Emerging Technologies and Standards
Because the Internet is constantly changing, the security protocols used to protect the valuable information stored on the various servers that compose and connect to the Internet also must evolve and change. Two protocols are highlighted in this section. The first, Point-to-Point Tunneling, is currently undergoing a number of changes and enhancements because the cost to access the Internet and the price of associated support hardware have drastically fallen over the past year. The second protocol is lesser known simply because it provides key enhancements to Secure Sockets without changing the implementation of Secure Sockets in an application.
Point-to-Point Tunneling
Essentially, tunneling is a method of ...
Get Developing Secure Applications with Visual Basic now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.