SSL VPN : understanding, evaluating, and planning secure, web-based remote access (eBook, 2005) []
skip to content
SSL VPN : understanding, evaluating, and planning secure, web-based remote access Preview this item
ClosePreview this item

SSL VPN : understanding, evaluating, and planning secure, web-based remote access

Author: Joseph Steinberg; Tim Speed; Chris Fernando; Ashutosh Pande
Publisher: Birmingham, U.K. : Packt Pub., ©2005.
Series: From technologies to solutions.
Edition/Format:   eBook : Document : English : 1st edView all editions and formats

(not yet rated) 0 with reviews - Be the first.

More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...


Genre/Form: Electronic books
Additional Physical Format: Print version:
Steinberg, Joseph.
Birmingham : Packt Pub., ©2005
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Joseph Steinberg; Tim Speed; Chris Fernando; Ashutosh Pande
ISBN: 9781847190017 1847190014 1281348252 9781281348258
OCLC Number: 251946836
Description: 1 online resource (viii, 195 pages) : illustrations.
Contents: Cover --
Table of Contents --
Introduction --
Chapter 1: Introduction to SSL VPN --
The Internet --
Reference Models --
OSI Reference Model --
DARPA Model --
Introducing Hacker Bob --
Trapping Your Data --
Keeping Hacker Bob Out of Your Data --
VPNs --
One Computer to the Corporate Network --
Remote Office Network Connected to the Main Office --
VPN Examples --
IPsec --
IPsec Vs. SSL VPN --
Trusted Networks --
The DMZ --
SSL VPN Scenarios --
Summary --
Chapter 2: SSL VPN --
SSL VPN: A Historical Background --
Remote Access: Measuring Return-on-Investment --
So What Does SSL VPN Actually Give Me? --
Summary --
Chapter 3: How SSL VPNs Work --
Appliances Vs. Software --
The SSL Protocol --
Background --
Overview of SSL Technology --
Establishing Secure Tunnels Using SSL --
Secure Tunnels --
OSI Network Model --
Application-Level Communications --
Reverse Proxy Technology --
SSL Remote Access: Reverse Proxy Technology Plus --
Non-Web Traffic over SSL --
Establishing Network Connectivity over SSL --
Why Different Access Technologies for Web Applications --
Applets --
Remote Access to Files and Other Resources --
Internet-Enabling Internal Applications --
Remote Access Interface --
Administration Tools --
Performance --
Access from Older Web Browsers --
SSL VPN Sample Session --
Summary --
Chapter 4: SSL VPN Security --
Authentication and Authorization --
Authentication --
Single Sign On --
Authorization --
End Point Security Concerns --
The Problem: Sensitive Data in Insecure Locations --
The Solution --
The Problem: Third Party Search Tools Running on Access Devices --
The Solution --
Department of Defense (DoD) Requirements --
The Problem: Users May Neglect to Log Out --
The Solution --
The Problem: Viruses Enter Corporate Networks via the SSL VPN --
The Solution --
The Problem: Worms Enter Corporate Networks via the SSL VPN --
The Solution --
Problems of Insecure Locations --
Hackers Bridging to the Corporate Network --
The Problem: Internal Networking Information may be Leaked --
The Solution --
Trusted Endpoint --
Tiers of Access Based on Endpoint Situation --
Server-Side Security Issues --
The Problem: Firewalls and Other Security Technologies may be Undermined --
The Solution --
The Problem: Application-Level Vulnerabilities --
The Solution --
Encryption --
Patching of SSL VPN Servers --
Linux versus Windows --
Some Other SSL VPN Appliance Security Concepts --
Summary --
Chapter 5: Planning for an SSL VPN --
Determining Business Requirements --
Remote Access Paradigms --
Determining User Needs --
Selecting an Appropriate SSL VPN --
Ensuring Proper Level of Access --
Proper User Interface and Experience --
Remote Password Management --
Adherence to Security Standards --
Platform --
Determining which SSL VPN Functions to Use --
Where to Deploy the SSL VPN server --
Back Office --
DMZ --
Outside the Perimeter Firewall --
Air Gap --
Offloaded SSL --
Planning for Deployment --
User and Administrator Training --
Summary --
Chapter 6: Educating the User --
Building an Education Plan --
Education Plan: Start the Process --
Education Plan: Finalize the Plan.
Series Title: From technologies to solutions.
Responsibility: Joseph Steinberg, Timothy Speed ; technical editors, Chris Fernando, Ashutosh Pande.


User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...


Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.