Building and Integrating Virtual Private Networks with Openswan
Author: P Wouters
This book is a comprehensive guide to using Openswan for building both basic and industry size, military strength VPNs for medium to very large organizations. Written by the core developers, this practical book is all you need to use Openswan to build any VPN infrastructure you may need. The authors have covered the latest developments and upcoming issues. This book will not only help you build the VPN you need, but also save you a lot of time.
With the widespread use of wireless and the integration of VPN capabilities in most modern laptops, PDA's and mobile phones, there is a growing desire for encrypting more and more communications to prevent eavesdropping. Can you trust the coffee shop's wireless network? Is your neighbor watching your wireless? Or are your competitors perhaps engaged in industrial espionage? Do you need to send information back to your office while on the road or on board a ship? Or do you just want to securely access your MP3's at home? IPsec is the industry standard for encrypted communication, and Openswan is the de-facto implementation of IPsec for Linux.
Whether you are just connecting your home DSL connection with your laptop when you're on the road to access your files at home, or you are building an industry size, military strength VPN infrastructure for a medium to very large organization, this book will assist you in setting up Openswan to suit those needs.
The topics discussed range from designing, to building, to configuring Openswan as the VPN gateway to deploy IPsec using Openswan. It not only for Linux clients, but also the more commonly used Operating Systems such as Microsoft Windows and MacOSX. Furthermore it discussescommon interoperability examples for third party vendors, such as Cisco, Checkpoint, Netscreen and other common IPsec vendors.
New interesting textbook: Outsourcing Amerika: Die Wahren Kosten von Versandsarbeitsplätzen In Übersee, und Was Darüber Getan Werden Kann
Tailored Health Messages: Customizing Communication with Computer Technology
Author: Matthew Kreuter
Through the use of new technologies, researchers, and practitioners in health education and health communication can now provide health information and behavior change strategies that are customized based on the unique needs, interests, and concerns of different individuals. These tailored health messages can be highly effective in assisting individuals in understanding and responding to health concerns.
In this volume, Matthew Kreuter, David Farrell, and their colleagues define the process of tailoring and describe its uses in health communication programs. They present a theoretical and public health rationale for tailoring and support their position with empirical evidence. They also lay out the steps involved in creating and delivering tailored health communication programs, which can then be applied in practice. Practitioners, researchers, and students in health communication, health psychology, public health, and related areas will find this book to be a vital and invaluable resource forimproving communication about health issues.
No comments:
Post a Comment