Complete Book of Remote Access: Connectivity and Security

As technology advances, the demand and necessity for seamless connectivity and stable access to servers and networks is increasing exponentially. Unfortunately the few books out there on remote access focus on Cisco certification preparation, one aspect of network connectivity or security. This text...

Mô tả đầy đủ

Đã lưu trong:
Chi tiết về thư mục
Tác giả chính: Kasacavage, Victor
Định dạng: Sách
Ngôn ngữ:English
Được phát hành: CRC Press 2009
Truy cập trực tuyến:http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1562
Các nhãn: Thêm thẻ
Không có thẻ, Là người đầu tiên thẻ bản ghi này!
Thư viện lưu trữ: Thư viện Trường Đại học Đà Lạt
id oai:scholar.dlu.edu.vn:DLU123456789-1562
record_format dspace
institution Thư viện Trường Đại học Đà Lạt
collection Thư viện số
language English
description As technology advances, the demand and necessity for seamless connectivity and stable access to servers and networks is increasing exponentially. Unfortunately the few books out there on remote access focus on Cisco certification preparation, one aspect of network connectivity or security. This text covers both-the enabling technology and how to make remote access secure. The definitive resource for network administrators and IT professionals implementing and maintaining remote access systems, The Complete Book of Remote Access: Connectivity and Security provides the technical background needed to confidently select and implement the best remote access technologies for your company's network. It provides basic technical information on remote access network technologies and the functional information on the role that remote access networks play in moving information. In-depth coverage shows you how to assess remote access needs and identify appropriate solutions for different platforms. The author includes discussions of remote access configuration, security considerations from strong authentication to VPN, troubleshooting, maintenance, and disaster recovery. With coverage on the enabling technologies and how to make remote access secure, The Complete Book of Remote Access is truly the definitive resource for network administrators and IT professionals looking to achieve seamless connectivity and stable remote access to servers and networks.
format Book
author Kasacavage, Victor
spellingShingle Kasacavage, Victor
Complete Book of Remote Access: Connectivity and Security
author_facet Kasacavage, Victor
author_sort Kasacavage, Victor
title Complete Book of Remote Access: Connectivity and Security
title_short Complete Book of Remote Access: Connectivity and Security
title_full Complete Book of Remote Access: Connectivity and Security
title_fullStr Complete Book of Remote Access: Connectivity and Security
title_full_unstemmed Complete Book of Remote Access: Connectivity and Security
title_sort complete book of remote access: connectivity and security
publisher CRC Press
publishDate 2009
url http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1562
_version_ 1757665891946856448
spelling oai:scholar.dlu.edu.vn:DLU123456789-15622009-12-04T01:50:18Z Complete Book of Remote Access: Connectivity and Security Kasacavage, Victor As technology advances, the demand and necessity for seamless connectivity and stable access to servers and networks is increasing exponentially. Unfortunately the few books out there on remote access focus on Cisco certification preparation, one aspect of network connectivity or security. This text covers both-the enabling technology and how to make remote access secure. The definitive resource for network administrators and IT professionals implementing and maintaining remote access systems, The Complete Book of Remote Access: Connectivity and Security provides the technical background needed to confidently select and implement the best remote access technologies for your company's network. It provides basic technical information on remote access network technologies and the functional information on the role that remote access networks play in moving information. In-depth coverage shows you how to assess remote access needs and identify appropriate solutions for different platforms. The author includes discussions of remote access configuration, security considerations from strong authentication to VPN, troubleshooting, maintenance, and disaster recovery. With coverage on the enabling technologies and how to make remote access secure, The Complete Book of Remote Access is truly the definitive resource for network administrators and IT professionals looking to achieve seamless connectivity and stable remote access to servers and networks. INTRODUCTION TO REMOTE ACCESS Fundamentals of Remote Access Overview Benefits of Remote Access Employee Benefits Managers and Employers Benefits Summary Designing a Remote Access Solution Defining Requirements Connectivity Options Remote Access Methods Remote Control Remote Node Remote Control over Remote Access Integrated Solution Internet-Based Remote Access Protecting Transmitted Data Protecting Network Resources Administration Systems Server Features Remote Access Policy Summary Remote Access Functions Two Approaches: Remote Node vs. Remote Control Remote Access Servers ExtraNets: Borderless Internet/Intranet Networking Benefits of Borderless Networks Analyzing Solutions Major Network Vendor Provides Borderless Solution The Challenge of the Extranet Implementing and Supporting Extranets Extranet Architectures Summary Providing Access to External Databases Defining Data Needs Selecting External Sources Information Access Methods Update Frequency Database Access Cost Economizing on Multiple Access Requirements LAN Access to a Modem Pool Summary Remote LAN Access Technology Remote Access Methods Remote Node Access Applications Field Force Automation Security Options Summary TECHNOLOGY Communication Servers Who's Clamoring for Connections? The Methods of Connecting Remote Control Remote Node Combining Connections Creating and Enforcing Remote-Access Communication Policies Administration Costs Can Be Staggering Adherence to Remote-Access Communication Policy Summary Virtual Private Networking The Benefits of Virtual Private Networking What are the Implementations of VPNs? Risk Versus Reward on the Cutting Edge Pitfalls During Deployment Part of a Bigger Security Picture Summary Overview of Traditional Carrier Virtual Private Networks The Carrier Based VPN Concept Making the Business Case for VPNs Billing Options Network Management Access Arrangements Data Networking over the VPN Conclusion VPN Design Approaches Use of the Internet as a Virtual Network The Market for VPN Wireless Technology Wireless Communications Wireless Office Services (WOS) Cellular Digital Packet Data Wireless Local Area Networks 802.11 Standard Wireless Internet Access Wireless Broadband Internet Access Uses for Wireless Technology Searching for a Wireless Solution Summary Wireless Application Protocol (WAP) WAP: Technology for M-Commerce Arguments for WAP Arguments against WAP Choosing a Remote Access Strategy The Remote PC The Destination Connection Technologies Conclusion SECURITY An Introduction to Secure Remote Access Security Goals for Remote Access Reliable Authentication of Remote Users/Hosts Remote Access Mechanisms Virtual Private Networks Selecting a Remote Access System Remote Access Policy Centralized Authentication Services AAA 101: Key Features of an AAA Service RADIUS: Remote Authentication Dial-In User Service TACACS: Terminal Access Controller Access Control System DIAMETER: Twice RADIUS? Remote Access Authentication User and Client Authentication Defining the Security Process Making Enterprise-Specific Security Choices Defining Remote Access: Establishing a Common Vocabulary Six Components That Secure Remote Access Conclusion Security Risks in Telecommuting Telecommuting in Today's Distributed Enterprise Who/What Poses Security Risks Types of Security Risks in Telecommuting Minimizing Security Risks Conclusion Secure External Network Communications External Connectivity Requirements The Network Security Architecture Summary Who and What Poses Security Risks Types of Security Risks in Telecommuting Minimizing Security Risks Conclusion Dial-Up Security Controls Types of Dial-Up Access Minimizing Risks Identification Passwords A Brief Authentication Requirements Review The Final Defense Summary Top 10 Dial-In Security Mistakes Top Ten Top Ten Explained Summary Virtual Private Networks Security Why VPN Security? Understanding IBM VPN Security Enterprise Partner/Supplier Network Branch Office Connection Network Remote Access Network Understanding Microsoft VPN Security Front-End Processors Advanced VPN Security Features Summary VPNs: Secure Remote Access over the Internet VPN Common Uses Easy to Manage and Use Summary Wireless Internet Security Who's Using the Wireless Internet? What Types of Applications Are Available? How Secure Are the Transmission Methods? FDMA TDMA GSM CDMA How Secure Are The Wireless Devices? How Secure Are the Network Infrastructure Components? Summary MANAGEMENT Telecommuting: Issues for the IS Manager Societal Benefits of Telecommuting Why Employees Want to Telecommute The Benefits of Autonomy Organizational Benefits of Telecommuting Preparing the Organization for a Telecommuting Program Jobs Suitable for Telecommuting Technology Requirements Future Needs Implementing a Telecommuting Program Telecenters Managing Telecommuters Suggestions for Successful Implementation Evaluating Organizational Readiness for Telecommuting Benefits of Telecommuting for the Worker Benefits of Telecommuting for the Company Drawbacks of Telecommuting Telecommuting Organizations Supporting Telework Obstacles of Virtual Work Arrangements Removing Obstacles with Technology Removing Obstacles with Managerial Actions Conclusion Assuming Command of Your Network The Cost of Management Managing for the Future The Human Element Telecommuter Skill Set Telecommuter Training Manager Skill Set Manager Training Office Technology for the Telecommuter Settling on a Network Strategy Functional Requirements Applications Summary 2009-12-04T01:50:18Z 2009-12-04T01:50:18Z 2002 Book http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1562 en application/rar CRC Press