Securing Communication of Legacy Applications with IPSec: Step-by-Step Guide to Protecting “Data in Transit” without Changes in Your Existing Software Securing Communication of Legacy Applications with IPSec: Step-by-Step Guide to Protecting “Data in Transit” without Changes in Your Existing Software

Securing Communication of Legacy Applications with IPSec: Step-by-Step Guide to Protecting “Data in Transit” without Changes in Your Existing Software

Step-By-Step Guide to Protecting “Data In Transit” Without Changes In Your Existing Software

    • ‏4٫99 US$
    • ‏4٫99 US$

وصف الناشر

Booklet for IT professionals, developers and security specialists on how to utilize IPSec protocol in order to protect data transmission between legacy applications which were created before secure communication became common practice. In many cases it is difficult or even impossible to make necessary changes in old software in order to implement commonly accepted secure protocols such as SSL/TLS. IPSec protocol can be utilized as inexpensive but powerful alternative solution which provides adequately high level of protection.

Topics include: what is IPSec and how to use it to secure data transmission, creating and deploying IPSec policy, overview or IPSec authentication types, configuring IPSec Policy with different types of authentication, and more (Article: ~2,180 words).

Table of Contents includes:
Introduction • TCP/IP Security Vulnerabilities • What is IPSec? • Securing Data Transmission with IPSec • Creating and Deploying IPSec Policy • Selecting IPSec Authentication Type • Configuring IPSec Policy with Kerberos Authentication • Diffie-Hellman Groups • Configuring IPSec Policy with X.509 Certificates Authentication • Configuring Certificate Template • Testing • Conclusion • Resources • About the Author

Slava Gomzin, CISSP, PCI ISA, ECSP, Security+ has more than 15 years of professional experience in software development and application security. He is Security Architect at Retalix USA.

النوع
كمبيوتر وإنترنت
تاريخ النشر
٢٠١٢
١٧ يوليو
اللغة
EN
الإنجليزية
عدد الصفحات
١١
الناشر
Slava Gomzin
البائع
Draft2Digital, LLC
الحجم
١٫٢
‫م.ب.‬
CCNA Security Quick Reference CCNA Security Quick Reference
٢٠٠٨
Practical Network Scanning Practical Network Scanning
٢٠١٨
Firewall Policies and VPN Configurations Firewall Policies and VPN Configurations
٢٠٠٦
Flexible Network Architectures Security Flexible Network Architectures Security
٢٠١٨
How to Cheat at Securing Your Network (Enhanced Edition) How to Cheat at Securing Your Network (Enhanced Edition)
٢٠١١
Network Security Architectures Network Security Architectures
٢٠٠٤
Hiding Web Traffic with SSH: How to Protect Your Internet Privacy against Corporate Firewall or Insecure Wireless Hiding Web Traffic with SSH: How to Protect Your Internet Privacy against Corporate Firewall or Insecure Wireless
٢٠١٢
Hacking Point of Sale Hacking Point of Sale
٢٠١٤
Securing .NET Web Services with SSL: How to Protect “Data in Transit” between Client and Remote Server Securing .NET Web Services with SSL: How to Protect “Data in Transit” between Client and Remote Server
٢٠١٢
Bitcoin for Nonmathematicians Bitcoin for Nonmathematicians
٢٠١٦
Securing Email Communication: How to Protect Your Correspondence from Wiretapping Using Free Tools Securing Email Communication: How to Protect Your Correspondence from Wiretapping Using Free Tools
٢٠١٢
Securing Application Deployment with Obfuscation and Code Signing: How to Create 3 Layers of Protection for .NET Release Build Securing Application Deployment with Obfuscation and Code Signing: How to Create 3 Layers of Protection for .NET Release Build
٢٠١٢