Explores how tunnels and VPNs function by observing their behavior """"on the wire"""". This work helps readers understand and troubleshoot VPN and network behavior. It includes topics like: block and stream symmetric ciphers; asymmetric ciphers, such as RSA and EIGamal; and message authentication codes, including HMACs.