Skip to content
You are not logged in |Login  
     
Limit search to available items
Record 5 of 16
Record:   Prev Next
Resources
More Information
Bestseller
BestsellerE-book
Author Frankel, Sheila.

Title Demystifying the IPsec puzzle / Sheila Frankel.

Publication Info. Boston, MA : Artech House, 2001.

Item Status

Description 1 online resource (273 pages) : illustrations.
Physical Medium polychrome
Description text file
Series Artech House computer security series
Artech House computer security series.
Bibliography Includes bibliographical references and index.
Contents ""Contents vii""; ""Preface xvii""; ""1 Introduction 1""; ""1.1 The TCP/IP Protocol Stack 5""; ""1.2 Introducing IPsec 12""; ""1.3 Summary 13""; ""1.4 Further Reading 14""; ""References 14""; ""2 The First Puzzle Piece: The Authentication Header 15""; ""2.1 Protections Provided by AH 15""; ""2.2 Security Associations and the Security Parameters Index 16""; ""2.3 AH Format 19""; ""2.4 AH Location 20""; ""2.5 AH Modes 21""; ""2.6 Nested Headers 22""; ""2.7 Implementing IPsec Header Processing 23""; ""2.8 AH Processing for Outbound Messages 25""
""2.9 AH Processing for Inbound Messages 30""""2.10 Complications 32""; ""2.11 Auditing 35""; ""2.12 Threat Mitigation 37""; ""2.13 Summary 37""; ""2.14 Further Reading 38""; ""References 38""; ""3 The Second Puzzle Piece: The Encapsulating Security Payload 41""; ""3.1 Protections Provided by ESP 41""; ""3.2 Security Associations and the Security Parameters Index 42""; ""3.3 ESP Header Format 43""; ""3.4 ESP Header Location and Modes 45""; ""3.5 Nested and Adjacent Headers 46""; ""3.6 ESP Header Processing for Outbound Messages 48""
""3.7 ESP Header Processing for Inbound Messages 49""""3.8 Complications 52""; ""3.9 Criticisms and Counterclaims 52""; ""3.10 Threat Mitigation 54""; ""3.11 Why Two Security Headers? 55""; ""3.12 Summary 56""; ""3.13 Further Reading 56""; ""References 57""; ""4 The Third Puzzle Piece: The Cryptographic Algorithms 59""; ""4.1 Underlying Principles 60""; ""4.2 Authentication Algorithms 62""; ""4.3 The ESP Header Encryption Algorithms 68""; ""4.4 Complications 78""; ""4.5 Public Key Cryptography 79""; ""4.6 Conclusion 82""; ""4.7 Further Reading 82""
""5.14 Lifetimes 101""""5.15 Vendor IDs 101""; ""5.16 The Phase 1 Negotiation 101""; ""5.17 The Phase 2 Negotiation 112""; ""5.18 New Group Mode 117""; ""5.19 Informational Exchanges 118""; ""5.20 The ISAKMP Header 119""; ""5.21 The Generic Payload Header 120""; ""5.22 The IKE State Machine 121""; ""5.23 The Origins of IKE 122""; ""5.24 An Example 122""; ""5.25 Criticisms and Counterclaims 123""; ""5.26 Threat Mitigation 125""; ""5.27 Summary 125""; ""5.28 Further Reading 126""; ""References 127""; ""6 The Fifth Puzzle Piece: IKE and the Road Warrior 129""
Local Note eBooks on EBSCOhost EBSCO eBook Subscription Academic Collection - North America
Subject IPSec (Computer network protocol)
IPSec (Computer network protocol)
Genre/Form Electronic books.
Other Form: Print version: Frankel, Sheila. Demystifying the IPsec puzzle. Boston, MA : Artech House, 2001 1580530796 (DLC) 2001018807
ISBN 158053399X (electronic book)
9781580533997 (electronic book)
1580530796