Table of contents: Ch. 1. Introduction to IPv6 Security Ch. 2. IPv6 Protocol Security Vulnerabilities Ch. 3. IPv6 Internet Security Ch. 4. IPv6 Perimeter Security Ch. 5. Local Network Security Ch. 6. Hardening IPv6 Network Devices Ch. 7. Server and Host Security Ch. 8. IPsec and SSL Virtual Private Networks Ch. 9. Security for IPv6 Mobility Ch. 10. Securing the Transition Mechanisms…