IPSec enables companies to build VPNs and other Internet-centered mission-critical applications with confidence that their data will remain secure. IPSec, Second Edition is the most authoritative, comprehensive, accessible, and up-to-date guide to IPSec technology. In this book, two leading authorities in IPSec standardization and implementation cover every facet of IPSec architecture and deployment -- and present detailed case studies that demonstrate how IPSec can be used to provide end-to-end security in real business environments. The authors lay the groundwork for understanding IPSec with a concise review of the relevant fundamentals of cryptography and TCP/IP networking. Next, they introduce IPSec's architecture and components, including its Encapsulating Security Payload (ESP), Authenticated Header (AH), Internet Key Exchange, IPSec modes, security associations, processing, and ICMP-related issues. IPSec, Second Edition contains detailed coverage of deployment issues, including policy definition, representation, distribution, and management; implementation architectures; and extensive case examples of IPSec usage in the real world. For every networking professional interested in Internet security -- not just security specialists!
"synopsis" may belong to another edition of this title.
IPSec, the suite of protocols for securing any sort of traffic that moves over an Internet Protocol (IP) network, promises big things for online business. IPSec: The New Security Standard for the Internet, Intranets, and Virtual Private Networks catalogues the specifications that compose this suite and explains how they fit into intranets, virtual private networks (VPNs), and the Internet.
Authors Doraswamy and Harkins first treat IPSec as a system, explaining how its component parts work together to provide flexible security. Their approach to this task makes sense: they first explain why standard IP packets aren't secure; then they show how the IPSec improvements make secure transactions possible. Readers get full descriptions of how various network entities talk to one another. Where appropriate, concepts that aren't specific to IPSec are explained, including IPv4 and IPv6 packet structures and addressing schemes. There's some information on cryptography too.
IPSec's parts are explained individually: the Authentication Header (AH), Encapsulating Security Payload (ESP), Internet Key Exchange (IKE), and ISAKMP/Oakley protocols are detailed with lots of prose, supplemented with a smattering of packet diagrams and conceptual sketches. Sections on implementing IPSec protocols on networks remain fairly abstract and don't mention actual products, but should prove useful to programmers designing their own network security products around the IPSec specifications. --David WallFrom the Publisher:
summary and table of contents
A guide to the new IP Security standard and protocol instrumental in making Virtual Private Networks a reality. This is going to be a major topic in 1999. Authors from Cisco and Nortel contributed to the development of the protocol. This will include an IP Security overview with an intro tutorial on tcp/ip stack: indepth coverage of encapsulating security payload, authentication header, detailed discussion of secret key management protocols. IPsec kernel and IPsec in action chapter with case examples.
I. : OVERVIEW.
1. CRYPTOGRAPHIC HISTORY AND TECHNIQUES.
Secrets in History. Rise of the Internet. Internet Security. Cryptographic Tools. Crypto Concepts. More Information.
2. TCP/IP Overview.
Introduction. Introduction to TCP/IP. Addressing. Domain Name System. Security at What Level.
3. IP Security Overview.
The Architecture. Encapsulating Security Payload (ESP). Authenticated Header (AH). Internet Key Exchange.
II. : DETAILED ANALYSIS.
4. IPSEC ARCHITECTURE.
Introduction. The IPSec Roadmap. IPSec Implementation. IPSec Modes. Security Associations. IPSec Processing. Fragmentation. ICMP.
5. The Encapsulating Security Payload (ESP).
The ESP Header. ESP Modes. ESP Processing.
6. The Authentication Header (AH).
The AH Header. AH Modes. AH Processing.
7. The Internet Key Exchange.
ISAKMP. IKE. The IPSec DOI. Summary.
III. : DEPLOYMENT ISSUES.
Introduction. Policy Definition Requirement. Policy Representation and Distribution. Policy Management System. Deployment. Setting Up the Policy.
9. IPSec Implementation.
Introduction. Implementation Architecture. IPSec Protocol Processing. Fragmentation and PMTU. ICMP Processing.
10. IP Security In Action.
11. IPSec Futures.
Compression. Multicast. Key Recovery. L2TP. Public Key Infrastructure.
"About this title" may belong to another edition of this title.
Book Description Prentice Hall. Book Condition: New. Brand New. Bookseller Inventory # 013046189X
Book Description Prentice Hall, 2003. Paperback. Book Condition: New. book. Bookseller Inventory # 013046189X
Book Description Prentice Hall, 2003. Paperback. Book Condition: New. Bookseller Inventory # P11013046189X
Book Description Prentice Hall, 2003. Paperback. Book Condition: New. 2. Bookseller Inventory # DADAX013046189X
Book Description Prentice Hall, 2003. Book Condition: New. Brand new! Please provide a physical shipping address. Bookseller Inventory # 9780130461896
Book Description Prentice Hall, 2003. Paperback. Book Condition: Brand New. 2nd sub edition. 262 pages. 9.25x7.00x1.00 inches. In Stock. Bookseller Inventory # zk013046189X
Book Description Book Condition: Brand New. Book Condition: Brand New. Bookseller Inventory # 97801304618961.0