INTERNET SECURITY PROTOCOLS protecting IP traffic

-- Includes expert coverage of IPSec and VPN security. -- Covers each major security threat, including denial of service attacks. -- Up-to-the-minute coverage of using diffserv to assign different security levels to different types of traffic.This is a complete networking professional's guide t...

Full description

Saved in:
Bibliographic Details
Main Author: Black, Uyless (Author)
Format: Book
Language:English
Published: New Jersey Prentice Hall 2000
© 2000
Subjects:
Online Access:Click Here to View Status and Holdings.
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam#a2200000#i#4501
001 wils-257941
005 20209781254
008 201007 2000 -US a|| |0 |#eng#D
020 # # |a 0130142492  |q hardback 
040 # # |a UiTM  |e rda 
041 0 # |a eng 
090 0 0 |a TK5105.59  |b .B56 2000 
100 1 # |a Black, Uyless  |e author 
245 1 1 |a INTERNET SECURITY PROTOCOLS  |b protecting IP traffic  |c Uyless Black 
264 # 1 |a New Jersey  |b Prentice Hall  |c 2000 
264 # 1 |c © 2000 
300 # # |a xviii, 286 pages  |b illustrations  |c 24 cm 
336 # # |a text  |2 rdacontent 
337 # # |a unmediated  |2 rdamedia 
338 # # |a volume  |2 rdacarrier 
500 # # |a Includes index 
520 # # |a -- Includes expert coverage of IPSec and VPN security. -- Covers each major security threat, including denial of service attacks. -- Up-to-the-minute coverage of using diffserv to assign different security levels to different types of traffic.This is a complete networking professional's guide to providing end-to-end Internet security where it matters most: at the packet level. World-recognized networking consultant Uyless Black covers every essential Internet security protocol, and virtually every IP application, including data, voice, multicast, and video. Black begins by reviewing the key security risks associated with the Internet and Internet applications, including risks to privacy, secrecy, and confidentiality; risks to the integrity of information and accurate authentication; and the need for access control and non-repudiation of transactions. Understand the role of firewalls and security policies and procedures; then review each key Internet security protocol. Black covers dial-in authentication including RADIUS and DIAMETER; VPN IPSec security; the Internet Key Distribution, Certification, and Management system (ISAKMP); Internet Key Exchange; and more. The book includes detailed coverage of security in mobile networks, and explains how Diffserv can be used to establish different levels of security for different types of traffic. For all experienced networking and communications professionals. 
650 # 0 |a TC/IP (Computer network protocol) 
650 # 0 |a Computer networks  |x Security measures 
856 4 0 |z Click Here to View Status and Holdings.  |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=257941 
964 # # |c BOK  |d 01 
998 # # |a 00264#1a007.2||00264#1b007.2||01264#1a007.2||01264#1b007.2||00300##a007.2||00300##b007.2||00300##c007.2||00500##a007.2||00520##a007.2||00520##b007.2||