책 이미지

책 정보
· 분류 : 외국도서 > 컴퓨터 > 컴퓨터 일반
· ISBN : 9780849312533
· 쪽수 : 392쪽
· 출판일 : 2002-12-10
목차
INTRODUCTION TO REMOTE ACCESSFundamentals of Remote AccessOverviewBenefits of Remote AccessEmployee BenefitsManagers and Employers BenefitsSummaryDesigning a Remote Access SolutionDefining RequirementsConnectivity OptionsRemote Access MethodsRemote ControlRemote NodeRemote Control over Remote AccessIntegrated SolutionInternet-Based Remote AccessProtecting Transmitted DataProtecting Network ResourcesAdministration SystemsServer FeaturesRemote Access PolicySummaryRemote Access FunctionsTwo Approaches: Remote Node vs. Remote ControlRemote Access Servers ExtraNets: Borderless Internet/Intranet NetworkingBenefits of Borderless NetworksAnalyzing SolutionsMajor Network Vendor Provides Borderless SolutionThe Challenge of the ExtranetImplementing and Supporting ExtranetsExtranet ArchitecturesSummaryProviding Access to External DatabasesDefining Data NeedsSelecting External SourcesInformation Access MethodsUpdate FrequencyDatabase Access CostEconomizing on Multiple Access RequirementsLAN Access to a Modem PoolSummaryRemote LAN Access TechnologyRemote Access MethodsRemote Node AccessApplicationsField Force AutomationSecurity OptionsSummaryTECHNOLOGY Communication ServersWho's Clamoring for Connections?The Methods of ConnectingRemote ControlRemote NodeCombining ConnectionsCreating and Enforcing Remote-Access Communication PoliciesAdministration Costs Can Be StaggeringAdherence to Remote-Access Communication PolicySummaryVirtual Private NetworkingThe Benefits of Virtual Private NetworkingWhat are the Implementations of VPNs?Risk Versus Reward on the Cutting EdgePitfalls During DeploymentPart of a Bigger Security PictureSummaryOverview of Traditional Carrier Virtual Private NetworksThe Carrier Based VPN ConceptMaking the Business Case for VPNsBilling OptionsNetwork ManagementAccess ArrangementsData Networking over the VPNConclusionVPN Design ApproachesUse of the Internet as a Virtual NetworkThe Market for VPNWireless TechnologyWireless CommunicationsWireless Office Services (WOS)Cellular Digital Packet DataWireless Local Area Networks802.11 StandardWireless Internet AccessWireless Broadband Internet AccessUses for Wireless TechnologySearching for a Wireless SolutionSummaryWireless Application Protocol (WAP)WAP: Technology for M-CommerceArguments for WAPArguments against WAPChoosing a Remote Access StrategyThe Remote PCThe DestinationConnection TechnologiesConclusionSECURITYAn Introduction to Secure Remote AccessSecurity Goals for Remote AccessReliable Authentication of Remote Users/HostsRemote Access MechanismsVirtual Private NetworksSelecting a Remote Access SystemRemote Access PolicyCentralized Authentication ServicesAAA 101: Key Features of an AAA ServiceRADIUS: Remote Authentication Dial-In User ServiceTACACS: Terminal Access Controller Access Control SystemDIAMETER: Twice RADIUS?Remote Access AuthenticationUser and Client AuthenticationDefining the Security ProcessMaking Enterprise-Specific Security ChoicesDefining Remote Access: Establishing a Common VocabularySix Components That Secure Remote AccessConclusion Security Risks in TelecommutingTelecommuting in Today's Distributed EnterpriseWho/What Poses Security RisksTypes of Security Risks in TelecommutingMinimizing Security RisksConclusionSecure External Network CommunicationsExternal Connectivity RequirementsThe Network Security ArchitectureSummaryWho and What Poses Security RisksTypes of Security Risks in TelecommutingMinimizing Security RisksConclusionDial-Up Security ControlsTypes of Dial-Up AccessMinimizing RisksIdentificationPasswordsA Brief Authentication Requirements ReviewThe Final DefenseSummaryTop 10 Dial-In Security MistakesTop TenTop Ten ExplainedSummaryVirtual Private Networks SecurityWhy VPN Security?Understanding IBM VPN SecurityEnterprise Partner/Supplier NetworkBranch Office Connection NetworkRemote Access NetworkUnderstanding Microsoft VPN SecurityFront-End ProcessorsAdvanced VPN Security FeaturesSummaryVPNs: Secure Remote Access over the InternetVPN Common UsesEasy to Manage and UseSummaryWireless Internet SecurityWho's Using the Wireless Internet?What Types of Applications Are Available?How Secure Are the Transmission Methods?FDMATDMAGSMCDMAHow Secure Are The Wireless Devices?How Secure Are the Network Infrastructure Components?SummaryMANAGEMENT Telecommuting: Issues for the IS ManagerSocietal Benefits of TelecommutingWhy Employees Want to TelecommuteThe Benefits of AutonomyOrganizational Benefits of TelecommutingPreparing the Organization for a Telecommuting ProgramJobs Suitable for TelecommutingTechnology RequirementsFuture NeedsImplementing a Telecommuting ProgramTelecentersManaging TelecommutersSuggestions for Successful ImplementationEvaluating Organizational Readiness for TelecommutingBenefits of Telecommuting for the WorkerBenefits of Telecommuting for the CompanyDrawbacks of Telecommuting Telecommuting OrganizationsSupporting TeleworkObstacles of Virtual Work ArrangementsRemoving Obstacles with TechnologyRemoving Obstacles with Managerial ActionsConclusionAssuming Command of Your NetworkThe Cost of ManagementManaging for the FutureThe Human ElementTelecommuter Skill SetTelecommuter TrainingManager Skill SetManager TrainingOffice Technology for the TelecommuterSettling on a Network StrategyFunctional RequirementsApplicationsSummary