From the book lists at Adware Report:

All information current as of 14:25:20 Pacific Time, Monday, 21 February 2005.

Virtual Private Networks: Achieving Secure Internet Commerce and Enterprisewide Communications

   by Walter Goralski / David Waclawski

    Computer Technology Research Corporation
    01 April, 1999


   Usually ships in 24 hours

Click the button below to . . .

(which will add the book to your Amazon U.S.A. "Shopping Cart")

. . . or use your browser's Back button to return to the search-list page.

Editorial description(s):

From the Publisher
Computer Technology Research Corp. (CTR) is an internationally-recognized research and publishing company. Since 1979, CTR's reports have provided information on major technologies, trends, products, companies, and markets concerning the computer industry. Our reports assist executives, users, and vendors with making strategic decisions regarding information technology products and services.

Each CTR report includes management summaries, competitive analyses, technical product evaluations, vendor marketing strategies and case studies. CTR's reports are independently researched and present unbiased, objective views, strengths and limitations of products, and insight into technology directions. The reports provide managers with the vital quality information that is needed to successfully plan large- and small-scale information technology projects.

About the Author
Walter Goralski

Walter Goralski is a technical writer based out of New York. Since 1970, he has worked for AT&T, Wang Laboratories, and Pace University. Goralski received both his undergraduate degree in Business, and graduate degree in Computer Science from Pace University in New York.

Over the years, Goralski received numerous corporate awards from both AT&T and Wang. He is the author of Introduction to ATM Networking, published by McGraw-Hill, and belongs to the IEEE and the ATM Forum.

Book Description
This new CTR report examines the driving forces behind virtual private networks (VPNs) and includes an investigation of the Internet and Web's role in e-commerce, transmission control protocol/Internet protocol (TCP/IP), router networks, firewalls, and private networks. The lack of quality of service (QoS), basic security, and privacy measures in today's computing environments are also addressed. Relevant Internet and Web definitions, terms, and standards ,and security technologies such as encryption and authentication are detailed. Topics Covered Include:
Conducting Business on the Web
E-commerce Needs
Security and Privacy
The Basics of Encryption
Key Distribution
Hash Functions
Pretty Good Privacy (PGP)
Public Key Infrastructure (PKI)
Key Aspects of Web Server Authentication
Certificates and Certificate Authorities (CAs)
Public Key Certificates
Internet CAs
Remote Access
Terminal Access Control Access Control System (TACACS)
Remote Authentication Dial-in User Service (RADIUS)
Tunneling Protocols
Generic Routing Encapsulation (GRE) Protocol
Level 2 Tunneling Protocol (L2TP)
Challenge Handshake Authentication Protocol (CHAP)
Proxy Servers
How Risky Is Java?
Build or Buy VPNs?
Implementation Issues
Managed Network Service (MNS)
VPNs and The Internet
Frame Relay (FR)
Asynchronous Transfer Mode (ATM)
User and Application Perspectives
The Future of VPNs

Reader review(s):

(none available)

{end of page}

(Page code from the SEO Tools, Toys, and Packages site)