5
1
Paperback
$49.00
-
PICK UP IN STORECheck Availability at Nearby Stores
Available within 2 business hours
Related collections and offers
49.0
In Stock
Overview
A comprehensive introduction to VPNs and networking basics, this book provides readers with a solid foundation of networking basics and the understanding necessary for learning the complexities of the VPN technology that follows. It takes the reader through the actual steps involved in provisioning the hardware, software and set-up with the provider of services for Internet access and communications carriers, thus leading to a comprehensive understanding of all VPN protocols. There is also detailed information about securing VPNs, including information on intrusion detection. Readers gain an understanding of security, encryption, encapsulation, key management and intrusion detection systems, all necessary for a secure network. Networking blueprints for 4 different types of VPNs, including IPSec and PPPT are also included.
Product Details
ISBN-13: | 9780072191813 |
---|---|
Publisher: | McGraw-Hill/Osborne Media |
Publication date: | 12/14/2001 |
Series: | Network Professional's Library |
Pages: | 592 |
Product dimensions: | 7.34(w) x 9.36(h) x 1.30(d) |
Table of Contents
Acknowledgments | xvii | |
Introduction | xix | |
Part I | Networks and Security | |
1 | Layering Architecture and the OSI Model | 3 |
Layering Principles | 4 | |
Open Systems Interconnection (OSI) Model | 4 | |
Peer Communications and Encapsulation | 8 | |
Layer Interactions | 10 | |
Summary | 19 | |
2 | Network Architectures | 21 |
Networks and Network Topologies | 22 | |
Local Area Networks (LANs) | 25 | |
Wide Area Networks (WANs) | 46 | |
3 | The TCP/IP Protocol Stack | 73 |
The DOD Reference Model Layers | 75 | |
Protocol Descriptions | 77 | |
TCP/IP Application Layer Protocols | 99 | |
4 | Security | 105 |
What Is Security? | 106 | |
Information Security Domains | 108 | |
General Security Considerations | 111 | |
Planning Your Security Approach | 113 | |
Components of a Sound Security Architecture | 117 | |
The Five Security Characteristics of Information | 118 | |
The Three States of Information | 127 | |
5 | Threats and Attack Methods | 129 |
Packet Sniffing | 130 | |
Spoofing and Denial of Service Threats | 134 | |
Spoofing | 135 | |
Denial of Service | 151 | |
Password Attacks | 154 | |
Application Layer Attacks | 154 | |
Summary | 157 | |
6 | Intrusion Detection Systems | 159 |
Why Is Intrusion Detection Necessary? | 160 | |
What Are Intrusion Detection Systems? | 161 | |
IDS Detection Methods | 164 | |
Assessment Architectures | 165 | |
How to Know When You Have Been Attacked | 172 | |
Honey Pots | 176 | |
7 | Firewalls | 179 |
What Is a Firewall? | 180 | |
Types of Firewalls | 182 | |
Firewall Architectures | 198 | |
Part II | Virtual Private Networks | |
8 | VPN Basics | 207 |
What Is a VPN? | 208 | |
Internets, Intranets, and Extranets | 210 | |
History of VPNs | 213 | |
What Is Tunneling? | 217 | |
Tunneling Protocols | 217 | |
A Tunnel from the Past | 219 | |
Tunnel Types | 220 | |
Summary | 222 | |
9 | VPN Architectures | 223 |
VPN Components and General Requirements | 224 | |
VPN Architectures | 226 | |
Types of VPNs | 234 | |
Summary | 238 | |
Part III | VPN Protocols | |
10 | Tunneling Protocols | 241 |
Generic Routing Encapsulation (GRE) | 242 | |
Point-to-Point Tunneling Protocol (PPTP) | 249 | |
Summary | 259 | |
11 | L2F and L2TP | 261 |
Access VPNs or VPDNs | 262 | |
Layer 2 Forwarding (L2F) PROTOCOL | 263 | |
Layer 2 Tunneling Protocol (L2TP) | 273 | |
Summary | 296 | |
Part IV | Secure Communication | |
12 | Cryptography | 299 |
Cryptography | 300 | |
Steganography | 305 | |
Cryptographic Algorithm Methods | 307 | |
Cryptanalysis | 309 | |
Future Cryptographic Methods | 311 | |
Summary | 312 | |
13 | Cryptographic Algorithms | 313 |
Hash Algorithms | 314 | |
Private-Key (Symmetric) Algorithms | 316 | |
Public-Key (Asymmetric) Algorithms | 319 | |
Summary | 326 | |
14 | Certificates | 327 |
Digital Signatures | 329 | |
Certificates | 334 | |
Digital Signatures, Certificates, and Public Key Infrastructure (PKI) | 343 | |
Summary | 346 | |
15 | Authentication | 347 |
Human Identification | 348 | |
Entity Authentication | 350 | |
Authentication Protocols | 351 | |
Terminal Access Controller Access Control System (TACACS), XTACACS, and TACACS+ | 364 | |
Summary | 372 | |
Part V | IPSec | |
16 | IPSec Components | 375 |
IPSec Background | 376 | |
IPSec Components and Concept Overview | 380 | |
The Authentication Header (AH) Protocol | 385 | |
The Encapsulating Security Payload (ESP) Protocol | 390 | |
Why Two Authentication Protocols? | 394 | |
Security Associations and Policies | 395 | |
Security Databases | 399 | |
Summary | 402 | |
17 | Key Management | 403 |
Key Management Concepts and Overview | 404 | |
Perfect Forward Secrecy (PFS) | 406 | |
Diffie-Hellman | 407 | |
The Pseudo-Random Function | 408 | |
Domain of Interpretation (DOI) | 408 | |
Internet Security Association and Key Management Protocol (ISAKMP) | 408 | |
IPSec IKE | 410 | |
Summary | 416 | |
18 | Key Management/Exchange Protocols | 417 |
In-Band and Out-of-Band Key Exchanges | 418 | |
Diffie-Hellman Key Exchange | 419 | |
Simple Key-Management for Internet Protocols (SKIP) | 420 | |
Photuris | 421 | |
SKEME | 422 | |
Oakley | 423 | |
ISAKMP | 424 | |
The Internet Key Exchange (IKE) or ISAKMP/Oakley | 441 | |
Negotiating Multiple Security Associations | 459 | |
Using ISAKMP/Oakley with Remote Access | 460 | |
Summary | 461 | |
19 | IPSec Architecture and Implementation | 463 |
IPSec Architecture and Implementation | 464 | |
Managing the Security Associations | 473 | |
Security Association Databases | 479 | |
Summary | 486 | |
Part VI | MPLS | |
20 | Quality of Service (QoS) | 491 |
Basic Terms | 492 | |
What is Quality of Service (QoS)? | 494 | |
Why do we need QoS? | 495 | |
The QoS Framework | 509 | |
QoS Protocols | 510 | |
Traffic Engineering | 520 | |
Summary | 522 | |
21 | Traffic Engineering--Movement of Data | 523 |
Routing to Switching to Routing? | 524 | |
Traffic Engineering 101 | 526 | |
Summary | 534 | |
22 | MPLS Background | 535 |
What Is MPLS? | 536 | |
Why Do We Need MPLS? | 537 | |
History Behind MPLS | 539 | |
Summary | 545 | |
23 | MPLS Components and Concepts | 547 |
MPLS Components and Concepts | 548 | |
Distribution of Label Information | 556 | |
MPLS Virtual Private Networks (MPLS VPNs) | 561 | |
Summary | 565 | |
Index | 567 |
From the B&N Reads Blog
Page 1 of