Redes Privadas Virtuais(VPN)

7. Bibliografia

  1. SILVA, Lino Sarlo. Virtual Private Network – VPN: Aprenda a construir redes privadas virtuais em plataformas Linux e Windows. Editora: Novatec. Ano: 2003
  2. David J. Wetherall e Andrew S. Tanenbaum, "Redes de Computadores", 5a Ed.,Editora Pearson.
  3. Jaha. A.; Shatwan, F.; Ashibani, M. Proper Virtual Private Network (VPN) Solution. Published in: Next Generation Mobile Applications, Services and Technologies, 2008. NGMAST '08. The Second International Conference on 16-19 Sept. 2008
  4. Lackovic, D.; Tomic, M. Performance analysis of virtualized VPN endpoints. Published in: Information and Communication Technology, Electronics and Microelectronics (MIPRO), 2017 40th International Convention on 22-26 May 2017
  5. Khanvilkar, S.; Khokhar, A. Virtual private networks: an overview with performance evaluation. Published in: IEEE Communications Magazine ( Volume: 42, Issue: 10, Oct. 2004 ). Page(s): 146 - 154.
  6. Venkateswaran, R. Virtual private networks. Published in: IEEE Potentials ( Volume: 20, Issue: 1, Feb/Mar 2001 ). Page(s): 11 - 15
  7. Herscovitz, E. (1999). Secure virtual private networks: the future of data communications.Int. J. Netw. Manag., 9(4):213–220.
  8. Kolesnikov, O. and Hatch, B. (2002). Building Linux virtual private networks (VPNs).New Riders Publishing, Indianapolis, IN, USA.
  9. VPN SECURITY, February 2008. The Government of the Hong Kong SpecialAdministrative Region. Disponível neste link.
  10. CISCO. Como as redes privadas virtuais funcionam. Disponível neste link.
  11. OLIVEIRA, Viviane. VPN - Virtual Private Network. Centro Universitário Amparense Amparo – SP 2007 - Monografia.
  12. Chin, Liou Kuo. Rede Privada Virtual -VPN, Rede Nacional de Ensino e Pesquisa (RNP), Novembro 1998.
  13. Scott, Charlie; Wolfe, Paul; Erwin, Mike.Virtual Private Networks, Second Edition. O'Reilly, 1999
  14. Brian Browne, "Best Practices For VPN Implementation," Business Communication Review, March 2001.