Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Virtual Private Networks: Technologies and Solutions

Virtual Private Networks: Technologies and Solutions

List Price: $44.95
Your Price: $39.63
Product Info Reviews

<< 1 >>

Rating: 4 stars
Summary: Not "Virtual Private Networks Illustrated," but still useful
Review: I am a senior engineer for network security operations who uses a VPN every day. I read "Virtual Private Networks: Technologies and Solutions" (VPN:TS) to gain a better understanding of this key component of modern networking. While VPN:TS is not the VPN equivalent of Rich Stevens' "TCP/IP Illustrated," it's the best general-purpose VPN book I've read.

Thanks to the book's logical arrangement, precise wording, and short length (281 pages of text), VPN:TS is a fast read. (I finished it in a little more than one day.) It offers clear diagrams of various architectures and protocol headers. VPN:TS is technology neutral, preferring to describe principles and protocols instead of products. Consequently, those looking for a how-to manual for configuring Cisco router or Checkpoint Firewall-based VPNs should look elsewhere. I welcomed this approach, since I have no need for information on popular VPN implementations!

VPN:TS struck me as more than a book about virtual private networks. Because little time was spent elaborating product configurations, the authors discussed related networking topics. These included chapters on cryptography, authentication, PKI, access control, and network management. VPN:TS also describes the relationship between Multiprotocol Label Switching (MPLS) and Quality of Service (QoS). Readers familiar with all of these topics might not appreciate this material, but I enjoyed it.

I was disappointed that VPN:TS did not offer any traces to demonstrate various protocols in action. I believe the authors should have demonstrated building a sample VPN solution, complete with example configuration files and installation steps. An open source project like Linux FreeS/WAN or BSD KAME would have been ideal. This demonstration would have allowed discussions of troubleshooting common client/server obstacles.

VPN:TS is not the sort of reference book to place next to your router, firewall, or laptop. It's best suited to learning general VPN design and deployment. Those seeking technical implementation details will have to look elsewhere. Those who want to learn the role of VPNs in the wider networking realm will appreciate VPN:TS.

(Disclaimer: I received a free review copy from the publisher.)

Rating: 4 stars
Summary: Not "Virtual Private Networks Illustrated," but still useful
Review: I am a senior engineer for network security operations who uses a VPN every day. I read "Virtual Private Networks: Technologies and Solutions" (VPN:TS) to gain a better understanding of this key component of modern networking. While VPN:TS is not the VPN equivalent of Rich Stevens' "TCP/IP Illustrated," it's the best general-purpose VPN book I've read.

Thanks to the book's logical arrangement, precise wording, and short length (281 pages of text), VPN:TS is a fast read. (I finished it in a little more than one day.) It offers clear diagrams of various architectures and protocol headers. VPN:TS is technology neutral, preferring to describe principles and protocols instead of products. Consequently, those looking for a how-to manual for configuring Cisco router or Checkpoint Firewall-based VPNs should look elsewhere. I welcomed this approach, since I have no need for information on popular VPN implementations!

VPN:TS struck me as more than a book about virtual private networks. Because little time was spent elaborating product configurations, the authors discussed related networking topics. These included chapters on cryptography, authentication, PKI, access control, and network management. VPN:TS also describes the relationship between Multiprotocol Label Switching (MPLS) and Quality of Service (QoS). Readers familiar with all of these topics might not appreciate this material, but I enjoyed it.

I was disappointed that VPN:TS did not offer any traces to demonstrate various protocols in action. I believe the authors should have demonstrated building a sample VPN solution, complete with example configuration files and installation steps. An open source project like Linux FreeS/WAN or BSD KAME would have been ideal. This demonstration would have allowed discussions of troubleshooting common client/server obstacles.

VPN:TS is not the sort of reference book to place next to your router, firewall, or laptop. It's best suited to learning general VPN design and deployment. Those seeking technical implementation details will have to look elsewhere. Those who want to learn the role of VPNs in the wider networking realm will appreciate VPN:TS.

(Disclaimer: I received a free review copy from the publisher.)

Rating: 4 stars
Summary: Not "Virtual Private Networks Illustrated," but still useful
Review: I am a senior engineer for network security operations who uses a VPN every day. I read "Virtual Private Networks: Technologies and Solutions" (VPN:TS) to gain a better understanding of this key component of modern networking. While VPN:TS is not the VPN equivalent of Rich Stevens' "TCP/IP Illustrated," it's the best general-purpose VPN book I've read.

Thanks to the book's logical arrangement, precise wording, and short length (281 pages of text), VPN:TS is a fast read. (I finished it in a little more than one day.) It offers clear diagrams of various architectures and protocol headers. VPN:TS is technology neutral, preferring to describe principles and protocols instead of products. Consequently, those looking for a how-to manual for configuring Cisco router or Checkpoint Firewall-based VPNs should look elsewhere. I welcomed this approach, since I have no need for information on popular VPN implementations!

VPN:TS struck me as more than a book about virtual private networks. Because little time was spent elaborating product configurations, the authors discussed related networking topics. These included chapters on cryptography, authentication, PKI, access control, and network management. VPN:TS also describes the relationship between Multiprotocol Label Switching (MPLS) and Quality of Service (QoS). Readers familiar with all of these topics might not appreciate this material, but I enjoyed it.

I was disappointed that VPN:TS did not offer any traces to demonstrate various protocols in action. I believe the authors should have demonstrated building a sample VPN solution, complete with example configuration files and installation steps. An open source project like Linux FreeS/WAN or BSD KAME would have been ideal. This demonstration would have allowed discussions of troubleshooting common client/server obstacles.

VPN:TS is not the sort of reference book to place next to your router, firewall, or laptop. It's best suited to learning general VPN design and deployment. Those seeking technical implementation details will have to look elsewhere. Those who want to learn the role of VPNs in the wider networking realm will appreciate VPN:TS.

(Disclaimer: I received a free review copy from the publisher.)

Rating: 5 stars
Summary: clearly written
Review: The strength of this book is its clarity, which is achieved through topic selection, proper organization of topics, and different explanation of key concepts according to context. Coverage is wide. Meant for those who know networking and either want to learn about or implement VPNs. Btw the book is in English.

Rating: 5 stars
Summary: Excellent VPN reference...
Review: This book gets my nod as one of the best VPN books currently available. Most of the early VPN books have been awful, written totally from the business perspective -- i.e., why I need a VPN, or why VPNs are good. These author have apparently actually built some VPNs and write for someone who actually needs to build a VPN. Here, a reader can acquire an understanding and appreciation of such issues as products; protocols; the relationship between VPN tunnels, IPsec, and NAT; the relationship between the VPN server and firewall; etc., etc. I give this book my highest recommendation -- namely, I would spend my own money on this book!

Rating: 5 stars
Summary: Clearly written book on underlying technologies for VPNs
Review: This book is a great starting point for understanding the business reasons for implementing VPNs and the underlying technology. Although the book gets moderately technical it is written in such a manner that it can be understood by business process owners who have exposure to technology, as well as IT professionals who need to understand the network and security aspects of virtual private networks.

The focus of the book is the underlying technologies more than VPN solutions, and the emphasis is on VPN security infrastructure and services. Part I covers what VPNs are, how they can be employed as solutions to business requirements, and a basic overview of the concepts and technologies. I like the clear way the authors present this material, and the fact that it is completely accessible to non-technical readers.

Part II delves deeper into each facet of the underlying technology, covering the major topics: tunneling, IPsec, authentication, PKI, and access control. This part of the book will quickly get a network specialist up-to-speed on security services provided by VPNs, and goes deep enough to give a clear understanding of the security infrastructure in language that a network specialist will be comfortable with. It is also an excellent resource for system architects who need to see the big picture and fully understand how this technology set fits into an coherent architecture. It is especially valuable to architects and IS/IT professionals from other technical domains who are working in the health care industry because the infrastructure and services discussed are directly applicable to HIPAA requirements.

VPN solutions discussed in Part III is a wide survey of the components needed to implement a VPN. The chapter on VPN clients is must reading for anyone who is designing or implementing a VPN solution, as is the chapter on network and service management. Both of these chapters address issues that I have not come across in other books. For example, some of the issues with MS Windows VPN clients are potential "gotchas" that you need to be aware of in order to implement a completely secure (and supportable) VPN.

Overall: this book provides a high-level view with enough technical detail to give you a good understanding of the capabilities and limitations of virtual private networks. The writing is clear and readable, and the book is amply illustrated. Moreover, both authors work for BBN, which has been a key force in the evolution of the Internet for over 30 years the book has an air of authority and credibility that is rare in other books of this genre. I give it five stars for explaining a complex technology and for never losing sight of the business reasons for a VPN.

Rating: 5 stars
Summary: Clearly written book on underlying technologies for VPNs
Review: This book is a great starting point for understanding the business reasons for implementing VPNs and the underlying technology. Although the book gets moderately technical it is written in such a manner that it can be understood by business process owners who have exposure to technology, as well as IT professionals who need to understand the network and security aspects of virtual private networks.

The focus of the book is the underlying technologies more than VPN solutions, and the emphasis is on VPN security infrastructure and services. Part I covers what VPNs are, how they can be employed as solutions to business requirements, and a basic overview of the concepts and technologies. I like the clear way the authors present this material, and the fact that it is completely accessible to non-technical readers.

Part II delves deeper into each facet of the underlying technology, covering the major topics: tunneling, IPsec, authentication, PKI, and access control. This part of the book will quickly get a network specialist up-to-speed on security services provided by VPNs, and goes deep enough to give a clear understanding of the security infrastructure in language that a network specialist will be comfortable with. It is also an excellent resource for system architects who need to see the big picture and fully understand how this technology set fits into an coherent architecture. It is especially valuable to architects and IS/IT professionals from other technical domains who are working in the health care industry because the infrastructure and services discussed are directly applicable to HIPAA requirements.

VPN solutions discussed in Part III is a wide survey of the components needed to implement a VPN. The chapter on VPN clients is must reading for anyone who is designing or implementing a VPN solution, as is the chapter on network and service management. Both of these chapters address issues that I have not come across in other books. For example, some of the issues with MS Windows VPN clients are potential "gotchas" that you need to be aware of in order to implement a completely secure (and supportable) VPN.

Overall: this book provides a high-level view with enough technical detail to give you a good understanding of the capabilities and limitations of virtual private networks. The writing is clear and readable, and the book is amply illustrated. Moreover, both authors work for BBN, which has been a key force in the evolution of the Internet for over 30 years the book has an air of authority and credibility that is rare in other books of this genre. I give it five stars for explaining a complex technology and for never losing sight of the business reasons for a VPN.


<< 1 >>

© 2004, ReviewFocus or its affiliates