ABSTRACT

This chapter talks about several different applications and tools designed for enforcing network security. Detailed discussions are given on two authentication mechanismsKerberos and X.509. In the second part of this chapter we focus on E-mail, IP and Web security.