Items related to IPv6 Security

Hogg, Scott; Vyncke, Eric IPv6 Security ISBN 13: 9781587055942

IPv6 Security - Softcover

 
9781587055942: IPv6 Security

Synopsis

IPv6 Security

Protection measures for the next Internet Protocol

As the world’s networks migrate to the IPv6 protocol, networking professionals need a clearer understanding of the security risks, threats, and challenges this transition presents. In IPv6 Security, two of the world’s leading Internet security practitioners review each potential security issue introduced by IPv6 networking and present today’s best solutions.

IPv6 Security offers guidance for avoiding security problems prior to widespread IPv6 deployment. The book covers every component of today’s networks, identifying specific security deficiencies that occur within IPv6 environments and demonstrating how to combat them.

The authors describe best practices for identifying and resolving weaknesses as you maintain a dual stack network. Then they describe the security mechanisms you need to implement as you migrate to an IPv6-only network. The authors survey the techniques hackers might use to try to breach your network, such as IPv6 network reconnaissance, address spoofing, traffic interception, denial of service, and tunnel injection.

The authors also turn to Cisco® products and protection mechanisms. You learn how to use Cisco IOS® and ASA firewalls and ACLs to selectively filter IPv6 traffic. You also learn about securing hosts with Cisco Security Agent 6.0 and about securing a network with IOS routers and switches. Multiple examples are explained for Windows, Linux, FreeBSD, and Solaris hosts. The authors offer detailed examples that are consistent with today’s best practices and easy to adapt to virtually any IPv6 environment.

Scott Hogg, CCIE® No. 5133, is Director of Advanced Technology Services at Global Technology Resources, Inc. (GTRI). He is responsible for setting the company’s technical direction and helping it create service offerings for emerging technologies such as IPv6. He is the Chair of the Rocky Mountain IPv6 Task Force.

Eric Vyncke, Cisco Distinguished System Engineer, consults on security issues throughout Europe. He has 20 years’ experience in security and teaches security seminars as a guest professor at universities throughout Belgium. He also participates in the Internet Engineering Task Force (IETF) and has helped several organizations deploy IPv6 securely.

  • Understand why IPv6 is already a latent threat in your IPv4-only network
  • Plan ahead to avoid IPv6 security problems before widespread deployment
  • Identify known areas of weakness in IPv6 security and the current state of attack tools and hacker skills
  • Understand each high-level approach to securing IPv6 and learn when to use each
  • Protect service provider networks, perimeters, LANs, and host/server connections
  • Harden IPv6 network devices against attack
  • Utilize IPsec in IPv6 environments
  • Secure mobile IPv6 networks
  • Secure transition mechanisms in use during the migration from IPv4 to IPv6
  • Monitor IPv6 security
  • Understand the security implications of the IPv6 protocol, including issues related to ICMPv6 and the IPv6 header structure
  • Protect your network against large-scale threats by using perimeter filtering techniques and service provider–focused security practices
  • Understand the vulnerabilities that exist on IPv6 access networks and learn solutions for mitigating each

This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.

Category: Networking: Security

Covers: IPv6 Security

"synopsis" may belong to another edition of this title.

About the Author

Scott Hogg, CCIE No. 5133, has been a network computing consultant for more than 17 years. Scott provides network engineering, security consulting, and training services, focusing on creating reliable, high-performance, secure, manageable, and cost-effective network solutions. He has a bachelor’s degree in computer science from Colorado State University and a master’s degree in telecommunications from the University of Colorado. In addition to his CCIE he has his CISSP (No. 4610) and many other vendor and industry certifications. Scott has designed, implemented, and troubleshot networks for many large enterprises, service providers, and government organizations. For the past eight years, Scott has been researching IPv6 technologies. Scott has written several white papers on IPv6 and has given numerous presentations and demonstrations of IPv6 technologies. He is also currently the chair of the Rocky Mountain IPv6 Task Force and the Director of Advanced Technology Services at Global Technology Resources, Inc. (GTRI), a Cisco Gold partner headquartered in Denver, Colorado.

Eric Vynckeis a Distinguished System Engineer for Cisco working as a technical consultant for security covering Europe. His main area of expertise for 20 years has been security from Layer 2 to applications. He has helped several organizations deploy IPv6 securely. For the past eight years, Eric has participated in the Internet Engineering Task Force (IETF) (he is the author of RFC 3585). Eric is a frequent speaker at security events (notably Cisco Live [formerly Networkers]) and is also a guest professor at Belgian Universities for security seminars. He has a master’s degree in computer science engineering from the University of Liège in Belgium. He worked as a research assistant in the same university before joining Network Research Belgium, where he was the head of R&D; he then joined Siemens as a project manager for security projects including a proxy firewall. He coauthored the Cisco Press book LAN Switch Security: What Hackers Know About Your Switches. He is CISSP No. 75165.

From the Back Cover

IPv6 Security

 

Protection measures for the next Internet Protocol

 

As the world's networks migrate to the IPv6 protocol, networking professionals need a clearer understanding of the security risks, threats, and challenges this transition presents. In IPv6 Security, two of the world's leading Internet security practitioners review each potential security issue introduced by IPv6 networking and present today's best solutions.

 

IPv6 Security offers guidance for avoiding security problems prior to widespread IPv6 deployment. The book covers every component of today's networks, identifying specific security deficiencies that occur within IPv6 environments and demonstrating how to combat them.

 

The authors describe best practices for identifying and resolving weaknesses as you maintain a dual stack network. Then they describe the security mechanisms you need to implement as you migrate to an IPv6-only network. The authors survey the techniques hackers might use to try to breach your network, such as IPv6 network reconnaissance, address spoofing, traffic interception, denial of service, and tunnel injection.

 

The authors also turn to Cisco® products and protection mechanisms. You learn how to use Cisco IOS® and ASA firewalls and ACLs to selectively filter IPv6 traffic. You also learn about securing hosts with Cisco Security Agent 6.0 and about securing a network with IOS routers and switches. Multiple examples are explained for Windows, Linux, FreeBSD, and Solaris hosts. The authors offer detailed examples that are consistent with today's best practices and easy to adapt to virtually any IPv6 environment.

 

Scott Hogg, CCIE® No. 5133, is Director of Advanced Technology Services at Global Technology Resources, Inc. (GTRI). He is responsible for setting the company's technical direction and helping it create service offerings for emerging technologies such as IPv6. He is the Chair of the Rocky Mountain IPv6 Task Force.

 

Eric Vyncke, Cisco Distinguished System Engineer, consults on security issues throughout Europe. He has 20 years' experience in security and teaches security seminars as a guest professor at universities throughout Belgium. He also participates in the Internet Engineering Task Force (IETF) and has helped several organizations deploy IPv6 securely.

 

  • Understand why IPv6 is already a latent threat in your IPv4-only network
  • Plan ahead to avoid IPv6 security problems before widespread deployment
  • Identify known areas of weakness in IPv6 security and the current state of attack tools and hacker skills
  • Understand each high-level approach to securing IPv6 and learn when to use each
  • Protect service provider networks, perimeters, LANs, and host/server connections
  • Harden IPv6 network devices against attack
  • Utilize IPsec in IPv6 environments
  • Secure mobile IPv6 networks
  • Secure transition mechanisms in use during the migration from IPv4 to IPv6
  • Monitor IPv6 security
  • Understand the security implications of the IPv6 protocol, including issues related to ICMPv6 and the IPv6 header structure
  • Protect your network against large-scale threats by using perimeter filtering techniques and service provider–focused security practices
  • Understand the vulnerabilities that exist on IPv6 access networks and learn solutions for mitigating each

 

 

This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.

 

Category: Networking: Security

Covers: IPv6 Security

 

 

"About this title" may belong to another edition of this title.

  • PublisherCisco Press
  • Publication date2008
  • ISBN 10 1587055945
  • ISBN 13 9781587055942
  • BindingPaperback
  • LanguageEnglish
  • Edition number1
  • Number of pages576

Buy Used

Condition: Very Good
May have limited writing in cover...
View this item

£ 14.30 shipping from U.S.A. to United Kingdom

Destination, rates & speeds

Search results for IPv6 Security

Stock Image

Hogg, Scott; Vyncke, Eric
Published by Cisco Press, 2008
ISBN 10: 1587055945 ISBN 13: 9781587055942
Used Paperback

Seller: ThriftBooks-Dallas, Dallas, TX, U.S.A.

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Paperback. Condition: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 2.13. Seller Inventory # G1587055945I4N00

Contact seller

Buy Used

£ 14.43
Convert currency
Shipping: £ 14.30
From U.S.A. to United Kingdom
Destination, rates & speeds

Quantity: 1 available

Add to basket

Stock Image

Hogg, Scott; Vyncke, Eric
Published by Cisco Press, 2008
ISBN 10: 1587055945 ISBN 13: 9781587055942
Used Paperback

Seller: ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Paperback. Condition: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 2.13. Seller Inventory # G1587055945I4N00

Contact seller

Buy Used

£ 14.43
Convert currency
Shipping: £ 14.30
From U.S.A. to United Kingdom
Destination, rates & speeds

Quantity: 1 available

Add to basket

Stock Image

Hogg, Scott, Vyncke, Eric
Published by Cisco Press, 2008
ISBN 10: 1587055945 ISBN 13: 9781587055942
Used Softcover

Seller: medimops, Berlin, Germany

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Condition: good. Befriedigend/Good: Durchschnittlich erhaltenes Buch bzw. Schutzumschlag mit Gebrauchsspuren, aber vollständigen Seiten. / Describes the average WORN book or dust jacket that has all the pages present. Seller Inventory # M01587055945-G

Contact seller

Buy Used

£ 26.31
Convert currency
Shipping: £ 2.53
From Germany to United Kingdom
Destination, rates & speeds

Quantity: 1 available

Add to basket

Stock Image

Hogg, Scott und Eric Vyncke:
Published by Cisco Press, 2008
ISBN 10: 1587055945 ISBN 13: 9781587055942
Used paperback

Seller: Studibuch, Stuttgart, Germany

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

paperback. Condition: Gut. 540 Seiten; 9781587055942.3 Gewicht in Gramm: 2. Seller Inventory # 868720

Contact seller

Buy Used

£ 27.88
Convert currency
Shipping: £ 30.26
From Germany to United Kingdom
Destination, rates & speeds

Quantity: 1 available

Add to basket

Stock Image

Scott Hogg
Published by Pearson Education (US), 2008
ISBN 10: 1587055945 ISBN 13: 9781587055942
New Paperback / softback

Seller: THE SAINT BOOKSTORE, Southport, United Kingdom

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Paperback / softback. Condition: New. New copy - Usually dispatched within 4 working days. 965. Seller Inventory # B9781587055942

Contact seller

Buy New

£ 61.34
Convert currency
Shipping: FREE
Within United Kingdom
Destination, rates & speeds

Quantity: 1 available

Add to basket

Stock Image

Hogg, Scott; Vyncke, Eric
Published by Cisco Press, 2008
ISBN 10: 1587055945 ISBN 13: 9781587055942
Used Softcover

Seller: Goodwill Books, Hillsboro, OR, U.S.A.

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Condition: Acceptable. Fairly worn, but readable and intact. If applicable: Dust jacket, disc or access code may not be included. Seller Inventory # 3IITBC0002HN_ns

Contact seller

Buy Used

£ 11.40
Convert currency
Shipping: £ 55.35
From U.S.A. to United Kingdom
Destination, rates & speeds

Quantity: 1 available

Add to basket

Seller Image

Hogg, Scott|Vyncke, Eric
Published by CISCO, 2008
ISBN 10: 1587055945 ISBN 13: 9781587055942
New Softcover

Seller: moluna, Greven, Germany

Seller rating 4 out of 5 stars 4-star rating, Learn more about seller ratings

Condition: New. &Uumlber den AutorrnrnScott Hogg, CCIE No. 5133, has been a network computing consultant for more than 17 years. Scott provides network engineering, security consulting, and training services, focusing on creating reliable, high-performance,. Seller Inventory # 880544790

Contact seller

Buy New

£ 46.19
Convert currency
Shipping: £ 21.06
From Germany to United Kingdom
Destination, rates & speeds

Quantity: Over 20 available

Add to basket

Stock Image

Hogg, Scott
Published by Cisco Press, 2008
ISBN 10: 1587055945 ISBN 13: 9781587055942
New Paperback

Seller: Toscana Books, AUSTIN, TX, U.S.A.

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Paperback. Condition: new. Excellent Condition.Excels in customer satisfaction, prompt replies, and quality checks. Seller Inventory # Scanned1587055945

Contact seller

Buy New

£ 48.60
Convert currency
Shipping: £ 22.14
From U.S.A. to United Kingdom
Destination, rates & speeds

Quantity: 1 available

Add to basket

Stock Image

Hogg, Scott/ Vyncke, Eric
Published by Cisco Systems, 2008
ISBN 10: 1587055945 ISBN 13: 9781587055942
New Paperback

Seller: Revaluation Books, Exeter, United Kingdom

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Paperback. Condition: Brand New. 1st edition. 540 pages. 9.00x7.50x1.50 inches. In Stock. Seller Inventory # 1587055945

Contact seller

Buy New

£ 80.96
Convert currency
Shipping: £ 6.99
Within United Kingdom
Destination, rates & speeds

Quantity: 1 available

Add to basket

Stock Image

Scott Hogg
ISBN 10: 1587055945 ISBN 13: 9781587055942
New Paperback First Edition

Seller: Grand Eagle Retail, Fairfield, OH, U.S.A.

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Paperback. Condition: new. Paperback. IPv6 Security Protection measures for the next Internet Protocol As the worlds networks migrate to the IPv6 protocol, networking professionals need a clearer understanding of the security risks, threats, and challenges this transition presents. In IPv6 Security, two of the worlds leading Internet security practitioners review each potential security issue introduced by IPv6 networking and present todays best solutions. IPv6 Security offers guidance for avoiding security problems prior to widespread IPv6 deployment. The book covers every component of todays networks, identifying specific security deficiencies that occur within IPv6 environments and demonstrating how to combat them. The authors describe best practices for identifying and resolving weaknesses as you maintain a dual stack network. Then they describe the security mechanisms you need to implement as you migrate to an IPv6-only network. The authors survey the techniques hackers might use to try to breach your network, such as IPv6 network reconnaissance, address spoofing, traffic interception, denial of service, and tunnel injection. The authors also turn to Cisco products and protection mechanisms. You learn how to use Cisco IOS and ASA firewalls and ACLs to selectively filter IPv6 traffic. You also learn about securing hosts with Cisco Security Agent 6.0 and about securing a network with IOS routers and switches. Multiple examples are explained for Windows, Linux, FreeBSD, and Solaris hosts. The authors offer detailed examples that are consistent with todays best practices and easy to adapt to virtually any IPv6 environment. Scott Hogg, CCIE No. 5133, is Director of Advanced Technology Services at Global Technology Resources, Inc. (GTRI). He is responsible for setting the companys technical direction and helping it create service offerings for emerging technologies such as IPv6. He is the Chair of the Rocky Mountain IPv6 Task Force. Eric Vyncke, Cisco Distinguished System Engineer, consults on security issues throughout Europe. He has 20 years experience in security and teaches security seminars as a guest professor at universities throughout Belgium. He also participates in the Internet Engineering Task Force (IETF) and has helped several organizations deploy IPv6 securely. Understand why IPv6 is already a latent threat in your IPv4-only networkPlan ahead to avoid IPv6 security problems before widespread deploymentIdentify known areas of weakness in IPv6 security and the current state of attack tools and hacker skillsUnderstand each high-level approach to securing IPv6 and learn when to use eachProtect service provider networks, perimeters, LANs, and host/server connectionsHarden IPv6 network devices against attackUtilize IPsec in IPv6 environments Secure mobile IPv6 networksSecure transition mechanisms in use during the migration from IPv4 to IPv6Monitor IPv6 securityUnderstand the security implications of the IPv6 protocol, including issues related to ICMPv6 and the IPv6 header structureProtect your network against large-scale threats by using perimeter filtering techniques and service providerfocused security practicesUnderstand the vulnerabilities that exist on IPv6 access networks and learn solutions for mitigating each This security book is part of the Cisco Press Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks. Category: Networking: Security</p Shipping may be from multiple locations in the US or from the UK, depending on stock availability. Seller Inventory # 9781587055942

Contact seller

Buy New

£ 58.03
Convert currency
Shipping: £ 36.90
From U.S.A. to United Kingdom
Destination, rates & speeds

Quantity: 1 available

Add to basket

There are 2 more copies of this book

View all search results for this book