SSL and TLS Essentials: Securing the Web
"Great writing . . . a clear introduction to the most widely deployed security technology in the Internet."–Paul Lambert, former co–chair of IETF IPSEC working group The Secure Sockets Layer (SSL) and Transport Layer Security(TLS) protocols form the foundation for e–commerce security on...
Đã lưu trong:
Tác giả chính: | |
---|---|
Định dạng: | Sách |
Ngôn ngữ: | English |
Được phát hành: |
Wiley Publishing
2011
|
Những chủ đề: | |
Truy cập trực tuyến: | http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/29718 |
Các nhãn: |
Thêm thẻ
Không có thẻ, Là người đầu tiên thẻ bản ghi này!
|
Thư viện lưu trữ: | Thư viện Trường Đại học Đà Lạt |
---|
Tóm tắt: | "Great writing . . . a clear introduction to the most widely deployed security technology in the Internet."–Paul Lambert, former co–chair of IETF IPSEC working group
The Secure Sockets Layer (SSL) and Transport Layer Security(TLS) protocols form the foundation for e–commerce security on the World Wide Web, verifying the authenticity of Web sites, encrypting the transfer of sensitive data, and ensuring the integrity of information exchanged. Now–for the first time the details of these critical security protocols are available in a complete, clear, and concise reference. SSL and TLS Essentials provides complete documentation of the SSL and TLS protocols, including advanced and proprietary extensions never before published. The book thoroughly covers the protocols in operation, including the contents of their messages, message formats, and the cryptographic calculations used to construct them. The text also includes an introduction to cryptography and an explanation of X.509 public key certificates. Stephen Thomas, author of IPng and the TCP/IP Protocols, presents this complex material in a clear and reader–friendly manner. The book includes more than 80 figures and illustrations to supplement its text, and it describes SSL in the context of real–world, practical applications. Readers will immediately understand not only the academic principles behind he security protocols, but how those principles apply to their own network security challenges. |
---|