Books on the topic 'VPN'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'VPN.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Luo, Wei, ed. Layer 2 VPN architectures. Indianapolis, Ind: Cisco Press, 2005.
Find full textPepelnjak, Ivan. MPLS and VPN architectures. Indianapolis, Ind: Cisco Press, 2002.
Find full textHicks, Richard M. Implementing Always On VPN. Berkeley, CA: Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-7741-6.
Full textIvan, Pepelnjak, ed. MPLS and VPN architecture. Indianapolis, Ind: Cisco Press, 2001.
Find full textGuichard, Jim. MPLS and VPN architectures. Indianapolis, IN: Cisco Press, 2001.
Find full textLipp, Manfred. VPN - Virtuelle Private Netzwerke: Aufbau und Sicherheit. Mu nchen: Addison-Wesley, 2001.
Find full textLipp, Manfred. Virtuelle private Netzwerke: VPN ; Aufbau und Sicherheit. Mu nchen: Addison-Wesley, 2006.
Find full textPeter, Giannoulis, and Hay Keli, eds. Nokia firewall, VPN, and IPSO configuration guide. Burlington, MA: Syngress Pub., 2009.
Find full textHooper, Howard. CCNP security VPN 642-648 offical cert guide. Indianapolis, IN: Cisco Press, 2012.
Find full textCCNP security VPN 642-648 offical cert guide. Indianapolis, IN: Cisco Press, 2013.
Find full textWade, Edwards, ed. CCSP: Secure PIX and secure VPN study guide. San Francisco, Calif: SYBEX, 2004.
Find full textHooper, Howard. CCNP security VPN: 642-647 official cert guide. Indianapolis, IN: Cisco Press, 2012.
Find full textR, Wyler Neil, and Fausset Trent, eds. Juniper(r) Networks secure access SSL VPN configuration guide. Burlington, MA: Syngress, 2007.
Find full textJ, Newcomb Mark, ed. CCSP Cisco Secure VPN exam certification guide: CCSP self-study. Indianapolis, Ind: Cisco Press, 2003.
Find full textFrahim, Jazib. Cisco ASA: All-in-one firewall, IPS, Anti-X, and VPN adaptive security appliance. 2nd ed. Indianapolis, IN: Cisco Press, 2010.
Find full textMohamed, Khalid, and Wainner Scott, eds. IPSec VPN design: The definitive design and deployment guide for secure virtual private networks. Indianapolis, IN: Cisco Press, 2005.
Find full textOmar, Santos, ed. Cisco ASA: All-in-one firewall, IPS, Anti-X, and VPN adaptive security appliance. 2nd ed. Indianapolis, Ind: Cisco Press, 2010.
Find full textFrahim, Jazib. Cisco ASA: All-in-one firewall, IPS, Anti-X, and VPN adaptive security appliance. 2nd ed. Indianapolis, IN: Cisco Press, 2010.
Find full textFrahim, Jazib. Cisco ASA: All-in-one firewall, IPS, Anti-X, and VPN adaptive security appliance. 2nd ed. Indianapolis, IN: Cisco Press, 2010.
Find full textShneyderman, Alex, and Alessio Casati. Mobile VPN. Wiley & Sons, Incorporated, John, 2003.
Find full textHarvey, J. Diy Vpn: Control Your Own VPN Server. Independently Published, 2019.
Find full textBollapragada, Vijay, Scott Wainner, and Mohamed Khalid. IPSec VPN Design. Pearson Education, Limited, 2005.
Find full textMorrow, Monique, and Michael Behringer. MPLS VPN Security. Pearson Education, Limited, 2005.
Find full textBollapragada, Vijay, Scott Wainner, and Mohamed Khalid. IPSec VPN Design. Cisco Press, 2005.
Find full textPepelnjak, Ivan, and Jim Guichard. Architectures MPLS et VPN. CampusPress, 2001.
Find full textMPLS and VPN architectures. Cisco, 2001.
Find full textLewis, Chris, and Steve Pickavance. Selecting MPLS VPN Services. Pearson Education, Limited, 2006.
Find full textPepelnjak, Ivan, and Jim Guichard. MPLS and VPN Architectures. Pearson Education, Limited, 2000.
Find full textLayer 2 VPN Architectures. Brand: Cisco Press, 2005.
Find full textBokotey, Dmitry, Wei Luo, Carlos Pignataro, and Anthony Chan. Layer 2 VPN Architectures. Pearson Education, Limited, 2005.
Find full textLewis, Chris, and Steve Pickavance. Selecting MPLS VPN Services. Pearson Education, Limited, 2006.
Find full textVPN: Virtual Private Network. Novatec, 2002.
Find full textPepelnjak. Arquitecturas Mpls y VPN. Pearson Educacion, 2005.
Find full textMPLS and VPN Architectures. Cisco Press, 2002.
Find full textIsaca. VPN Security Audit Program. Information Systems Audit and Control Association, 2021.
Find full textFirewall Policies and VPN Configurations. Syngress, 2006.
Find full textMPLS VPN Security (Networking Technology). Cisco Press, 2005.
Find full textFirewall Policies and VPN Configurations. Elsevier, 2006. http://dx.doi.org/10.1016/b978-1-59749-088-7.x5000-2.
Full textSyngress, Abhishek Singh, Stephanie Miller, Mark Lucas, and Dale Liu. Firewall Policies and VPN Configurations. Elsevier Science & Technology Books, 2006.
Find full textDeal, Richard. Complete Cisco VPN Configuration Guide. Pearson Education, Limited, 2005.
Find full textIsaca. Spanish VPN Security Audit Program. Information Systems Audit and Control Association, 2022.
Find full textMaze, James. Netscreen Security Essentials: Firewall and VPN. Pearson Education, Limited, 2006.
Find full textMackie, Neil. VPN-1/Firewall-1 CCSA/CCSE. CoreFacts Ltd, 2002.
Find full textCisco Security and VPN Solutions Folio. Cisco Press, 2002.
Find full textMPLS and VPN Architectures, Vol. 2. Cisco Press, 2003.
Find full textPepelnjak, Ivan, Jim Guichard, and Jeff Apcar. MPLS and VPN Architectures, Volume II. Cisco Press, 2003.
Find full textPepelnjak, Ivan, and Jim Guichard. MPLS and VPN Architectures, Vol. 1. Cisco Press, 2000.
Find full textSelecting MPLS VPN Services (Networking Technology). Cisco Press, 2006.
Find full textPepelnjak, Ivan, Jim Guichard, and Jeff Apcar. MPLS and VPN Architectures, Volume II. Pearson Education, Limited, 2003.
Find full textButer, Noppadol Suksri. Managing Certificates for Use with VPN. Independently Published, 2021.
Find full text