Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
Filter
  • 1995-1999  (3)
  • Safari Tech Books Online  (3)
  • Springer Fachmedien Wiesbaden GmbH
  • Computer networks ; Security measures  (3)
  • 1
    Online-Ressource
    Online-Ressource
    Indianapolis : Macmillan Technical | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: 296 p. , ill. ; , 24 cm
    Serie: Technology series
    Schlagwort(e): Business enterprises ; Computer networks ; Security measures ; Computer networks ; Security measures ; Public key infrastructure (Computer security) ; Electronic books ; local
    Kurzfassung: This book is a tutorial on, and a guide to the deployment of, Public-Key Infrastructures. It covers a broad range of material related to PKIs, including certification, operational considerations and standardization efforts, as well as deployment issues and considerations. Emphasis is placed on explaining the interrelated fields within the topic area, to assist those who will be responsible for making deployment decisions and architecting a PKI within an organization.
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    Online-Ressource
    Online-Ressource
    Beijing [China] ; : O'Reilly | Boston, MA :Safari,
    ISBN: 1565925297
    Sprache: Englisch
    Seiten: xiv, 211 p. , ill. ; , 24 cm
    Ausgabe: 2nd ed.
    DDC: 004.6
    Schlagwort(e): Business enterprises ; Computer networks ; Computer networks ; Security measures ; Extranets (Computer networks) ; Internet ; Telecommuting ; Electronic books ; local
    Kurzfassung: Historically, only large companies could afford secure networks, which they created from expensive leased lines. Smaller folks had to make do with the relatively untrusted Internet. Nowadays, even large companies have to go outside their private nets, because so many people telecommute or log in while they're on the road. How do you provide a low-cost, secure electronic network for your organization? The solution is a virtual private network: a collection of technologies that creates secure connections or "tunnels" over regular Internet lines--connections that can be easily used by anybody logging in from anywhere. A number of products now exist to help you develop that solution. This book tells you how to plan and build a VPN. It starts with general concerns like costs, configuration, and how a VPN fits in with other networking technologies like firewalls. It continues with detailed descriptions of how to install and use VPN technologies that are available for Windows NT and Unix, such as PPTP and L2TP, Altavista Tunnel, Cisco PIX, and the secure shell (SSH). New features in the second edition include SSH, which is a popular VPN solution for Unix systems, and an expanded description of the IPSec standard, for which several vendors have announced support. Topics include: How the VPN compares to other available networking technologies Introduction to encryption, firewalls, the IPSec standard, and other technologies that let VPNs work Point to Point Tunneling Protocol (PPTP) and L2TP The Altavista Tunnel The Cisco PIX Firewall Secure Shell (SSH) Maintenance and troubleshooting
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    Online-Ressource
    Online-Ressource
    Sebastopol : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xx, 483 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Electronic commerce ; Security measures ; Web sites ; Security measures ; World Wide Web ; Security measures ; Electronic books ; local
    Kurzfassung: Attacks on government Web sites, break-ins at Internet service providers, electronic credit card fraud, invasion of personal privacy by merchants as well as hackers--is this what the World Wide Web is really all about? Web Security & Commerce cuts through the hype and the front page stories. It tells you what the real risks are and explains how you can minimize them. Whether you're a casual (but concerned) Web surfer or a system administrator responsible for the security of a critical Web server, this book will tell you what you need to know. Entertaining as well as illuminating, it looks behind the headlines at the technologies, risks, and benefits of the Web. Whatever browser or server you are using, you and your system will benefit from this book. Topics include: User safety--browser vulnerabilities (with an emphasis on Netscape Navigator and Microsoft Internet Explorer), privacy concerns, issues with Java, JavaScript, ActiveX, and plug-ins. Digital certificates--what they are, how they assure identity in a networked environment, how certification authorities and server certificates work, and what code signing all about. Cryptography--an overview of how encryption works on the Internet and how different algorithms and programs are being used today. Web server security--detailed technical information about SSL (Secure Socket Layer), TLS (Transport Layer Security), host security, server access methods, and secure CGI/API programming. Commerce and society--how digital payments work, what blocking software and censorship technology (e.g., PICS and RSACi) is about, and what civil and criminal issues you need to understand.
    Anmerkung: On cover: Risks, technologies, and strategies. - Includes bibliographical references (p. 450-470) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie hier...