Chapter 1 Getting Started -- chapter 2 Technical Primer -- chapter 3 IP Security Primer -- chapter 4 Cryptography -- chapter 5 Implementation Theory -- chapter 6 Authentication -- chapter 7 IPSec Architecture -- chapter 8 Security Protocols -- chapter 9 Key Management -- chapter 10 IKE in Action -- chapter 11 Areas of Interest within IKE -- chapter 12 Security Policies and the Security of VPNs -- chapter 13 Implementation Considerations -- chapter 14 Product Evaluation -- chapter 15 Report on IPSec.
0
SUMMARY OR ABSTRACT
Text of Note
"Starting with a primer on the IP protocol suite, the book travels layer by layer through the protocols and the technologies that make VPNs possible. It includes security theory, cryptography, authentication, IKE, IPSec, encapsulation, keys, and policies. After explaining the technologies and their interrelationships, the book provides sections on implementation and product evaluation. A Technical Guide to IPSec Virtual Private Networks arms information security, network, and system engineers and administrators with the knowledge and the methodologies to design and deploy VPNs in the real world for real companies."--Jacket.
ACQUISITION INFORMATION NOTE
Source for Acquisition/Subscription Address
Ingram Content Group
Stock Number
TANDF_146973
OTHER EDITION IN ANOTHER MEDIUM
Title
Technical guide to IPSec virtual private networks.