The theory, implementation, guidelines, and security aspects of VPNs are covered in this comprehensive book, billed as the only documented resource to protect against common hacker attacks on networks. Written for the Unix, Windows, and NT platforms, this guide provides handy resources and charts to evaluate data trends and perform a cost-benefit analysis.venture in the world of networking, you will find that you need to contact the vendor to iron out small details of configuration. ... Checklist. Approach. Implementing any solution involving something as complex as digital communications ... You will reach the point where the process evolves into maintenance and evaluation.
|Title||:||Creating and Implementing Virtual Private Networks|
|Author||:||Casey Wilson, Peter Doak|
|Publisher||:||Coriolis Group - 2000|