ABSTRACT

Introduction Th e previous two chapters provided an introduction to IPv6. Th is chapter provides additional details. Th is allows us to focus on security-related issues starting with the chapter that follows.