Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Internet Security Protocols: Protecting IP Traffic

Internet Security Protocols: Protecting IP Traffic

List Price: $44.99
Your Price:
Product Info Reviews

Description:

Secure transmission of data over public and semipublic Internet Protocol (IP) networks is essential to organizations that are geographically distributed. Such companies rely on the ability of road warriors to connect transparently to local area network (LAN) resources across the Internet via a virtual private network (VPN), and require fixed resources to be able to communicate securely and inexpensively. Respected networking author Uyless Black explains certain aspects of the state of the art in secure IP data communications in Internet Security Protocols: Protecting IP Traffic. For the most part, he endeavors to explain network-security concepts at a systems-engineering level, leaving the details of implementation of specific environments to more specialized books.

In explaining an aspect of IP security, Black typically opens with a statement of what the protocol or technology at hand is good for, examining how it fits with other elements of IP security and citing relevant standards documents. From there, he moves on to how the technology works, typically with the help of conceptual schematics and packet diagrams. Special features receive focused discussion, and usually you'll find a couple of annotated diagram sequences to help clarify what happens in specific applications of the technology. There also are fine explanations of such widely applicable techniques as public-key cryptography and certification authorities. Read this book for its conceptual clarity; back it up with another security text that addresses the administration-level specifics of your operating environment. --David Wall

Topics covered: Protocols and techniques for securing Internet Protocol (IP) data communications, including Point-to-Point Protocol (PPP) and several of its more secure variants, as well as dial-in security provided by Password Authentication Protocol (PAP), Challenge Handshake Authentication Protocol (CHAP), Remote Authentication Dial-In User Service (RADIUS), and Diameter. The IPSec specification is dissected; and there's coverage of Public Key Infrastructures (PKI), although not of Kerberos. Key exchange with Internet Key Exchange (IKE) and Internet Security Association and Key Management Protocol (ISAKMP) is discussed, too.

© 2004, ReviewFocus or its affiliates