"Brilliant! A must for all fans of Frost, but also so much more. Gripping, finely written . . . A classic, period crime thriller." Thus raves Peter James about A Touch of Frost, a prequel to the detective novels of R.D. Wingfield, who died in 2007.
In the tradition of Midsomer Murders, A Touch of Frost is one of England's longest running series of all time, and the gruff, non-conformist cop Jack Frost is as much a part of England's detective tradition as P.D. James's Adam Dalgleish or Colin Dexter's Inspector Morse. Now, by special arrangement with R.D. Wingfield's estate, this smashing new mystery has been written to give new life to this beloved policeman. In James Henry's First Frost, Detective Sergeant Jack Frost is dealing with the disappearance of his mentor. When a twelve-year-old girl goes missing from a department store changing room, Frost is put in charge of the case. Perfect for fans who have devoured A Touch of Frost on Netflix Instant as well as for those who love police procedurals, readers everywhere will applaud the return of detective Jack Frost in this pitch-perfect mystery.
Understand the basics of the IPsec protocol and learn implementation best practices Study up-to-date IPsec design, incorporating current Cisco innovations in the security and VPN marketplace Learn how to avoid common pitfalls related to IPsec deployment Reinforce theory with case studies, configuration examples showing how IPsec maps to real-world solutions
IPsec Virtual Private Network Fundamentals provides a basic working knowledge of IPsec on various Cisco routing and switching platforms. It provides the foundation necessary to understand the different components of Cisco IPsec implementation and how it can be successfully implemented in a variety of network topologies and markets (service provider, enterprise, financial, government). This book views IPsec as an emerging requirement in most major vertical markets, explaining the need for increased information authentication, confidentiality, and non-repudiation for secure transmission of confidential data. The book is written using a layered approach, starting with basic explanations of why IPsec was developed and the types of organizations relying on IPsec to secure data transmissions. It then outlines the basic IPsec/ISAKMP fundamentals that were developed to meet demand for secure data transmission. The book covers the design and implementation of IPsec VPN architectures using an array of Cisco products, starting with basic concepts and proceeding to more advanced topics including high availability solutions and public key infrastructure (PKI). Sample topology diagrams and configuration examples are provided in each chapter to reinforce the fundamentals expressed in text and to assist readers in translating concepts into practical deployment scenarios. Additionally, comprehensive case studies are incorporated throughout to map topics to real-world solutions.