Skip to Content
Security Strategies in Linux Platforms and Applications, 3rd Edition
book

Security Strategies in Linux Platforms and Applications, 3rd Edition

by Ric Messier, Michael Jang
October 2022
Intermediate to advanced
500 pages
19h 57m
English
Jones & Bartlett Learning
Content preview from Security Strategies in Linux Platforms and Applications, 3rd Edition

Basic Principles of Encryption on Networks

You’ve just read about one method of encrypted communication, using SSH. Other methods are available. One that is commonly used is Internet Protocol Security (IPSec). IPSec is a set of extensions to IP that were developed as part of IPv6 but can be implemented along with IPv4 to allow encryption between two hosts. It works at both ends of a connection, tunneling communications through protocols 50 and 51. In tunneling mode, it is a form of virtual private networking.

Another method is based on the Transport Layer Security (TLS) protocol. TLS has long superseded the Secure Sockets Layer (SSL), but some people continue to refer to it as SSL, in spite of the fact that TLS has been the encryption protocol ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Red Hat RHCSA 8 Cert Guide: EX200, 2nd Edition

Red Hat RHCSA 8 Cert Guide: EX200, 2nd Edition

Sander van Vugt
Theoretical Cybersecurity: Principles and Advanced Concepts

Theoretical Cybersecurity: Principles and Advanced Concepts

Jacob G. Oakley, Michael Butler, Wayne York, Matthew Puckett, J. Louis Sewell
Three Essentials for Agentic AI Security

Three Essentials for Agentic AI Security

Paolo Dal Cin, Daniel Kendzior, Yusof Seedat, Renato Marinho

Publisher Resources

ISBN: 9781284255881