Release date: December 2005 IPsec is a framework of open standards for ensuring private communications over public networks. It has become the most common network layer security control, typically used to create a virtual private network (VPN). A VPN is a virtual network built on top of existing physical networks that can provide a secure communications mechanism for data and control information transmitted between networks. VPNs are used most often to protect...
More DescriptionRelease date: December 2005
IPsec is a framework of open standards for ensuring private communications over public networks. It has become the most common network layer security control, typically used to create a virtual private network (VPN). A VPN is a virtual network built on top of existing physical networks that can provide a secure communications mechanism for data and control information transmitted between networks. VPNs are used most often to protect communications carried over public networks such as the Internet.
A VPN can provide several types of data protection, including confidentiality, integrity, data origin authentication, replay protection and access control.
Why buy a book you can download for free?
First you gotta find it and make sure it's the latest version, not always easy. Then you gotta print it using a network printer you share with 100 other people - and its outta paper - and the toner is low (take out the toner cartridge, shake it, then put it back). If it's just 10 pages, no problem, but if it's a 250-page book, you will need to punch 3 holes in all those pages and put it in a 3-ring binder. Takes at least an hour. An engineer that's paid $75 an hour has to do this himself (who has assistant's anymore?).
If you are paid more than $10 an hour and use an ink jet printer, buying this book will save you money.
It's much more cost-effective to just order the latest version from Amazon.com
This public domain material is published by 4th Watch Books. We publish tightly-bound, full-size books at 8 ½ by 11 inches, with glossy covers. 4th Watch Books is a Service Disabled Veteran Owned Small Business (SDVOSB) and is not affiliated with the National Institute of Standards and Technology.
For more titles published by 4th Watch, please visit: cybah.webplus.net
A full copy of all the pertinent cybersecurity standards is available on DVD-ROM in the CyberSecurity Standards Library disc which is available at Amazon.com.
GSA P-100 Facilities Standards for the Public Buildings Service
GSA P-120 Cost and Schedule Management Policy Requirements
GSA P-140 Child Care Center Design Guide
GSA Standard Level Features and Finishes for U.S. Courts Facilities
GSA Courtroom Technology Manual
NIST SP 500-299 NIST Cloud Computing Security Reference Architecture
NIST SP 500-291 NIST Cloud Computing Standards Roadmap Version 2
NIST SP 500-293 US Government Cloud Computing Technology Roadmap Volume 1 & 2
NIST SP 500-293 US Government Cloud Computing Technology Roadmap Volume 3 DRAFT
NIST SP 1800-8 Securing Wireless Infusion Pumps
NISTIR 7497 Security Architecture Design Process for Health Information Exchanges (HIEs)
NIST SP 800-66 Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule
NIST SP 1800-1 Securing Electronic Health Records on Mobile Devices
NIST SP 800-177 Trustworthy Email
NIST SP 800-184 Guide for Cybersecurity Event Recovery
NIST SP 800-190 Application Container Security Guide
NIST SP 800-193 Platform Firmware Resiliency Guidelines
NIST SP 1800-1 Securing Electronic Health Records on Mobile Devices
NIST SP 1800-2 Identity and Access Management for Electric Utilities
NIST SP 1800-5 IT Asset Management: Financial Services
NIST SP 1800-6 Domain Name Systems-Based Electronic Mail Security
NIST SP 1800-7 Situational Awareness for Electric Utilities
DoD Medical Space Planning Criteria
FARs Federal Acquisitions Regulation
DFARS Defense Federal Acquisitions Regulations Supplement