Securing Communication of Legacy Applications with IPSec: Step-by-Step Guide to Protecting “Data in Transit” without Changes in Your Existing Software

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Securing Communication of Legacy Applications with IPSec: Step-by-Step Guide to Protecting “Data in Transit” without Changes in Your Existing Software by Slava Gomzin, Slava Gomzin
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Slava Gomzin ISBN: 9781301593729
Publisher: Slava Gomzin Publication: July 17, 2012
Imprint: Smashwords Edition Language: English
Author: Slava Gomzin
ISBN: 9781301593729
Publisher: Slava Gomzin
Publication: July 17, 2012
Imprint: Smashwords Edition
Language: English

Booklet for IT professionals, developers and security specialists on how to utilize IPSec protocol in order to protect data transmission between legacy applications which were created before secure communication became common practice. In many cases it is difficult or even impossible to make necessary changes in old software in order to implement commonly accepted secure protocols such as SSL/TLS. IPSec protocol can be utilized as inexpensive but powerful alternative solution which provides adequately high level of protection.

Topics include: what is IPSec and how to use it to secure data transmission, creating and deploying IPSec policy, overview or IPSec authentication types, configuring IPSec Policy with different types of authentication, and more (Article: ~2,180 words).

Table of Contents includes:
Introduction • TCP/IP Security Vulnerabilities • What is IPSec? • Securing Data Transmission with IPSec • Creating and Deploying IPSec Policy • Selecting IPSec Authentication Type • Configuring IPSec Policy with Kerberos Authentication • Diffie-Hellman Groups • Configuring IPSec Policy with X.509 Certificates Authentication • Configuring Certificate Template • Testing • Conclusion • Resources • About the Author

Slava Gomzin, CISSP, PCI ISA, ECSP, Security+ has more than 15 years of professional experience in software development and application security. He is Security Architect at Retalix USA.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Booklet for IT professionals, developers and security specialists on how to utilize IPSec protocol in order to protect data transmission between legacy applications which were created before secure communication became common practice. In many cases it is difficult or even impossible to make necessary changes in old software in order to implement commonly accepted secure protocols such as SSL/TLS. IPSec protocol can be utilized as inexpensive but powerful alternative solution which provides adequately high level of protection.

Topics include: what is IPSec and how to use it to secure data transmission, creating and deploying IPSec policy, overview or IPSec authentication types, configuring IPSec Policy with different types of authentication, and more (Article: ~2,180 words).

Table of Contents includes:
Introduction • TCP/IP Security Vulnerabilities • What is IPSec? • Securing Data Transmission with IPSec • Creating and Deploying IPSec Policy • Selecting IPSec Authentication Type • Configuring IPSec Policy with Kerberos Authentication • Diffie-Hellman Groups • Configuring IPSec Policy with X.509 Certificates Authentication • Configuring Certificate Template • Testing • Conclusion • Resources • About the Author

Slava Gomzin, CISSP, PCI ISA, ECSP, Security+ has more than 15 years of professional experience in software development and application security. He is Security Architect at Retalix USA.

More books from Application Software

Cover of the book Emotional Intelligence by Slava Gomzin
Cover of the book LibreOffice Writer by Slava Gomzin
Cover of the book Tools for Mobile Multimedia Programming and Development by Slava Gomzin
Cover of the book SharePoint Office Pocket Guide by Slava Gomzin
Cover of the book QuickBooks 2014 In Depth by Slava Gomzin
Cover of the book Consumer Guide to Computer Security: Fight Back Against Identity Theft, Malware, Hackers, Spyware, Spam, Botnets, Phishing - Online Privacy - Wireless, Laptop, Hotspot Security by Slava Gomzin
Cover of the book How to Find Inter-Groups Differences Using Spss/Excel/Web Tools in Common Experimental Designs by Slava Gomzin
Cover of the book 超實用!會計.生管.財務的辦公室EXCEL必備50招省時技(2016版) by Slava Gomzin
Cover of the book National Cyber Incident Response Plan: Cybersecurity Federal Roles and Responsibilities - Response To, and Recovery From, Significant Cyber Attacks Posing Risks to Critical Infrastructure Systems by Slava Gomzin
Cover of the book Business Information Systems by Slava Gomzin
Cover of the book 2018 Best Resources for Apps Development by Slava Gomzin
Cover of the book Der Kurator im Zeitalter der neuen Medienkunst by Slava Gomzin
Cover of the book Hacking For Dummies by Slava Gomzin
Cover of the book Erarbeitung der Gestaltungsrichtlinien für die Online-Hilfe der Anwender-Software S.I.T-Collection by Slava Gomzin
Cover of the book Personal Data Privacy and Protection in a Surveillance Era by Slava Gomzin
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy