A networking professional's guide to providing end-to-end and gateway Internet security for the user's information. Covers the essential Internet security protocols designed to protect IP traffic. DLC: Computer networks--Security measures.
"synopsis" may belong to another edition of this title.
Secure transmission of data over public and semipublic Internet Protocol (IP) networks is essential to organizations that are geographically distributed. Such companies rely on the ability of road warriors to connect transparently to local area network (LAN) resources across the Internet via a virtual private network (VPN), and require fixed resources to be able to communicate securely and inexpensively. Respected networking author Uyless Black explains certain aspects of the state of the art in secure IP data communications in Internet Security Protocols: Protecting IP Traffic. For the most part, he endeavors to explain network-security concepts at a systems-engineering level, leaving the details of implementation of specific environments to more specialized books.
In explaining an aspect of IP security, Black typically opens with a statement of what the protocol or technology at hand is good for, examining how it fits with other elements of IP security and citing relevant standards documents. From there, he moves on to how the technology works, typically with the help of conceptual schematics and packet diagrams. Special features receive focused discussion, and usually you'll find a couple of annotated diagram sequences to help clarify what happens in specific applications of the technology. There also are fine explanations of such widely applicable techniques as public-key cryptography and certification authorities. Read this book for its conceptual clarity; back it up with another security text that addresses the administration-level specifics of your operating environment. --David Wall
Topics covered: Protocols and techniques for securing Internet Protocol (IP) data communications, including Point-to-Point Protocol (PPP) and several of its more secure variants, as well as dial-in security provided by Password Authentication Protocol (PAP), Challenge Handshake Authentication Protocol (CHAP), Remote Authentication Dial-In User Service (RADIUS), and Diameter. The IPSec specification is dissected; and there's coverage of Public Key Infrastructures (PKI), although not of Kerberos. Key exchange with Internet Key Exchange (IKE) and Internet Security Association and Key Management Protocol (ISAKMP) is discussed, too.
Preface
This book is one in a series of books called, "Advanced Communications Technologies." As the name of the book implies, the focus is on the Internet architecture and the principal protocols that make up this architecture. The book is an expansion of Advanced Features of the Internet, also part of this series.
The book has been written for this series to act as the introduction to the other more advanced Internet topics. As such, it is written for the person who is new to the Internet protocols, but it assumes the reader has had some experience in data communications.
I hope you find this book a valuable addition to your library.Acknowledgments
I have relied on examples from several organizations and individuals for some of my explanations. I would like to thank Buck Graham once again, who has written TCP/IP Addressing, published by AP Professional. It is the best book on the market on IP addressing and subnet addressing. I would also like to thank the authors of Fast Ethernet, Liam B. Quinn and Richard G. Russell (John Wiley & Sons, Inc), and Internet Routing Architectures, by Bassam Halabi, and published by Cisco Press. I cite these authors in the appropriate parts of the book.
I have relied on the Internet Request for Comments (RFCs), published by the Internet Society, and I thank this organization for making the RFCs available to the public.
For all the Internet standards and draft standards the following applies:
Copyright (c) The Internet Society (1998). All Rights Reserved.
This document and translations of it may be copied and furnished to others, and derivative works that comment on or otherwise explain itor assist in its implementation may be prepared, copied, published and distributed, in whole or in part, without restriction of any kind, provided that the above copyright notice and this paragraph are included on all such copies and derivative works. However, this document itself may not be modified in any way, such as by removing the copyright notice or references to the Internet Society or other Internet organizations, except as needed for the purpose of developing Internet standards in which case the procedures for copyrights defined in the Internet Standards process must be followed, or as required to translate it into languages other than English.
The limited permissions granted above are perpetual and will not be revoked by the Internet Society or its successors or assigns.
"About this title" may belong to another edition of this title.
FREE shipping within U.S.A.
Destination, rates & speedsSeller: Wonder Book, Frederick, MD, U.S.A.
Condition: Good. Good condition. A copy that has been read but remains intact. May contain markings such as bookplates, stamps, limited notes and highlighting, or a few light stains. Bundled media such as CDs, DVDs, floppy disks or access codes may not be included. Seller Inventory # A13A-02718
Quantity: 1 available
Seller: Better World Books: West, Reno, NV, U.S.A.
Condition: Very Good. Former library book; may include library markings. Used book that is in excellent condition. May show signs of wear or have minor defects. Seller Inventory # GRP98925010
Quantity: 1 available
Seller: Better World Books, Mishawaka, IN, U.S.A.
Condition: Very Good. Used book that is in excellent condition. May show signs of wear or have minor defects. Seller Inventory # 12384960-6
Quantity: 1 available
Seller: ThriftBooks-Dallas, Dallas, TX, U.S.A.
Hardcover. Condition: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 1.8. Seller Inventory # G0130142492I4N00
Quantity: 1 available
Seller: ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.
Hardcover. Condition: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 1.8. Seller Inventory # G0130142492I4N00
Quantity: 1 available
Seller: Goodwill of Silicon Valley, SAN JOSE, CA, U.S.A.
Condition: good. Supports Goodwill of Silicon Valley job training programs. The cover and pages are in Good condition! Any other included accessories are also in Good condition showing use. Use can include some highlighting and writing, page and cover creases as well as other types visible wear. Seller Inventory # GWSVV.0130142492.G
Quantity: 1 available
Seller: Phatpocket Limited, Waltham Abbey, HERTS, United Kingdom
Condition: Good. Your purchase helps support Sri Lankan Children's Charity 'The Rainbow Centre'. Ex-library, so some stamps and wear, but in good overall condition. Our donations to The Rainbow Centre have helped provide an education and a safe haven to hundreds of children who live in appalling conditions. Seller Inventory # Z1-F-005-01981
Quantity: 1 available
Seller: Godley Books, Hyde, United Kingdom
Hard Cover. Condition: Fine. Appears unread. No marks or inscriptions. No creasing to covers or to spine. A very clean very tight copy with bright unmarked boards and no bumping to corners. 286pp. A networking professional's guide to implementing end-to-end and gateway security for IP newtorks. We do not use stock photos, the picture displayed is of the actual book for sale. Every one of our books is in stock in the UK ready for immediate delivery. Size: 9.5 x 7.25 inches. Seller Inventory # 025794
Quantity: 1 available
Seller: dsmbooks, Liverpool, United Kingdom
Hardcover. Condition: Very Good. Very Good. book. Seller Inventory # D7S9-1-M-0130142492-4
Quantity: 1 available