Redes Privadas Virtuais(VPN)
7. Bibliografia
- SILVA, Lino Sarlo. Virtual Private Network – VPN: Aprenda a construir redes privadas virtuais em plataformas Linux e Windows. Editora: Novatec. Ano: 2003
- David J. Wetherall e Andrew S. Tanenbaum, "Redes de Computadores", 5a Ed.,Editora Pearson.
- Jaha. A.; Shatwan, F.; Ashibani, M. Proper Virtual Private Network (VPN) Solution. Published in: Next Generation Mobile Applications, Services and Technologies, 2008. NGMAST '08. The Second International Conference on 16-19 Sept. 2008
- Lackovic, D.; Tomic, M. Performance analysis of virtualized VPN endpoints. Published in: Information and Communication Technology, Electronics and Microelectronics (MIPRO), 2017 40th International Convention on 22-26 May 2017
- Khanvilkar, S.; Khokhar, A. Virtual private networks: an overview with performance evaluation. Published in: IEEE Communications Magazine ( Volume: 42, Issue: 10, Oct. 2004 ). Page(s): 146 - 154.
- Venkateswaran, R. Virtual private networks. Published in: IEEE Potentials ( Volume: 20, Issue: 1, Feb/Mar 2001 ). Page(s): 11 - 15
- Herscovitz, E. (1999). Secure virtual private networks: the future of data communications.Int. J. Netw. Manag., 9(4):213–220.
- Kolesnikov, O. and Hatch, B. (2002). Building Linux virtual private networks (VPNs).New Riders Publishing, Indianapolis, IN, USA.
- VPN SECURITY, February 2008. The Government of the Hong Kong SpecialAdministrative Region. Disponível neste link.
- CISCO. Como as redes privadas virtuais funcionam. Disponível neste link.
- OLIVEIRA, Viviane. VPN - Virtual Private Network. Centro Universitário Amparense Amparo – SP 2007 - Monografia.
- Chin, Liou Kuo. Rede Privada Virtual -VPN, Rede Nacional de Ensino e Pesquisa (RNP), Novembro 1998.
- Scott, Charlie; Wolfe, Paul; Erwin, Mike.Virtual Private Networks, Second Edition. O'Reilly, 1999
- Brian Browne, "Best Practices For VPN Implementation," Business Communication Review, March 2001.