Intermediate - Advanced Level Users
This book covers the implementation and practices of Virtual Private Networks (VPNs), a topic not currently explored by any other book on the market. The book is also the only documented resource on common hacker attacks, and provides necessary information on protecting against them. Written for the Unix, Windows, and NT platform, it provides resources and charts to evaluate data trends and perform valuable cost-benefit analyses, the first step in implementing a VPN. It teaches the theory, implementation, guidelines, and security aspects of VPNs, and divulges the details of encryption tools, government restrictions, firewall architectures, client/server technology, security tools, and cryptography.