This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring.
Read alsoHealing Dr. Fortune
Healing people was Jeremy Fortune's specialty-not coming to the rescue of beautiful women with infants in their arms! The California surgeon was in Texas to locate his missing father. Instead, he might have found the woman of his dreams.Kirsten Allen was only trying to look out for her brother's son. And now the Red Rock accountant was worried…
Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying rules to data in order to authorize its transfer or detect attacks.
The chapters of the book cover cryptography, 802.1x mechanism, WPA mechanisms, IPSec mechanism, SSL/TLS/DTLS protocols, network management, MPLS technology, Ethernet VPN, firewalls and intrusion detection.