Chapter 18. Security: EAP, IPsec, TLS, DNSSEC, and DKIM
Introduction
Threats to Network Communication
Basic Cryptography and Security Mechanisms
Certificates, Certificate Authorities (CAs), and PKIs
TCP/IP Security Protocols and Layering
Network Access Control: 802.1X, 802.1AE, EAP, and PANA
Layer 3 IP Security (IPsec)
Transport Layer Security (TLS and DTLS)
TLS 1.2
TLS Record Protocol
TLS Handshaking Protocols
