PLEASE PROVIDE COURSE INFORMATION
PLEASE PROVIDE
"synopsis" may belong to another edition of this title.
In explaining an aspect of IP security, Black typically opens with a statement of what the protocol or technology at hand is good for, examining how it fits with other elements of IP security and citing relevant standards documents. From there, he moves on to how the technology works, typically with the help of conceptual schematics and packet diagrams. Special features get focused discussion, and you will usually find a couple of annotated diagram sequences to help clarify what happens in specific applications of the technology. There are some very fine explanations of such widely applicable techniques as public-key cryptography and certification authorities too. Read this book for its conceptual clarity; back it up with another security text that addresses the administration-level specifics of your operating environment. --David Wall
Implement end-to-end and gateway security for IP networks.
Internet Security Protocols: Protecting IP Traffic is a complete networking professional's guide to providing end-to-end and gateway Internet security for the user's information. World-renowned consultant Uyless Black covers the essential Internet security protocols designed to protect IP traffic. The book's coverage includes:
From the basics of firewalls to the latest public key distribution systems, Uyless Black reviews the alternatives for securing Internet traffic. If you're responsible for securing information traveling on IP networks, Internet Security Protocols is a fine source for the authoritative answers you're looking for.
"About this title" may belong to another edition of this title.
Shipping:
FREE
Within U.S.A.
Book Description Condition: Very Good. Used book that is in excellent condition. May show signs of wear or have minor defects. Seller Inventory # 12384960-6
Book Description Condition: Good. Former library book; may include library markings. Used book that is in clean, average condition without any missing pages. Seller Inventory # GRP97688347
Book Description Condition: Good. Good condition. A copy that has been read but remains intact. May contain markings such as bookplates, stamps, limited notes and highlighting, or a few light stains. Bundled media such as CDs, DVDs, floppy disks or access codes may not be included. Seller Inventory # A13A-02718
Book Description Hardback. Condition: Very Good. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged. Seller Inventory # GOR005366168
Book Description Condition: Good. Your purchase helps support Sri Lankan Children's Charity 'The Rainbow Centre'. Ex-library, so some stamps and wear, but in good overall condition. Our donations to The Rainbow Centre have helped provide an education and a safe haven to hundreds of children who live in appalling conditions. Seller Inventory # Z1-F-005-01981
Book Description Hard Cover. Condition: Fine. Appears unread. No marks or inscriptions. No creasing to covers or to spine. A very clean very tight copy with bright unmarked boards and no bumping to corners. 286pp. A networking professional's guide to implementing end-to-end and gateway security for IP newtorks. We do not use stock photos, the picture displayed is of the actual book for sale. Every one of our books is in stock in the UK ready for immediate delivery. Size: 9.5 x 7.25 inches. Seller Inventory # 025794
Book Description Hardcover. Condition: Very Good. Very Good. book. Seller Inventory # D7S9-1-M-0130142492-4