- Series: Rsa Press S
- Paperback: 432 pages
- Publisher: McGraw-Hill/OsborneMedia (April 6, 2001)
- Language: English
- ISBN-10: 0072127570
- ISBN-13: 978-0072127577
- Product Dimensions: 7.5 x 0.9 x 9.2 inches
- Shipping Weight: 1.6 pounds (View shipping rates and policies)
- Average Customer Review: 4 customer reviews
- Amazon Best Sellers Rank: #3,062,765 in Books (See Top 100 in Books)
To get the free app, enter your mobile phone number.
IPSec: Securing VPNs
Use the Amazon App to scan ISBNs and compare prices.
Frequently bought together
Customers who viewed this item also viewed
"IPSec will save people money and they will be able to feel safe sending highly sensitive documents over the Internet, instead of putting people on airplanes to hand-deliver diskettes." -- Tim Matthews, Vice President of RSA Security"
From the Inside Flap
Improve network security using this comprehensive RSA Security-endorsed guidebook
Implement IPSec across a virtual private network and you'll ensure the highest level of network security available. This authoritative book explains IP security protocols, ways to implement these protocols and VPN interoperability. Written in conjunction with and fully endorsed by the experts at RSA Security, this book offers comprehensive coverage of the technological components of IPSec and its underlying architecture. It also includes a case study detailing the configuration of a VPN client and security gateway with PKI components. For safeguarding your system and improving security across your network, this is the most definitive guide to IPSec. This book will show you how to: * Understand the technological components of IPSec * Get details on symmetric-key cryptographic algorithms-including AES and the other 4 AES finalists, CAST, Blowfish, IDEA, RC2, RC5, and Skipjack * Assess the relative strength and speed of cryptographic algorithms * Get details on elliptic curve cryptography, digital signature standard, Diffie-Hellman key exchange, hash functions and message authentication code * Learn the differences between private and symmetric-key cryptosystems * Understand PKI infrastructure and the managed certificate protocol * Gain insight into Security Association (SA) and key management * Implement VPN solutions in a variety of scenarios
Top customer reviews
Secondly, the first third of the book is dedicated to TPC and cryptography subjects. This is useful if you are getting a first overview to this subject but for me, further PKI or IPSec chapters would have been more useful. Not that I am promoting them, but I'd suggest one of Schneier's well-known books for an indepth look at cryptography.
Thirdly, I find that the book was not well edited and has numerous mistakes in it. This made it slightly difficult (although, more bothersome than difficult) to read. For example, I also found that Figure 10-18 is wrong and incomplete. This lack of proofing makes me question the validity of claims that were made throughout the book, especially the claim of how long a given length key (for example 1024 or 2048 bits) will be secure for. I am not saying that his claims are false, but I wonder if they were made with the same haste as the final proofing of the book was.
I enjoyed the final chapter, which presented a VPN solution, because it gave me an idea of the steps that are required for deployment. Note that although this doesn't degrade the value to me of this chapter, the 3 components he used in his deployment example are all products of Network Associates Inc, his employer.
There are many RFCs, but if you are not familiar on RFCs.
IF you are not specialist of security, you may read almost all of them.
At 2.4.6 Performance Comparison of the AES Finalists, It introduced the URL [...]
But on the URL, there are a warning "Archive info: This page is provided for historical purposes. It is no longer maintained and may contain errors or inaccuracies."
This book is only the guide for starting to study security technologies.