls, the IPSec standard, and other technologies that let VPNs work - Point to Point Tunneling Protocol (PPTP) and L2TP - The Altavista Tunnel - The Cisco PIX Firewall - Secure Shell (SSH) - Maintenance and troubleshooting.