|
|
|
|
LEADER |
02195nam a2200289 a 4500 |
001 |
2053186 |
005 |
20171112000057.0 |
008 |
020503s2001 maua ob 001 0 eng d |
020 |
|
|
|a 158053399X
|q (electronic bk.)
|
020 |
|
|
|a 9781580533997
|q (electronic bk.)
|z 1580530796
|
040 |
|
|
|a N$T
|b eng
|e pn
|
050 |
|
4 |
|a TK5105.567
|b .F73 2001eb
|
100 |
1 |
4 |
|a Frankel, Sheila.
|
245 |
1 |
0 |
|a Demystifying the IPsec puzzle /
|c Sheila Frankel.
|
260 |
1 |
0 |
|a Boston, MA :
|b Artech House,
|c 2001.
|
300 |
1 |
0 |
|a 1 online resource (273 pages) :
|b illustrations.
|
490 |
1 |
0 |
|a Artech House computer security series
|
504 |
1 |
0 |
|a Includes bibliographical references and index.
|
505 |
8 |
0 |
|a ""3.7 ESP Header Processing for Inbound Messages 49""""3.8 Complications 52""; ""3.9 Criticisms and Counterclaims 52""; ""3.10 Threat Mitigation 54""; ""3.11 Why Two Security Headers? 55""; ""3.12 Summary 56""; ""3.13 Further Reading 56""; ""References 57""; ""4 The Third Puzzle Piece: The Cryptographic Algorithms 59""; ""4.1 Underlying Principles 60""; ""4.2 Authentication Algorithms 62""; ""4.3 The ESP Header Encryption Algorithms 68""; ""4.4 Complications 78""; ""4.5 Public Key Cryptography 79""; ""4.6 Conclusion 82""; ""4.7 Further Reading 82""
|
505 |
8 |
0 |
|a ""5.14 Lifetimes 101""""5.15 Vendor IDs 101""; ""5.16 The Phase 1 Negotiation 101""; ""5.17 The Phase 2 Negotiation 112""; ""5.18 New Group Mode 117""; ""5.19 Informational Exchanges 118""; ""5.20 The ISAKMP Header 119""; ""5.21 The Generic Payload Header 120""; ""5.22 The IKE State Machine 121""; ""5.23 The Origins of IKE 122""; ""5.24 An Example 122""; ""5.25 Criticisms and Counterclaims 123""; ""5.26 Threat Mitigation 125""; ""5.27 Summary 125""; ""5.28 Further Reading 126""; ""References 127""; ""6 The Fifth Puzzle Piece: IKE and the Road Warrior 129""
|
650 |
8 |
0 |
|a IPSec (Computer network protocol)
|
650 |
8 |
4 |
|a Computer network protocols.
|
650 |
8 |
4 |
|a IPSec (Computer network protocol)
|
650 |
8 |
7 |
|a COMPUTERS
|x Networking
|x Network Protocols.
|
650 |
8 |
7 |
|a IPSec (Computer network protocol)
|
952 |
|
|
|a GR-KeIUL
|b 59cc2ac86c5ad13446fa2213
|c 998a
|d 945l
|e 004.62 FRA
|t 1
|x m
|z Books
|
952 |
|
|
|a CY-NiOUC
|b 5a04642a6c5ad14ac1eeabe4
|c 998a
|d 945l
|x m
|z Books
|