Zurück ] Home ]


13         Quellenverzeichnis

Links

[1]         RFC Request for Comment                           http://www.ietf.org/

[2]         Check Point Software Technologies Ltd.        http://www.checkpoint.com

[3]         Cisco Systems                                               http://www.cisco.com

[4]         PGP, Sniffer                                                  http://www.nai.com

 

Literatur

[5]         Dave Kosiur: „Building and Managing Virtual Private Networks“, Wiley  Computer Publishing 1998, ISBN 0-471-29526-4  

[6]         Check Point Software Technologies Ltd.: “Virtual Private Networks, Security Components, A Technical White Paper”, 1998  

[7]         Check Point Software Technologies Ltd.: “Redefining the Virtual Private Network, 1999  

[8]         Microsoft Corporation: “Virtual Private Networking: An Overview”, White Paper – Draft, 1998

[9]         Paul Ferguson, Geoff Huston: “What is a VPN?”, Rev.1 , 1998

[10]     Bruce Schneier: “Angewandte Kryptographie”, Addison Wesley 1997, ISBN 3-89319-854-7

[11]     Andrew S. Tanenbaum : “Computer Networks”  (third edition), Prentice Hall, 1996, ISBN: 0133499456

[12]     Mathias Hein, Marie-Christine Billo: „TCP/IP light“, Fossil Verlag 1997, ISBN 3-931959-04-X

[13]     Lutz J. Heinrich: „Informationsmanagement“, 6. Auflage, R.Oldenbourg Verlag, München, Wien 1999, ISBN 3-486-24909-6

 

 

Fachzeitschriften

[14]     Michael Schmidt, “Schwan und Pinguin”, c’t 16/98, S 180-185

[15]     Michael Schmidt, “Unter Ausschluss der Öffentlichkeit”, c’t 8/98, S 226-235

[16]     Jürgen Kuri, “Privatissimo”, c’t 4/99, S 190-194

 

 

Webseiten

[17]     http://www.data.com/tutorials/point.html, “Building VPNs: The 10-point plan”

[18]     http://www.data.com/tutorials/bullet.html, “Bulletproof IP”

[19]     http://www.data.com/lab_tests/vpn.html, “VPNs: Security with an Uncommon Touch”

[20]     http://www.internetwk.com/VPN/paper2-3.htm, “Three Different Routes That All Lead To VPN”

[21]     http://www.webproforum.com/vpn/topic06.htm, “Virtual Private Networks Tutorial”

[22]     http://www.ascend.com/2174.html, “Virtual Private Networks Resource Guide”

[23]     http://www.aventail.com/index.phtml/solutions/white_paper/ebusiness.phtml, “Extranet VPNs: Paving the Way for E-Business”

[24]     http://goethe.ira.de/redundanz/vortrag05/ , “Vortrag 5: Lempel Ziv”

[25]     http://www.stud.uni-karlsruhe.de/~un55/lz.html, „Lempel-Ziv-Kodierung“

[26]     http://www.bsi.bund.de/literat/tagungsb/achter.htm, „PKI – Public Key Infrastructure“

[27]     http://www.hypercope.de/, “V.42bis Komprimierung”

[28]     http://www.fim.uni-linz.ac.at/codeddrag/codedrag.htm, „CodedDrag“

[29]     http://skip.incog.com/, “SKIP“