Image from Google Jackets

Synchronizing Internet Protocol Security (SIPSec) [recurso electrónico] / by Charles A. Shoniregun.

Por: Colaborador(es): Tipo de material: TextoTextoSeries Advances in Information Security ; 34Editor: Boston, MA : Springer US, 2007Descripción: online resourceTipo de contenido:
  • text
Tipo de medio:
  • computer
Tipo de soporte:
  • recurso en línea
ISBN:
  • 9780387685694
  • 99780387685694
Tema(s): Formatos físicos adicionales: Printed edition:: Sin títuloClasificación CDD:
  • 005.7 23
Recursos en línea:
Contenidos:
Research Overview and Conceptual Understanding of Internet Protocol Security (IPSEC) -- Internet communication Protocols -- Internet Protocol Versions 4 (IPV4) and 6 (IPV6) -- Implementations and Limitations of the IPSEC -- Synchronising Internet Protocol Security (SIPSEC) Model -- Discussion -- Conclusion.
En: Springer eBooksResumen: The open design of the internet has not only opened many new opportunities for communications, but it has also opened many new avenues for attackers against organizations network and computing resources. Information security has become a major concern in recent times, as more and more computers are being connected to the global internet. With so much data transferring over the public networks, the risk for sensitive information has increased exponentially, while the increase of internet hosts continually requires additional function support. Synchronizing Internet Protocol Security (SIPSec) focuses on the combination of theoretical investigation and practical implementation, which provides an in-depth understanding of the Internet Protocol Security (IPSec) framework. The standard internet protocol is completely unprotected, allowing hosts to inspect or modify data in transit. This book also identifies the security problems facing the internet communication protocols, the risks associated with internet connections, delimitations of the IPSec, and finally, a "Synchronisation of Internet Protocol Security (SIPSec)" model. Synchronizing Internet Protocol Security is designed for a professional audience composed of researchers and practitioners in industry. This book is also suitable for graduate-level students in computer science.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode
Libros electrónicos Libros electrónicos CICY Libro electrónico Libro electrónico 005.7 (Browse shelf(Opens below)) Available

Research Overview and Conceptual Understanding of Internet Protocol Security (IPSEC) -- Internet communication Protocols -- Internet Protocol Versions 4 (IPV4) and 6 (IPV6) -- Implementations and Limitations of the IPSEC -- Synchronising Internet Protocol Security (SIPSEC) Model -- Discussion -- Conclusion.

The open design of the internet has not only opened many new opportunities for communications, but it has also opened many new avenues for attackers against organizations network and computing resources. Information security has become a major concern in recent times, as more and more computers are being connected to the global internet. With so much data transferring over the public networks, the risk for sensitive information has increased exponentially, while the increase of internet hosts continually requires additional function support. Synchronizing Internet Protocol Security (SIPSec) focuses on the combination of theoretical investigation and practical implementation, which provides an in-depth understanding of the Internet Protocol Security (IPSec) framework. The standard internet protocol is completely unprotected, allowing hosts to inspect or modify data in transit. This book also identifies the security problems facing the internet communication protocols, the risks associated with internet connections, delimitations of the IPSec, and finally, a "Synchronisation of Internet Protocol Security (SIPSec)" model. Synchronizing Internet Protocol Security is designed for a professional audience composed of researchers and practitioners in industry. This book is also suitable for graduate-level students in computer science.

There are no comments on this title.

to post a comment.