O'Reilly logo

Designing Network Security Second Edition by Merike Kaeo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 3. Applying Security Technologies to Real Networks

The preceding chapter addressed a number of security technologies that exist to secure corporate networks. Because of the wide range of applicability in different types of networks, this chapter shows how you can use these technologies to secure specific scenarios: virtual private networks (VPNs), wireless networks, and Voice over IP (VoIP) networks. Limitations and areas of evolving technology are highlighted, and specific threats and vulnerabilities are addressed in Chapter 5, “Threats in an Enterprise Network.”

Virtual Private Networks (VPNs)

Corporations use VPNs to establish secure, end-to-end private network connections over a public network infrastructure. Many companies have created ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required