Fishpond Gift Vouchers - Let them choose!

Shop over a million Toys in our Huge New Range

A Technical Guide to Ipsec Virtual Private Networks
By

Rating
What is IPSec? What's a VPN? Why do the need each other? Virtual Private Network (VPN) has become one of the most recognized terms in our industry, yet there continuously seems to be different impressions of what VPNs really are and can become. A Technical Guide to IPSec Virtual Private Networks provides a single point of information that represents hundreds or resources and years of experience with IPSec VPN solutions. It cuts through the complexity surrounding IPSec and the idiosyncrasies of design, implementation, operations, and security.Starting with a primer on the IP protocol suite, the book travels layer by layer through the protocols and the technologies that make VPNs possible. It includes security theory, cryptography, RAS, authentication, IKE, IPSec, encapsulation, keys, and policies. After explaining the technologies and their interrelationships, the book provides sections on implementation and product evaluation. A Technical Guide to IPSec Virtual Private Networks arms information security, network, and system engineers and administrators with the knowledge and the methodologies to design and deploy VPNs in the real world for real companies.
Product Details

Table of Contents

Introduction Know the Terrain The Internet TCP/IP Quickie Information Age Security Concepts Cryptography The Other Guys Why are "VPNs" So HOT? IP Security Primer History Structure Applications Quality of Service Policy Encryption Symmetrical Encryption Asymmetrical Encryption Message Authentication Code Perfect Forward Secrecy Diffie-Hellman IPSEC Architecture Domain of Interpretation Security Associations Transport Mode Tunnel Mode Authentication Shared Secret Certificates Public Key Cryptography Non-IPSec Authentication Security Protocols Encapsulating Security Payload Authentication Header Key Management The Roll of Key Management Creating IKE for IPSec Phase One Phase Two Implementation Considerations Network to Network Client to Network Client Interaction Rollout Concepts Product Evaluation Business Drivers Grading Methodology Lab Testing Pilot Processes Trend Analysis

Look for similar items by category
Home » Books » Computers » Networking » General
Home » Books » Computers » Networking » Security
People also searched for
How Fishpond Works
Fishpond works with suppliers all over the world to bring you a huge selection of products, really great prices, and delivery included on over 25 million products that we sell. We do our best every day to make Fishpond an awesome place for customers to shop and get what they want — all at the best prices online.
Webmasters, Bloggers & Website Owners
You can earn a 5% commission by selling A Technical Guide to Ipsec Virtual Private Networks on your website. It's easy to get started - we will give you example code. After you're set-up, your website can earn you money while you work, play or even sleep! You should start right now!
Authors / Publishers
Are you the Author or Publisher of a book? Or the manufacturer of one of the millions of products that we sell. You can improve sales and grow your revenue by submitting additional information on this title. The better the information we have about a product, the more we will sell!
Item ships from and is sold by Fishpond World Ltd.
Back to top