Complete Book of Remote Access: Connectivity and Security

Overview

As technology advances, the demand and necessity for seamless connectivity and stable access to servers and networks is increasing exponentially. Unfortunately the few books out there on remote access focus on Cisco certification preparation, one aspect of network connectivity or security. This text covers both-the enabling technology and how to make remote access secure.

The definitive resource for network administrators and IT professionals implementing and maintaining remote ...

See more details below
Hardcover
$134.67
BN.com price
(Save 8%)$146.95 List Price
Other sellers (Hardcover)
  • All (9) from $3.02   
  • New (5) from $93.02   
  • Used (4) from $3.02   
Sending request ...

Overview

As technology advances, the demand and necessity for seamless connectivity and stable access to servers and networks is increasing exponentially. Unfortunately the few books out there on remote access focus on Cisco certification preparation, one aspect of network connectivity or security. This text covers both-the enabling technology and how to make remote access secure.

The definitive resource for network administrators and IT professionals implementing and maintaining remote access systems, The Complete Book of Remote Access: Connectivity and Security provides the technical background needed to confidently select and implement the best remote access technologies for your company's network. It provides basic technical information on remote access network technologies and the functional information on the role that remote access networks play in moving information.

In-depth coverage shows you how to assess remote access needs and identify appropriate solutions for different platforms. The author includes discussions of remote access configuration, security considerations from strong authentication to VPN, troubleshooting, maintenance, and disaster recovery. With coverage on the enabling technologies and how to make remote access secure, The Complete Book of Remote Access is truly the definitive resource for network administrators and IT professionals looking to achieve seamless connectivity and stable remote access to servers and networks.

The definitive resource for network administrators and IT professionals implementing and maintaining remote access systems, Complete Book of Remote Access provides the technical background needed to confidently select and implement the best remote access technologies for any company's network. It provides basic technical information on remote access network technologies, and on the functional information on the role that remote access networks play in moving information. In-depth coverage shows how to assess remote access needs and identify appropriate solutions for different platforms. It includes discussions of remote access configuration, security considerations from strong authentication to VPN, troubleshooting, maintenance, and disaster recovery.

Read More Show Less

Product Details

  • ISBN-13: 9780849312533
  • Publisher: Taylor & Francis
  • Publication date: 12/10/2002
  • Series: Best Practices Series , #24
  • Pages: 392
  • Product dimensions: 6.40 (w) x 9.50 (h) x 1.02 (d)

Table of Contents

INTRODUCTION TO REMOTE ACCESS
Fundamentals of Remote Access
Overview
Benefits of Remote Access
Employee Benefits
Managers and Employers Benefits
Summary

Designing a Remote Access Solution
Defining Requirements
Connectivity Options
Remote Access Methods
Remote Control
Remote Node
Remote Control over Remote Access
Integrated Solution
Internet-Based Remote Access
Protecting Transmitted Data
Protecting Network Resources
Administration Systems
Server Features
Remote Access Policy
Summary

Remote Access Functions
Two Approaches: Remote Node vs. Remote Control
Remote Access Servers

ExtraNets: Borderless Internet/Intranet Networking
Benefits of Borderless Networks
Analyzing Solutions
Major Network Vendor Provides Borderless Solution
The Challenge of the Extranet

Implementing and Supporting Extranets
Extranet Architectures
Summary

Providing Access to External Databases
Defining Data Needs
Selecting External Sources
Information Access Methods
Update Frequency
Database Access Cost
Economizing on Multiple Access Requirements
LAN Access to a Modem Pool
Summary

Remote LAN Access Technology
Remote Access Methods
Remote Node Access
Applications
Field Force Automation
Security Options
Summary

TECHNOLOGY

Communication Servers
Who's Clamoring for Connections?
The Methods of Connecting
Remote Control
Remote Node
Combining Connections
Creating and Enforcing Remote-Access Communication Policies
Administration Costs Can Be Staggering
Adherence to Remote-Access Communication Policy
Summary

Virtual Private Networking
The Benefits of Virtual Private Networking
What are the Implementations of VPNs?
Risk Versus Reward on the Cutting Edge
Pitfalls During Deployment
Part of a Bigger Security Picture
Summary

Overview of Traditional Carrier Virtual Private Networks
The Carrier Based VPN Concept
Making the Business Case for VPNs
Billing Options
Network Management
Access Arrangements
Data Networking over the VPN
Conclusion

VPN Design Approaches
Use of the Internet as a Virtual Network
The Market for VPN

Wireless Technology
Wireless Communications
Wireless Office Services (WOS)
Cellular Digital Packet Data
Wireless Local Area Networks
802.11 Standard
Wireless Internet Access
Wireless Broadband Internet Access
Uses for Wireless Technology
Searching for a Wireless Solution
Summary

Wireless Application Protocol (WAP)
WAP: Technology for M-Commerce
Arguments for WAP
Arguments against WAP

Choosing a Remote Access Strategy
The Remote PC
The Destination
Connection Technologies
Conclusion

SECURITY

An Introduction to Secure Remote Access
Security Goals for Remote Access
Reliable Authentication of Remote Users/Hosts
Remote Access Mechanisms
Virtual Private Networks
Selecting a Remote Access System
Remote Access Policy

Centralized Authentication Services
AAA 101: Key Features of an AAA Service
RADIUS: Remote Authentication Dial-In User Service
TACACS: Terminal Access Controller Access Control System
DIAMETER: Twice RADIUS?

Remote Access Authentication
User and Client Authentication
Defining the Security Process
Making Enterprise-Specific Security Choices
Defining Remote Access: Establishing a Common Vocabulary
Six Components That Secure Remote Access
Conclusion

Security Risks in Telecommuting
Telecommuting in Today's Distributed Enterprise
Who/What Poses Security Risks
Types of Security Risks in Telecommuting
Minimizing Security Risks
Conclusion

Secure External Network Communications
External Connectivity Requirements
The Network Security Architecture
Summary
Who and What Poses Security Risks
Types of Security Risks in Telecommuting
Minimizing Security Risks
Conclusion

Dial-Up Security Controls
Types of Dial-Up Access
Minimizing Risks
Identification
Passwords
A Brief Authentication Requirements Review
The Final Defense
Summary
Top 10 Dial-In Security Mistakes
Top Ten
Top Ten Explained
Summary
Virtual Private Networks Security
Why VPN Security?
Understanding IBM VPN Security
Enterprise Partner/Supplier Network
Branch Office Connection Network
Remote Access Network
Understanding Microsoft VPN Security
Front-End Processors
Advanced VPN Security Features
Summary
VPNs: Secure Remote Access over the Internet
VPN Common Uses
Easy to Manage and Use
Summary

Wireless Internet Security
Who's Using the Wireless Internet?
What Types of Applications Are Available?
How Secure Are the Transmission Methods?
FDMA
TDMA
GSM
CDMA
How Secure Are The Wireless Devices?
How Secure Are the Network Infrastructure Components?
Summary

MANAGEMENT

Telecommuting: Issues for the IS Manager
Societal Benefits of Telecommuting
Why Employees Want to Telecommute
The Benefits of Autonomy
Organizational Benefits of Telecommuting
Preparing the Organization for a Telecommuting Program
Jobs Suitable for Telecommuting
Technology Requirements
Future Needs
Implementing a Telecommuting Program
Telecenters
Managing Telecommuters
Suggestions for Successful Implementation

Evaluating Organizational Readiness for Telecommuting
Benefits of Telecommuting for the Worker
Benefits of Telecommuting for the Company
Drawbacks of Telecommuting
Telecommuting Organizations

Supporting Telework
Obstacles of Virtual Work Arrangements
Removing Obstacles with Technology
Removing Obstacles with Managerial Actions
Conclusion

Assuming Command of Your Network
The Cost of Management
Managing for the Future
The Human Element
Telecommuter Skill Set
Telecommuter Training
Manager Skill Set
Manager Training
Office Technology for the Telecommuter
Settling on a Network Strategy
Functional Requirements
Applications
Summary

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)