104,93 €
116,59 €
-10% with code: EXTRA
Implementing Cisco VPNs
Implementing Cisco VPNs
104,93
116,59 €
  • We will send in 10–14 business days.
VPNs (Virtual Private Networks) allow for secure communications over publicly shared infrastructure, such as the Internet. This is a guide to implementing Cisco private networks, as well as providing an overview of VPNs. The guide contains blueprints that show the reader how the technology fits into the network architecture. Each chapter provides a technical overview of the technology, the commands and hardware required to implement the technology and a case study.
116.59
  • Publisher:
  • ISBN-10: 0072130482
  • ISBN-13: 9780072130485
  • Format: 19.1 x 23.5 x 3.2 cm, minkšti viršeliai
  • Language: English
  • SAVE -10% with code: EXTRA

Implementing Cisco VPNs (e-book) (used book) | bookbook.eu

Reviews

(2.67 Goodreads rating)

Description

VPNs (Virtual Private Networks) allow for secure communications over publicly shared infrastructure, such as the Internet. This is a guide to implementing Cisco private networks, as well as providing an overview of VPNs. The guide contains blueprints that show the reader how the technology fits into the network architecture. Each chapter provides a technical overview of the technology, the commands and hardware required to implement the technology and a case study.

EXTRA 10 % discount with code: EXTRA

104,93
116,59 €
We will send in 10–14 business days.

The promotion ends in 21d.20:57:02

The discount code is valid when purchasing from 10 €. Discounts do not stack.

Log in and for this item
you will receive 1,17 Book Euros!?
  • Publisher:
  • ISBN-10: 0072130482
  • ISBN-13: 9780072130485
  • Format: 19.1 x 23.5 x 3.2 cm, minkšti viršeliai
  • Language: English English

VPNs (Virtual Private Networks) allow for secure communications over publicly shared infrastructure, such as the Internet. This is a guide to implementing Cisco private networks, as well as providing an overview of VPNs. The guide contains blueprints that show the reader how the technology fits into the network architecture. Each chapter provides a technical overview of the technology, the commands and hardware required to implement the technology and a case study.

Reviews

  • No reviews
0 customers have rated this item.
5
0%
4
0%
3
0%
2
0%
1
0%
(will not be displayed)