Library: Cisco to IRE  













Stop SPAM

What are the most active viruses and worms today.

Test your virus protection with non-destructive test file. Please read the instructions carefully.

Cisco  
Certificate Authority Support for IPSec Overview 29K PDF
CiscoAssure Policy Networking: Enabling Business Applications through Intelligent Networking 99K PDF
Access VPN for the Enterprise 45K PDF
Security Issues for Enterprise VPNs 46K PDF
IPSec 244K PDF
Cisco Security Manager 27K PDF
What is a VPN? 638K PDF
Compatible Systems  
VPN: The Remote Access Solution 422K PDF
Virtual Private Networking Is Real Technology - Now 14K PDF
Concentric Networks  
Outsourcing Remote Access Services White Paper October 1998 152K PDF
Cosine Communications  
Moving Into the Cloud: The Case for Network-based VPNs 257K PDF
Counterpane  
Security Pitfalls in Cryptography 56K PDF
Why Cryptography is Harder than It Looks 32K PDF
CyberGuard  
Financial Services and Public Networks 58K PDF
What To Look For in a CA: A Buyer’s Guide 17K PDF
Medical Records and Public Networks 42K PDF
Entrust Technologies  
Key Update and the Complete Story on the Need for Two Key Pairs 45K PDF
Guide to the Business Impact of PKIs 75K PDF
Computer Security Fact Sheet:
Companies' growing concern for security is not unfounded
40K PDF
An Introduction to Cryptography 75K PDF
Trusted Public-Key Infrastructures 44K PDF
A Total Economic Impact Analysis of Two PKI Vendors: Entrust and VeriSign 152K PDF
The Concept of Trust in Network Security 611K PDF
Trust management in the public-key infrastructure 115K PDF
Extended Systems  
What is a Virtual Private Network (VPN)? 115K PDF
Flash Presentations - .swf format  
Nokia Intrusion Detection 2.63MB Flash
Nokia LLR VPN 1.38MB Flash
Nokia RA VPM 1.21MB Flash
Nokia SPI VPN 2.00MB Flash
Nokia URL Filtering 2.09MB Flash
Government Publications  
   
GTE  
Choosing a Virtual Private Network (VPN) Service Provider 39K PDF
IPSec VPNs with Digital Certificates: The Most Secure and Scalable Approach to Implementing VPNs 688K PDF
Hewlett Packard  
Building a Windows NT Bastion Host in Practice 90K PDF
IBM  
Using IPSec to Construct Secure VPNs 491K PDF
IBM's VPN Solutions 284K PDF
IDC  
eSecurity: The Essential eBusiness Enabler 331K PDF
Intel  
Scalable Solutions for Evolving Networks 282K PDF
Indus River  
A Closer Look at Remote Access: Can Your Organization Benefit from VPNs? 1323K PDF
Intellispan  
IP Network Authentication: A Comparison of Competing Technologies 29K PDF
Intermedia  
Intermedia Secure: Service Description for Managed Firewall 333K PDF
Intermedia Secure: Statement of Work Scope for Turnkey Firewalls 190K PDF
IPass  
The Internet Solution for Remote Access Selecting an Internet Service and VPN Technology 95K PDF
Corporate Remote Access Alternatives 319K PDF
IRE  
IPSec White Paper 119K PDF
The Virtual Private Network Security is The Key 575K PDF
The Importance of Security Standards 96K PDF
The SafeNet Security System 698K PDF
The SafeNet Security System Version 3 Overview 276K PDF