Implementing IPsec :
Material type: TextDescription: xvi, 271 pages : illustrationsISBN: 0471344672; 9780471344674Subject(s): IPSec (Computer network protocol) | Computer networks | Computer network protocolsDDC classification: 004.6/2 Review: "How do you secure your IP network without destroying it? The IPsec protocols are the only viable standard for secure, network-layer transmission on IP, yet they can wreak havoc on critical applications and other enhanced network services. Interoperability problems between vendors, as well as limitations in the basic technology, can cause problems that range from annoying to disastrous. This book tells you how IPsec works (or doesn't work) with other technologies, describes how to select products that will meet your needs, and discusses legal issues critical to IPsec deployment."--JacketItem type | Current library | Call number | Status | Date due | Barcode |
---|---|---|---|---|---|
Books | Gabriel Afolabi Ojo Central Library (Headquarters). | TK5105.567.K38 1999 (Browse shelf(Opens below)) | Available | 01187 |
Browsing Gabriel Afolabi Ojo Central Library (Headquarters). shelves Close shelf browser (Hides shelf browser)
No cover image available | No cover image available | |||||||
TK5105.5.A33 2009 APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGY | TK5105.5.A33 2009 APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGY | TK5105.5.S53 2019 A COURSE IN COMPUTER NETWORKS | TK5105.567.K38 1999 Implementing IPsec : | TK5105.59 Network security essentials : | TK5105.59.44 2020 NETWORK SECURITY AND CRYPTOGRAPHY | TK5105.59.F67 2008 CRYTOGRAPHY AND NETWORK SECURITY |
"How do you secure your IP network without destroying it? The IPsec protocols are the only viable standard for secure, network-layer transmission on IP, yet they can wreak havoc on critical applications and other enhanced network services. Interoperability problems between vendors, as well as limitations in the basic technology, can cause problems that range from annoying to disastrous. This book tells you how IPsec works (or doesn't work) with other technologies, describes how to select products that will meet your needs, and discusses legal issues critical to IPsec deployment."--Jacket
There are no comments on this title.