References

SSL and TLS, Designing and Building Secure Systems, Eric Rescorla, ISBN 0-201-61589-3.

Applied Cryptography, Bruce Schneier, ISBN 0-471-12845-7.

Network Security, Private Communication in a Public World, Charlie Kaufman, Radia Perlman, Mike Speciner, ISBN 0-13-061466-1.

Network Security Principles and Practices, Saadat Malik, ISBN 1-58705-119-2. RSA laboratories crypto FAQ, http://www.rsasecurity.com/rsalabs/node.asp?id=2152. RFC 2246, "The TLS Protocol."

The SSL Protocol, version 3.0, http://wp.netscape.com/eng/ssl3/ssl-toc.html. RFC 2818, "HTTP over TLS."

PKCS standards, http://www.rsasecurity.com/rsalabs/pkcs.

RFC 3280, "Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile."

RFC 2405, "The ESP DEC-CBC Algorithm with Explicit IV."

RC4 information at wikipedia, http://en.wikipedia.org/wiki/RC4.

The Diffie-Hellman introduction at wikipedia, http://en.wikipedia.org/wiki/Diffie-Hellman.

The RSA introduction at wikipedia, http://en.wikipedia.org/wiki/RSA.

The DSA introduction at wikipedia, http://en.wikipedia.org/wiki/Digital_Signature_ Algorithm.

This page intentionally left blank

This chapter describes the following topics:

• SSL VPN resource access methods

• User authentication and access privilege management

• Security considerations

• Device placement and platform options

• Virtualization

• High availability

• Performance and scalability

Chapter

0 0

Post a comment