Packt Publishing SSL VPN : Understanding, evaluating and planning secure, web-based remote a
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Introduction to Linux - A Hands on Guide
This guide was created as an overview of the Linux Operating System, geared toward new users as an exploration tour and getting started guide, with exercises at the end of each chapter.
For more advanced trainees it can be a desktop reference, and a collection of the base knowledge needed to proceed with system and network administration. This book contains many real life examples derived from the author's experience as a Linux system and network administrator, trainer and consultant. They hope these examples will help you to get a better understanding of the Linux system and that you feel encouraged to try out things on your own.
Click Here to receive this Complete Guide absolutely free.
SSL VPN : Understanding, evaluating and planning secure, web-based remote a
Date of last review
100% of reviewers
A comprehensive overview of SSL VPN technologies and design strategies to :
1. Understand how SSL VPN technology works
2. Evaluate how SSL VPN could fit into your organisation's security strategy
3. Practical advice on educating users, integrating legacy systems, and eliminating security loopholes
Would you recommend the product? yes | Price you paid?: None indicated | Rating: 8
Exhaustive and thorough
Some portions could be omitted
The book starts with a nice introduction of SSL VPN and explain the topics of OSI as well as DARPA models. It shows the diffrences between IPsec and SSL VPN in details and how the hubs and the private networks function.
In the second chapter it gives an overview how the SSL VPN works in a business model and why should organizations go for it. Then it goes deep into the working of the technology. It explains the SSL protocol and the reverse proxy technology.It describes the SSL remote access in a very thorough and exhaustive manner.
It then unravels the authentication and authorization , endpoint and serverside security ; how to go about embracing the technology based on the business requirement of an organization. It also educate the user thoroughly.The book ends with a brief overview on the future of SSL VPN technology.
The book would be particularly useful for organizations who are going for networking and IT professionals.
There wasn't a need to elaborate so much on DoD requirements in the fourth chapter.It slowed down the pace of the book a bit.