Skip to content

IPSec

Best in textbook rentals since 2012!

ISBN-10: 013046189X

ISBN-13: 9780130461896

Edition: 2nd 2003 (Revised)

Authors: Naganand Doraswamy, Dan Harkins

List price: $44.99
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

IPSec enables companies to build VPNs and other Internet-centered mission-critical applications with confidence that their data will remain secure. IPSec, Second Edition is the most authoritative, comprehensive, accessible, and up-to-date guide to IPSec technology. In this book, two leading authorities in IPSec standardization and implementation cover every facet of IPSec architecture and deployment -- and present detailed case studies that demonstrate how IPSec can be used to provide end-to-end security in real business environments. The authors lay the groundwork for understanding IPSec with a concise review of the relevant fundamentals of cryptography and TCP/IP networking. Next, they…    
Customers also bought

Book details

List price: $44.99
Edition: 2nd
Copyright year: 2003
Publisher: Prentice Hall PTR
Publication date: 3/13/2003
Binding: Hardcover
Pages: 288
Size: 7.00" wide x 9.25" long x 1.00" tall
Weight: 1.628
Language: English

Overview
Cryptographic History and Techniques
Secrets in History
Rise of the Internet
Internet Security
Cryptographic Building Blocks
Crypto Concepts
More Information
TCP/IP Overview
Introduction to TCP/IP
Addressing
Domain Name System
Security-at What Level?
IP Security Overview
The Architecture
Encapsulating Security Payload (ESP)
Authentication Header (AH)
Internet Key Exchange
Detailed analysis
IPSec Architecture
The IPSec Roadmap
IPSec Implementation
IPSec Modes. Security Associations
IPSec Processing. Fragmentation. ICMP
The Encapsulating Security Payload (ESP)
The ESP Header
ESP Modes
ESP Processing
The Authentication Header (AH)
The AH Header. AH Modes. AH Processing
The Internet Key Exchange
ISAKMP. IKE. The IPSec DOI
Deployment issues
Policy
Policy Definition Requirement
Policy Representation and Distribution
Policy Management System
Deployment. Setting Up the Policy
IPSec Implementation
Implementation Architecture
IPSec Protocol Processing
Fragmentation and PMTU
ICMP Processing
IP Security in Action
End-to-End Security
Deployment Scenarios (Using IPsec to Secure the Network)
Site-to-Site Policies
Remote Access Policies
Four Office Company Example
Multiple Company Extranet Example
Outsourcing Networks
Summary
IPSec Futures
Compression
Multicast
Key Recovery
L2TP
Public Key Infrastructure
Bibliography
Index