Flylib.com
TOC
Table of content
Next page
IPSec: The New Security Standard for the Internet, Intranets, and Virtual Private Networks, Second Edition
By Naganand Doraswamy, Dan Harkins
Publisher
: Prentice Hall PTR
Pub Date
: March 13, 2003
ISBN
: 0-13-046189-X
Copyright
Preface
Organization
Acknowledgments
Network Diagram Key
Chapter 1. Cryptographic History and Techniques
Secrets in History
Rise of the Internet
Internet Security
Cryptographic Building Blocks
Crypto Concepts
More Information
Chapter 2. TCP/IP Overview
Introduction to TCP/IP
Addressing
Domain Name System
Security at What Level?
Chapter 3. IP Security Overview
The Architecture
Encapsulating Security Payload (ESP)
Authentication Header (AH)
Internet Key Exchange
Chapter 4. IPSec Architecture
The IPSec Roadmap
IPSec Implementation
IPSec Modes
Security Associations
IPSec Processing
Fragmentation
ICMP
Chapter 5. The Encapsulating Security Payload (ESP)
The ESP Header
ESP Modes
ESP Processing
Chapter 6. The Authentication Header (AH)
The AH Header
AH Modes
AH Processing
Chapter 7. The Internet Key Exchange
ISAKMP
IKE
The IPSec DOI
Summary
Chapter 8. Policy
Policy Definition Requirement
Policy Representation and Distribution
Policy Management System
Deployment
Setting Up the Policy
Chapter 9. IPSec Implementation
Implementation Architecture
IPSec Protocol Processing
Fragmentation and PMTU
ICMP Processing
Chapter 10. IP Security in Action
End-to-End Security
Chapter 11. Deployment Scenarios (Using IPsec to Secure the Network)
Site-to-Site Policies
Remote Access Policies
Four Office Company Example
Multiple Company Extranet Example
Outsourcing Networks
Summary
Chapter 12. IPSec Futures
Compression
Multicast
Key Recovery
L2TP
Public Key Infrastructure
Bibliography
Books
Journals and Technical Reports
IETF Documents-RFC's
IETF Documents-Internet Drafts
Top
Table of content
Next page
IPSec (2nd Edition)
ISBN: 013046189X
EAN: 2147483647
Year: 2004
Pages: 76
Authors:
Naganand Doraswamy
,
Dan Harkins
BUY ON AMAZON
Database Modeling with MicrosoftВ® Visio for Enterprise Architects (The Morgan Kaufmann Series in Data Management Systems)
ORM Constraints
Editing Logical Models”Advanced Aspects
Reverse Engineering Physical Schemas to Logical Models
Logical Database Model Reports
Other Features and Best Practices
Strategies for Information Technology Governance
Structures, Processes and Relational Mechanisms for IT Governance
Assessing Business-IT Alignment Maturity
A View on Knowledge Management: Utilizing a Balanced Scorecard Methodology for Analyzing Knowledge Metrics
Technical Issues Related to IT Governance Tactics: Product Metrics, Measurements and Process Control
Managing IT Functions
Documenting Software Architectures: Views and Beyond
Part I. Software Architecture Viewtypes and Styles
Combined Views
C4ISR Architecture Framework
ECS Software Architecture View Template
Allocation Implementation View
Service-Oriented Architecture (SOA): Concepts, Technology, and Design
Case #2 background: Transit Line Systems Inc.
Common misperceptions about SOA
Service activity
SOA delivery lifecycle phases
Entity-centric business service design (a step-by-step process)
Extending and Embedding PHP
Data Types
Evolutionary Leaps
Interfaces
Speaking the Windows Dialect
Appendix A. A Zend API Reference
DNS & BIND Cookbook
Introduction
Registering a Domain Name
Adding a Host
Viewing a Name Servers Cache
Controlling Multiple named Processes with rndc
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies