Implementing SSL / TLS Using Cryptography and PKI

Implementing SSL / TLS Using Cryptography and PKI

ISBN: 0470920416 | 2011 | EPUB | 696 Pages | 7 MB

Hands-on, practical guide to implementing SSL and TLS protocols for Internet security
If you are a network professional who knows C programming, this practical book is for you. Focused on how to implement Secure Socket Layer (SSL) and Transport Layer Security (TLS), this book guides you through all necessary steps, whether or not you have a working knowledge of cryptography. The book covers SSLv2, TLS 1.0, and TLS 1.2, including implementations of the relevant cryptographic protocols, secure hashing, certificate parsing, certificate generation, and more.

Coverage includes:
* Understanding Internet Security
* Protecting against Eavesdroppers with Symmetric Cryptography
* Secure Key Exchange over an Insecure Medium with Public Key Cryptography
* Authenticating Communications Using Digital Signatures
* Creating a Network of Trust Using X.509 Certificates
* A Usable, Secure Communications Protocol: Client-Side TLS
* Adding Server-Side TLS 1.0 Support
* Advanced SSL Topics
* Adding TLS 1.2 Support to Your TLS Library
* Other Applications of SSL
* A Binary Representation of Integers: A Primer
* Installing TCPDump and OpenSSL
* Understanding the Pitfalls of SSLv2

Set up and launch a working implementation of SSL with this practical guide.

Download:

http://longfiles.com/3qni2xowm627/Implementing_SSL_TLS_Using_Cryptography_and_PKI.epub.html

[Fast Download] Implementing SSL / TLS Using Cryptography and PKI


Ebooks related to "Implementing SSL / TLS Using Cryptography and PKI" :
Security, Privacy, and Applied Cryptography Engineering
Theory of Cryptography, Part II
Boundary Retracement: Processes and Procedures
Formal Correctness of Security Protocols
Topics in Cryptology - CT-RSA 2017: The Cryptographers¡¯ Track at the RSA Conference 2017, San Franc
Cryptography and Information Security in the Balkans: Second International Conference, BalkanCryptSe
Secure Data Deletion
Optical Coding Theory with Prime
Stream Ciphers
Cryptographic Hardware and Embedded Systems
Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.