From the Publisher: Now that the Internet has blossomed into the "Information Superhighway" with its traffic and drivers becoming increasingly diverse, security has emerged as a primary concern. This innovative, new book offers you a global, integrated approach to providing Internet Security at the network layer. You get a detailed presentation of the revolutionary IPsec technology used today to create Virtual Private Networks and, in the near future, to protect the infrastructure of the Internet itself. The book addresses IPsec's major aspects and components to help you evaluate and compare features of different implementations. It gives you a detailed understanding of this cutting-edge technology from the inside, which enables you to more effectively troubleshoot problems with specific products. Based on standards documents, discussion list archives, and practitioners' lore, this one-of-a-kind resource collects all the current knowledge of IPsec and describes it in a literate, clear manner.
Cited By
- Shen M, Ye K, Liu X, Zhu L, Kang J, Yu S, Li Q and Xu K (2023). Machine Learning-Powered Encrypted Network Traffic Analysis: A Comprehensive Survey, IEEE Communications Surveys & Tutorials, 25:1, (791-824), Online publication date: 1-Jan-2023.
- Rossberg M and Schaefer G (2011). A survey on automatic configuration of virtual private networks, Computer Networks: The International Journal of Computer and Telecommunications Networking, 55:8, (1684-1699), Online publication date: 1-Jun-2011.
- Eyermann F, Racz P, Stiller B, Schaefer C and Walter T Generic accounting configuration management for heterogeneous mobile networks Proceedings of the 3rd ACM international workshop on Wireless mobile applications and services on WLAN hotspots, (46-55)
- Housley R and Arbaugh W (2003). Security problems in 802.11-based networks, Communications of the ACM, 46:5, (31-34), Online publication date: 1-May-2003.