1 Crossing the Styx: Taming the Underworld Using Cerberus and PlutoPlus (ITLs Contributions in the Area of Internet Security) Sheila Frankel Systems and.
Chapter 13 IPsec. IPsec (IP Security) A collection of protocols used to create VPNs A network layer security protocol providing cryptographic security.