Bulletproof SSL and TLS

Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications

English | 2014 | ISBN: 1907117040 | PDF | 531 Pages | 6.8 mb

Bulletproof SSL and TLS is a complete guide to using SSL and TLS encryption to deploy secure servers and web applications. Written by Ivan Ristic, the author of the popular SSL Labs web site, this book will teach you everything you need to know to protect your systems from eavesdropping and impersonation attacks.
In this book, you'll find just the right mix of theory, protocol detail, vulnerability and weakness information, and deployment advice to get your job done:
- Comprehensive coverage of the ever-changing field of SSL/TLS and Internet PKI, with updates to the digital version
- For IT security professionals, help to understand the risks
- For system administrators, help to deploy systems securely
- For developers, help to design and implement secure web applications
- Practical and concise, with added depth when details are relevant
- Introduction to cryptography and the latest TLS protocol version
- Discussion of weaknesses at every level, covering implementation issues, HTTP and browser problems, and protocol vulnerabilities
- Coverage of the latest attacks, such as BEAST, CRIME, BREACH, Lucky 13, RC4 biases, Triple Handshake Attack, and Heartbleed
- Thorough deployment advice, including advanced technologies, such as Strict Transport Security, Content Security Policy, and pinning
- Guide to using OpenSSL to generate keys and certificates and to create and run a private certification authority
- Guide to using OpenSSL to test servers for vulnerabilities
- Practical advice for secure server configuration using Apache httpd, IIS, Java, Nginx, Microsoft Windows, and Tomcat
This book is available in paperback and a variety of digital formats without DRM. Digital version of Bulletproof SSL and TLS can be obtained directly from the author, at feistyduck.com.



[Fast Download] Bulletproof SSL and TLS

Related eBooks:
Building Secure and Reliable Systems
Implementing Multi-Factor Authentication on Azure
Cyber Security Intelligence and Analytics
The Maker's Guide to the Zombie Apocalypse
Nature Inspired Computing for Wireless Sensor Networks
Applied Incident Response
Python Web Hacking Essentials
Effects Based Operations Applying Network Centric Warfare in Peace, Crisis, and War
Security Software Development
The Privacy Engineers Manifesto: Getting from Policy to Code to QA to Value
Internet and Wireless Security (Btexact Communications Technology Series, 4)
Corporate Computer Security, Global Edition
Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.