"The IPSec protocol suite is perhaps the most important mechanism for securing the future Internet, and is bound to become an inseparable part of the Internet protocol. This book is essential reading and a great reference for anyone who wants to use IPSec or to understand how it works. Clearly and fluently written, it provides the reader with an overall view and rationale, together with the necessary hands-on details. This is most definitely the right book at the right time!" --Ran Canetti, "Staff Member, IBM Research"
The insider's guide to IPSec for every networking professional--not just security specialists!
With IPSec, Internet security comes of age, enabling companies to build VPNs and other Internet-centered mission-critical applications with confidence that their data will remain secure. Now, there's an authoritative, comprehensive guide to IPSec--straight from two leading authorities in IPSec standardization and implementation.
Start by reviewing the fundamentals of computer and network security, and the tradeoffs associated with implementing security at each layer of the IP stack. Next, walk through IPSec's architecture and components; the role of authentication, encryption, encapsulating security payloads (ESPs); and Internet Key Exchange (IKE). Coverage includes: Using IPSec security in host-to-host, host-to-gateway, and gateway-to-gateway scenarios Security associations, SPIs, and other key concepts Establishing secure VPN tunneling Overlapping and shared security associations, nested and chained tunnels, and other implementation issues Practical guidance for setting policy on routers and end-hosts A detailed look inside the IPSec kernel
Finally, previewthe future of IPSec, with up-to-the-minute coverage of compression, multicast, mobility, and PKIX--enhancements that will be crucial to large-scale IPSec deployment. Whether you are a networking or Web professional, software developer, or security specialist, you must understand IPSec--and with this book, you will.
This book makes a major contribution to all of us achieving such an understanding. - Hank Vigil, General Manager (Internet Commerce Group), Microsoft Corporation.
... Opportunities at Quantico VA .; John Frazzini , Special Agent for the Secret Service Financial Crimes Division ; Tracey Vispoli , Vice President of CHUBB , and Bill Worley , HP fellow , Chief Scientist for Hewlett Packard , Inc. 3.
In addition, readers may use this text to prepare for the CIW Security Professional exam. Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version.
The stories about phishing attacks against banks are so true-to-life, it’s chilling.” --Joel Dubin, CISSP, Microsoft MVP in Security Every day, hackers are devising new ways to break into your network.
本书结合当前靠前外计算机病毒领域的研究现状,总结作者在病毒研究领域近年来的研究成果,主要介绍基于有监督机器学习理论指导下的病毒自动化和智能化检测技术。重点分析病 ...
"The book you are about to read will arm you with the knowledge you need to defend your network from attackers—both the obvious and the not so obvious.... If you...
In this authoritative book, widely respected practitioner and teacher Matt Bishop presents a clear and useful introduction to the art and science of information security. Bishop's insights and realistic examples...
Computer Data Security: A Practical and Legal Guide to Liability, Loss Prevention, and Criminal & Civil Remedies
You are under surveillance right now.Your cell phone provider tracks your location and knows who’s with you. Your online and in-store purchasing patterns are recorded, and reveal if you're...
If you are a UNIX system administrator or user who deals with security, you need this book. It's a practical guide that spells out your options for both Berkeley UNIX...