Vendeur : Books Puddle, New York, NY, Etats-Unis
EUR 22,07
Autre deviseQuantité disponible : 4 disponible(s)
Ajouter au panierEtat : New. pp. xviii + 223.
Vendeur : Majestic Books, Hounslow, Royaume-Uni
EUR 20,45
Autre deviseQuantité disponible : 4 disponible(s)
Ajouter au panierEtat : New. pp. xviii + 223 49 Illus.
Vendeur : Biblios, Frankfurt am main, HESSE, Allemagne
EUR 22,63
Autre deviseQuantité disponible : 4 disponible(s)
Ajouter au panierEtat : New. pp. xviii + 223.
Vendeur : Romtrade Corp., STERLING HEIGHTS, MI, Etats-Unis
EUR 45,27
Autre deviseQuantité disponible : 5 disponible(s)
Ajouter au panierEtat : New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide.
Vendeur : Mispah books, Redhill, SURRE, Royaume-Uni
EUR 68,03
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierHardcover. Etat : Like New. Like NewLIKE NEW. book.
Vendeur : Romtrade Corp., STERLING HEIGHTS, MI, Etats-Unis
EUR 103,15
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierEtat : New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide.
Edité par Springer US, Springer New York Jul 2007, 2007
ISBN 10 : 038732724X ISBN 13 : 9780387327242
Langue: anglais
Vendeur : buchversandmimpf2000, Emtmannsberg, BAYE, Allemagne
EUR 106,99
Autre deviseQuantité disponible : 2 disponible(s)
Ajouter au panierBuch. Etat : Neu. Neuware -The open design of the Internet has not only opened many new opp- tunities for communications, but it has also opened many new avenues for attackers against organisations network and computing resources. This book is a critical investigation of the Internet Protocol Security (IPSec) based on combination of theoretical investigation and practical implementation, which provides an in-depth understanding of the IPSec framework. The bene ts of IPSec were exploited while the delimiting factors cannot be ignored. Infor- tion security has become a major concern in recent times as more and more computers are being connected to the global Internet. With so much data tra- ferring over public networks, the risk of sensitive information has increased exponentially and the increase of Internet hosts continuously requires ad- tional security support. The IPSec may be used in three different security - mains: Virtual private networks, Application-level security, and Routing se- rity. It comprises of suite of protocols, which are developed to ensure that the integrity, con dentiality and authentication of data communications over an IP network. The IPSec is predominately used in virtual private networks (VPNs). But when used in application-level security or routing security, the IPSec is not a complete solution and must be coupled with other security measures to be effective. As with other security systems, poor maintenance can easily lead to a critical system failure.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 248 pp. Englisch.
Edité par Springer US, Springer New York, 2007
ISBN 10 : 038732724X ISBN 13 : 9780387327242
Langue: anglais
Vendeur : AHA-BUCH GmbH, Einbeck, Allemagne
EUR 111,53
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierBuch. Etat : Neu. Druck auf Anfrage Neuware - Printed after ordering - The open design of the Internet has not only opened many new opp- tunities for communications, but it has also opened many new avenues for attackers against organisations network and computing resources. This book is a critical investigation of the Internet Protocol Security (IPSec) based on combination of theoretical investigation and practical implementation, which provides an in-depth understanding of the IPSec framework. The bene ts of IPSec were exploited while the delimiting factors cannot be ignored. Infor- tion security has become a major concern in recent times as more and more computers are being connected to the global Internet. With so much data tra- ferring over public networks, the risk of sensitive information has increased exponentially and the increase of Internet hosts continuously requires ad- tional security support. The IPSec may be used in three different security - mains: Virtual private networks, Application-level security, and Routing se- rity. It comprises of suite of protocols, which are developed to ensure that the integrity, con dentiality and authentication of data communications over an IP network. The IPSec is predominately used in virtual private networks (VPNs). But when used in application-level security or routing security, the IPSec is not a complete solution and must be coupled with other security measures to be effective. As with other security systems, poor maintenance can easily lead to a critical system failure.
Vendeur : Ria Christie Collections, Uxbridge, Royaume-Uni
EUR 157,48
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New. In.
EUR 152,32
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierTaschenbuch. Etat : Neu. Druck auf Anfrage Neuware - Printed after ordering - The open design of the Internet has not only opened many new opp- tunities for communications, but it has also opened many new avenues for attackers against organisations network and computing resources. This book is a critical investigation of the Internet Protocol Security (IPSec) based on combination of theoretical investigation and practical implementation, which provides an in-depth understanding of the IPSec framework. The bene ts of IPSec were exploited while the delimiting factors cannot be ignored. Infor- tion security has become a major concern in recent times as more and more computers are being connected to the global Internet. With so much data tra- ferring over public networks, the risk of sensitive information has increased exponentially and the increase of Internet hosts continuously requires ad- tional security support. The IPSec may be used in three different security - mains: Virtual private networks, Application-level security, and Routing se- rity. It comprises of suite of protocols, which are developed to ensure that the integrity, con dentiality and authentication of data communications over an IP network. The IPSec is predominately used in virtual private networks (VPNs). But when used in application-level security or routing security, the IPSec is not a complete solution and must be coupled with other security measures to be effective. As with other security systems, poor maintenance can easily lead to a critical system failure.
Vendeur : Lucky's Textbooks, Dallas, TX, Etats-Unis
EUR 145,84
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New.
EUR 214,36
Autre deviseQuantité disponible : 2 disponible(s)
Ajouter au panierPaperback. Etat : Brand New. 223 pages. 9.00x6.00x0.56 inches. In Stock.
Vendeur : Mispah books, Redhill, SURRE, Royaume-Uni
EUR 221,99
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierPaperback. Etat : Like New. Like New. book.
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
EUR 106,99
Autre deviseQuantité disponible : 2 disponible(s)
Ajouter au panierBuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Synchronizing Internet Protocol Security (SIPSec) focuses on the combination of theoretical investigation and practical implementation, which provides an in-depth understanding of the Internet Protocol Security (IPSec) framework. The standard internet protocol is completely unprotected, allowing hosts to inspect or modify data in transit. This volume identifies the security problems facing internet communication protocols along with the risks associated with internet connections. It also includes an investigative case study regarding the vulnerabilities that impair IPSec and proposes a SIPSec Model. 248 pp. Englisch.
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
EUR 139,09
Autre deviseQuantité disponible : 2 disponible(s)
Ajouter au panierTaschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Synchronizing Internet Protocol Security (SIPSec) focuses on the combination of theoretical investigation and practical implementation, which provides an in-depth understanding of the Internet Protocol Security (IPSec) framework. The standard internet protocol is completely unprotected, allowing hosts to inspect or modify data in transit. This volume identifies the security problems facing internet communication protocols along with the risks associated with internet connections. It also includes an investigative case study regarding the vulnerabilities that impair IPSec and proposes a SIPSec Model. 248 pp. Englisch.
Edité par Springer US, Springer New York Nov 2010, 2010
ISBN 10 : 1441940995 ISBN 13 : 9781441940995
Langue: anglais
Vendeur : buchversandmimpf2000, Emtmannsberg, BAYE, Allemagne
EUR 149,79
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierTaschenbuch. Etat : Neu. This item is printed on demand - Print on Demand Titel. Neuware -The open design of the Internet has not only opened many new opp- tunities for communications, but it has also opened many new avenues for attackers against organisations network and computing resources. This book is a critical investigation of the Internet Protocol Security (IPSec) based on combination of theoretical investigation and practical implementation, which provides an in-depth understanding of the IPSec framework. The bene ts of IPSec were exploited while the delimiting factors cannot be ignored. Infor- tion security has become a major concern in recent times as more and more computers are being connected to the global Internet. With so much data tra- ferring over public networks, the risk of sensitive information has increased exponentially and the increase of Internet hosts continuously requires ad- tional security support. The IPSec may be used in three different security - mains: Virtual private networks, Application-level security, and Routing se- rity. It comprises of suite of protocols, which are developed to ensure that the integrity, con dentiality and authentication of data communications over an IP network. The IPSec is predominately used in virtual private networks (VPNs). But when used in application-level security or routing security, the IPSec is not a complete solution and must be coupled with other security measures to be effective. As with other security systems, poor maintenance can easily lead to a critical system failure.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 248 pp. Englisch.