Internet and Intranet SecurityThis pioneering guide to Internet and Intranet security is the first to cover all of the relevant technologies in one comprehensive reference, and provides helpful tips in creating and deploying secure architectures. It shows how to improve productivity, develop proper access and control, and communicate securely on TCP/IP-based networks whether setting up commerce on line, assembling a firewall, or selecting access controls and cryptographic protocols to secure TCP/IP-based networks. |
Contents
Introduction | 5 |
TCPIP Networking | 15 |
Documentation Series | 22 |
Copyright | |
15 other sections not shown
Other editions - View all
Common terms and phrases
access control application gateway application protocols attacks bastion host bytes certificate client and server communications compression cookie corresponding cryptographic cryptosystem decrypt Diffie-Hellman key exchange digital signature distributed system dual-homed firewall electronic encryption example firewall firewall configuration handshake protocol header HMAC IETF implementations Internet Drafts Internet layer Internet standards intranet IP address IP packet IPSP IPv6 ISAKMP Kerberos key distribution key management protocol layer security protocol message authentication multicast network segment one-way hash function options overviewed packet filter packet filter rules parameters password payload Photuris port number private key proxy server public key cryptography refers Request for Comments router S-HTTP S/MIME screening router secret key security services sends sequence number session key shared secret SKEME SKIP SOCKS server specification TCP/IP TCP/IP connection Telnet traffic transport layer security UNIX