This book provides a business and technical overview of SSL VPN
technology in a highly readable style. It provides a vendor-neutral
introduction to SSL VPN technology for system architects, analysts and
managers engaged in evaluating and planning an SSL VPN implementation.
Written by experienced SSL VPN and data security professionals, the book
explains how SSL VPN technology works, and how to evaluate it in the
context of an organisation's overall security and access strategy. It
gives practical advice on educating users, integrating legacy systems,
and eliminating security loopholes