| Preface | p. xv |
| References | p. xxi |
| Acknowledgments | p. xxiii |
| Fundamentals | p. 1 |
| Terminology | p. 3 |
| References | p. 10 |
| TCP/IP Networking | p. 11 |
| History and Development | p. 12 |
| Internet | p. 15 |
| Internet Standardization | p. 17 |
| Internet Model | p. 35 |
| References | p. 52 |
| Attacks | p. 55 |
| Passive Attacks | p. 56 |
| Active Attacks | p. 58 |
| References | p. 66 |
| OSI Security Architecture | p. 69 |
| Introduction | p. 69 |
| Security Services | p. 72 |
| Security Mechanisms | p. 75 |
| Security Management | p. 78 |
| References | p. 79 |
| Cryptographic Techniques | p. 81 |
| Introduction | p. 81 |
| Cryptographic Hash Functions | p. 84 |
| Secret Key Cryptography | p. 87 |
| Public Key Cryptography | p. 90 |
| Digital Envelopes | p. 98 |
| Protection of Cryptographic Keys | p. 101 |
| Generation of Pseudorandom Bit Sequences | p. 102 |
| Legal Issues | p. 103 |
| Notation | p. 107 |
| References | p. 109 |
| Authentication and Key Distribution | p. 111 |
| Authentication | p. 111 |
| Key Distribution | p. 119 |
| References | p. 122 |
| Access Control | p. 125 |
| Overview | p. 127 |
| Introduction | p. 128 |
| Basic Components | p. 133 |
| Sources for Further Information | p. 139 |
| References | p. 140 |
| Packet Filtering | p. 141 |
| Introduction | p. 141 |
| Packet-Filtering Rules | p. 145 |
| Packet-Filtering Products | p. 151 |
| Stateful Inspection | p. 156 |
| Conclusions | p. 157 |
| References | p. 160 |
| Circuit-Level Gateways | p. 161 |
| Introduction | p. 161 |
| SOCKS | p. 163 |
| Conclusions | p. 168 |
| References | p. 169 |
| Application-Level Gateways | p. 171 |
| Introduction | p. 171 |
| User Authentication and Authorization | p. 175 |
| Proxy Servers | p. 177 |
| Conclusions | p. 178 |
| References | p. 180 |
| Firewall Configurations | p. 181 |
| Dual-Homed Firewall Configurations | p. 181 |
| Screened Host Firewall Configurations | p. 185 |
| Screened Subnet Firewall Configurations | p. 186 |
| Network Address Translation | p. 188 |
| Protection Against Denial of Service | p. 190 |
| Firewall Certification | p. 192 |
| References | p. 193 |
| Conclusions and Outlook | p. 195 |
| References | p. 201 |
| Communication Security | p. 203 |
| Network Access Layer Security Protocols | p. 205 |
| Introduction | p. 205 |
| Layer 2 Forwarding Protocol | p. 209 |
| Point-to-Point Tunneling Protocol | p. 210 |
| Layer 2 Tunneling Protocol | p. 218 |
| Conclusions | p. 219 |
| References | p. 220 |
| Internet Layer Security Protocols | p. 223 |
| Previous Work | p. 224 |
| IETF Standardization | p. 226 |
| IP Security Architecture | p. 227 |
| IPsec Protocols | p. 230 |
| Key Management Protocols | p. 236 |
| Implementations | p. 245 |
| Conclusions | p. 246 |
| References | p. 247 |
| Transport Layer Security Protocols | p. 251 |
| Previous Work | p. 251 |
| SSL Protocol | p. 252 |
| TLS Protocol | p. 269 |
| Firewall Tunneling | p. 274 |
| Conclusions | p. 277 |
| References | p. 279 |
| Application Layer Security Protocols | p. 283 |
| Security-Enhanced Application Protocols | p. 284 |
| Authentication and Key Distribution Systems | p. 295 |
| Conclusions | p. 307 |
| References | p. 308 |
| Message Security Protocols | p. 313 |
| Introduction | p. 313 |
| Secure Messaging Protocols | p. 314 |
| Conclusions | p. 325 |
| References | p. 326 |
| Conclusions and Outlook | p. 329 |
| Reference | p. 333 |
| Discussion | p. 335 |
| Public Key Infrastructures | p. 337 |
| Introduction | p. 337 |
| Public Key Certificates | p. 339 |
| Attribute Certificates | p. 342 |
| IETF PKIX WG | p. 345 |
| Certificate Revocation | p. 348 |
| Conclusions | p. 352 |
| References | p. 356 |
| Electronic Commerce | p. 361 |
| References | p. 366 |
| Risk Management | p. 369 |
| Introduction | p. 369 |
| Formal Risk Analysis | p. 371 |
| Alternative Approaches and Technologies | p. 373 |
| Conclusions | p. 375 |
| References | p. 376 |
| Epilogue | p. 379 |
| References | p. 381 |
| Abbreviations and Acronyms | p. 383 |
| About the Author | p. 393 |
| Index | p. 395 |
| Table of Contents provided by Syndetics. All Rights Reserved. |