34 Best VPN Books of All Time

We've researched and ranked the best vpn books in the world, based on recommendations from world experts, sales data, and millions of reader ratings. Learn more

2
The official study guide for the AWS certification specialty exam

The AWS Certified Advanced Networking Official Study Guide - Specialty Exam helps to ensure your preparation for the AWS Certified Advanced Networking - Specialty Exam. Expert review of AWS fundamentals align with the exam objectives, and detailed explanations of key exam topics merge with real-world scenarios to help you build the robust knowledge base you need to succeed on the exam--and in the field as an AWS Certified Networking specialist. Coverage includes the design, implementation, and...
more

See more recommendations for this book...

3
Perimeter defenses guarding your network aren't as secure as you might think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. This practical book introduces you to the zero trust model, a method that treats all hosts as if they're internet-facing, and considers the entire network to be compromised and hostile.

Authors Evan Gilman and Doug Barth show you how zero trust lets you focus on building strong authentication, authorization, and encryption throughout, while providing...
more

See more recommendations for this book...

4
Kevin Mitnick, the world's most famous hacker, teaches you easy cloaking and counter-measures for citizens and consumers in the age of Big Brother and Big Data.

Like it or not, your every move is being watched and analyzed. Consumer's identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand.

In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge--and he...
more

See more recommendations for this book...

5
This is Cisco's official, comprehensive self-study resource for Cisco's SVPN 300-730 exam (Implementing Secure Solutions with Virtual Private Networks), one of the most popular concentration exams required for the Cisco Certified Network Professional (CCNP) Security certification. It will thoroughly prepare network professionals to deliver secure solutions based on Cisco VPN technologies.
Designed for all CCNP Security candidates, CCNP Security Virtual Private Networks SVPN 300-730 Official Cert Guide covers every SVPN #300-730 objective concisely and logically, with...
more

See more recommendations for this book...

9
This book covers the CCIE v5 topics for tunnelling, DMVPN (Dynamic Multipoint VPN), VPNs, and NAT. It will show you how to create a network from the beginning, starting with basic GRE tunnels, and working up towards a phase 3 DMVPN solution for both IPv4 and IPv6 traffic. Using EIGRP, OSPF, and BGP, you will create a scalable, secure network, implementing Quality of Service along the way. This volume also covers IPv6 transition mechanisms, such as 6over4, 6to4, 6RD and ISTAP, and IPv6 for NAT. less

See more recommendations for this book...

10
Become an expert in Cisco VPN technologies with this practical and comprehensive configuration guide. Learn how to configure IPSEC VPNs (site-to-site, hub-and-spoke, remote access), SSL VPN, DMVPN, GRE, VTI etc.

This book is packed with step-by-step configuration tutorials and real world scenarios to implement VPNs on Cisco ASA Firewalls (v8.4 and above and v9.x) and on Cisco Routers. It is filled with raw practical concepts, around 40 network diagrams to explain the scenarios, troubleshooting instructions, 20 complete configurations on actual devices and much more. Both beginners...
more

See more recommendations for this book...

Don't have time to read the top VPN books of all time? Read Shortform summaries.

Shortform summaries help you learn 10x faster by:

  • Being comprehensive: you learn the most important points in the book
  • Cutting out the fluff: you focus your time on what's important to know
  • Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
11
This second edition of the Inside Network Perimeter Security provides practical and comprehensive coverage of designing, deploying, and maintaining network defenses. It discusses perimeter security components, such as firewalls, VPNs, and routers, as well as intrusion detection and prevention systems - and explains how to integrate them into a unified whole to secure real-world networks. Because this book was developed in close coordination with the SANS Institute, it is a valuable supplementary resource for those pursuing the GIAC Certified Firewall Analyst (GCFW) certification. less

See more recommendations for this book...

12

MPLS Fundamentals

A comprehensive introduction to all facets of MPLS theory and practice
Helps networking professionals choose the suitable MPLS application and design for their network
Provides MPLS theory and relates to basic IOS configuration examples
The Fundamentals Series from Cisco Press launches the basis to readers for understanding the purpose, application, and management of technologies MPLS has emerged as the new networking layer for service providers throughout the world. For many service providers and enterprises MPLS is a way of delivering new applications on their IP networks,...
more

See more recommendations for this book...

13

Mpls and VPN Architectures, Volume II (Paperback)

Master the latest MPLS VPN solutions to design, deploy, and troubleshoot advanced or large-scale networks

With MPLS and VPN Architectures, Volume II, you'll learn: How to integrate various remote access technologies into the backbone providing VPN service to many different types of customersThe new PE-CE routing options as well as other advanced features, including per-VPN Network Address Translation (PE-NAT)How VRFs can be extended into a customer site to provide separation inside the customer networkThe latest MPLS VPN security features and designs aimed at protecting the MPLS...
more

See more recommendations for this book...

14

Network Security Assessment

How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-based networks-the same penetration testing model they use to secure government, military, and commercial networks. With this book, you can adopt, refine, and reuse this testing model to design and deploy networks that are hardened and immune from attack.

Network Security Assessment demonstrates how a determined attacker scours Internet-based networks in...
more

See more recommendations for this book...

15

Guide to Firewalls & VPNs

Firewalls are among the best-known network security tools in use today, and their critical role in information security continues to grow. However, firewalls are most effective when backed by thoughtful security planning, well-designed security policies, and integrated support from anti-virus software, intrusion detection systems, and related tools. GUIDE TO FIREWALLS AND VPNs, THIRD EDITION explores firewalls in the context of these critical elements, providing an in-depth guide that focuses on both managerial and technical aspects of security. Coverage includes packet filtering,... more

See more recommendations for this book...

19

OpenVPN Cookbook

OpenVPN provides an extensible VPN framework that has been designed to ease site-specific customization, such as providing the capability to distribute a customized installation package to clients, and supporting alternative authentication methods via OpenVPN’s plugin module interface.

This book provides you with many different recipes to help you set up, monitor, and troubleshoot an OpenVPN network. You will learn to configure a scalable, load-balanced VPN server farm that can handle thousands of dynamic connections from incoming VPN clients. You will also get to grips with the...
more

See more recommendations for this book...

20
For organizations of all sizes, the Cisco ASA product family offers powerful new tools for maximizing network security. Cisco ASA: All-in-One Firewall, IPS, Anti-X and VPN Adaptive Security Appliance, Second Edition, is Cisco's authoritative practitioner's guide to planning, deploying, managing, and troubleshooting security with Cisco ASA. Written by two leading Cisco security experts, this book presents each Cisco ASA solution in depth, offering comprehensive sample configurations, proven troubleshooting methodologies, and debugging examples. Readers will learn about the Cisco ASA Firewall... more

See more recommendations for this book...

Don't have time to read the top VPN books of all time? Read Shortform summaries.

Shortform summaries help you learn 10x faster by:

  • Being comprehensive: you learn the most important points in the book
  • Cutting out the fluff: you focus your time on what's important to know
  • Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
21

Travel to China

Everything You Need to Know Before You Go

Are you planning to travel to China? Whether you're still weighing the decision or you've already purchased your tickets, this unique travel guide is an indispensable resource for any China traveler.

As the title says, this is everything you need to know before you travel to China - the things that other major travel guides somehow expect you to know.

This China Travel Guide Book Will Teach You:
- How to Apply for a Visa: What visa do you need and can you get away with a free transit visa?
- How to Prepare for Your Trip: Do you need vaccines? Should you bring...
more

See more recommendations for this book...

23
Let's face it: the information age makes dummies of us all at some point. One thing we can say for sure, though, about things related to the Internet is that their best strengths are often also their worst weaknesses. This goes for virtual private networks (VPNs). They may reach a wide base of customers - but can also be vulnerable to viruses, hackers, spoofers, and other shady online characters and entities. VPNs may allow for super-efficient communication between customer and company - but they rely on information which, if compromised, can cause huge losses. The Internet is still a... more

See more recommendations for this book...

24
Virtual private networks (VPNs) based on the Internet instead of the traditional leased lines offer organizations of all sizes the promise of a low-cost, secure electronic network. However, using the Internet to carry sensitive information can present serious privacy and security problems. By explaining how VPNs actually work, networking expert Jon Snader shows software engineers and network administrators how to use tunneling, authentication, and encryption to create safe, effective VPNs for any environment. Using an example-driven approach, VPNs Illustrated explores how tunnels and VPNs... more

See more recommendations for this book...

26
You've heard a lot of hype about VPNs - get ready to set one up yourself! With this guide, you'll be running your own secure, private VPN in the cloud in under ten minutes - even if it's your first time.

We'll then move on to even more hands-on installation and configuration using Amazon EC2. Along the way, you'll gain experience and familiarity with VPN and web server software, networking concepts, basic network and command line tools in Linux, intrusion detection software, and more.
less

See more recommendations for this book...

27
Use Cisco concentrators, routers, Cisco PIX and Cisco ASA security appliances, and remote access clients to build a complete VPN solution
A complete resource for understanding VPN components and VPN design issues Learn how to employ state-of-the-art VPN connection types and implement complex VPN configurations on Cisco devices, including routers, Cisco PIX and Cisco ASA security appliances, concentrators, and remote access clients Discover troubleshooting tips and techniques from real-world scenarios based on the author s vast field experience Filled with relevant configurations you can...
more

See more recommendations for this book...

28

Network Security, Firewalls and VPNs

PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Fully Revised And Updated With The Latest Data From The Field, Network Security, Firewalls, And Vpns, Second Edition Provides A Unique, In-Depth Look At The Major Business Challenges And Threats That Are Introduced When An Organization'S Network Is Connected To The Public Internet. Written By An Industry Expert, This Book Provides A Comprehensive Explanation Of Network Security Basics, Including How Hackers Access Online Networks And The Use Of Firewalls And Vpns To Provide Security... more

See more recommendations for this book...

29

CCNA Security Lab Manual Version 2

The only authorized Lab Manual for the Cisco Networking Academy CCNA Security Version 2 course The Cisco(R) Networking Academy(R) course on CCNA(R) Security is a hands-on, career-oriented e-learning solution with an emphasis on practical experience to help you develop specialized security skills to expand your CCENT-level skill set and advance your career. The curriculum helps prepare students for entry-level security career opportunities and the Implementing Cisco IOS(R) Network Security (IINS) certification exam (210-260) leading to the Cisco CCNA Security certification. The CCNA... more

See more recommendations for this book...

30

Network Design Cookbook

Architecting Cisco Networks

Version 10.2.8 (August 2016) The Network Design Cookbook is a guide that provides a structured process that you, as a network engineer or a consultant, can use to meet your critical technical objectives while keeping within the parameters of industry best practices. While it primarily deals with Cisco equipment, the Network Design Cookbook lays out a design process that allows for the incorporation of products from other vendors. In this book, you will find valuable resources and tools for constructing the topology and services you need, with step-by-step design assistance for many solutions... more

See more recommendations for this book...

Don't have time to read the top VPN books of all time? Read Shortform summaries.

Shortform summaries help you learn 10x faster by:

  • Being comprehensive: you learn the most important points in the book
  • Cutting out the fluff: you focus your time on what's important to know
  • Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
31
OpenVPN is a powerful, open source SSL VPN application. It can secure site-to-site connections, WiFi and enterprise-scale remote connections. While being a full-featured VPN solution, OpenVPN is easy to use and does not suffer from the complexity that characterizes other IPSec VPN implementations. It uses the secure and stable TLS/SSL mechanisms for authentication and encryption. This book is an easy introduction to this popular VPN application. After introducing the basics of security and VPN, the book moves on to cover using OpenVPN, from installing it on various platforms, through... more

See more recommendations for this book...

32

Guide to Network Security

GUIDE TO NETWORK SECURITY is a wide-ranging new text that provides a detailed review of the network security field, including essential terminology, the history of the discipline, and practical techniques to manage implementation of network security solutions. It begins with an overview of information, network, and web security, emphasizing the role of data communications and encryption. The authors then explore network perimeter defense technologies and methods, including access controls, firewalls, VPNs, and intrusion detection systems, as well as applied cryptography in public key... more

See more recommendations for this book...

33

Ipsec VPN Design

As the numbers of remote branches and work-from-home employees grows throughout corporate America, VPNs are becoming essential to both Enterprise networks and Service providers. IPSec is one of the more popular technologies for deploying IP based VPNs. IPSec VPN Design provides a solid understanding of design and architectural issues of IPSec VPNs. Some books cover IPSec protocols, but they do not address overall design issues. This book fills that void. IPSec VPN Design consists of three main sections. The first section provides a comprehensive introduction to the IPSec protocol, including... more

See more recommendations for this book...

34

Ipsec Securing VPNs

Written in conjunction with RSA Security - the most trusted name in e-security - this book gives a presentation of IPSec components, implementation, and VPN interoperability. It is a part of the RSA Press series. less

See more recommendations for this book...

Don't have time to read the top VPN books of all time? Read Shortform summaries.

Shortform summaries help you learn 10x faster by:

  • Being comprehensive: you learn the most important points in the book
  • Cutting out the fluff: you focus your time on what's important to know
  • Interactive exercises: apply the book's ideas to your own life with our educators' guidance.