Implementing SSL / TLS Using Cryptography and PKI

( 2 )

Overview

Hands-on, practical guide to implementing SSL and TLS protocols for Internet security

If you are a network professional who knows C programming, this practical book is for you.  Focused on how to implement Secure Socket Layer (SSL) and Transport Layer Security (TLS), this book guides you through all necessary steps, whether or not you have a working knowledge of cryptography. The book covers SSLv2, TLS 1.0, and TLS 1.2, including implementations of the relevant ...

See more details below
Paperback
$39.66
BN.com price
(Save 33%)$60.00 List Price
Other sellers (Paperback)
  • All (8) from $26.75   
  • New (5) from $31.65   
  • Used (3) from $26.75   

Overview

Hands-on, practical guide to implementing SSL and TLS protocols for Internet security

If you are a network professional who knows C programming, this practical book is for you.  Focused on how to implement Secure Socket Layer (SSL) and Transport Layer Security (TLS), this book guides you through all necessary steps, whether or not you have a working knowledge of cryptography. The book covers SSLv2, TLS 1.0, and TLS 1.2, including implementations of the relevant cryptographic protocols, secure hashing, certificate parsing, certificate generation, and more. 

  • Shows network professionals how to implement SSL and TLS using cryptography and PKI
  • Provides specific techniques and strategies, even if you have no prior knowledge of cryptography
  • Covers HTTP, HTTPS, and HTTP proxy support (including how HTTP proxies interact with SSL); symmetric cryptography, including DES, 3DES, AES and RC4, along with CBC, OFB, COUNTER and AEAD
  • Delves into public-key cryptography including RSA, Diffie-Hellman key exchange, and Elliptic-curve cryptography
  • Takes you through digital signature algorithms including RSA, DSA, ECDSA, SHA-1, MD5, and HMAC
  • Includes additional topics, such as X.509 certificates, ASN.1, and more

Set up and launch a working implementation of SSL with this practical guide.

Read More Show Less

Product Details

  • ISBN-13: 9780470920411
  • Publisher: Wiley
  • Publication date: 1/18/2011
  • Edition number: 1
  • Pages: 696
  • Sales rank: 475,282
  • Product dimensions: 7.30 (w) x 9.20 (h) x 1.50 (d)

Meet the Author

Joshua Davies is a principal architect for Travelocity.com, responsible for the architecture of the main Web site with a focus on networking and security. Previously, he designed distributed systems for AT&T, Digex, and the Mexican telecommunications giant Pegaso.

Read More Show Less

Table of Contents

Introduction xxvii

Chapter 1 Understanding Internet Security 1

Chapter 2 Protecting Against Eavesdroppers with Symmetric Cryptography 29

Chapter 3 Secure Key Exchange over an Insecure Medium with Public Key Cryptography 91

Chapter 4 Authenticating Communications Using Digital Signatures 157

Chapter 5 Creating a Network of Trust Using X.509 Certifi cates 221

Chapter 6 A Usable, Secure Communications Protocol: Client-Side TLS 297

Chapter 7 Adding Server-Side TLS 1.0 Support 381

Chapter 8 Advanced SSL Topics 415

Chapter 9 Adding TLS 1.2 Support to Your TLS Library 479

Chapter 10 Other Applications of SSL 543

Appendix A Binary Representation of Integers: A Primer 567

Appendix B Installing TCPDump and OpenSSL 573

Appendix C Understanding the Pitfalls of SSLv2 579

Index 629

Read More Show Less

Customer Reviews

Average Rating 5
( 2 )
Rating Distribution

5 Star

(2)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing all of 2 Customer Reviews
  • Anonymous

    Posted March 14, 2014

    Hush

    Crossfade: Killing Me lnside ~~ We All Bleed (2011)

    0 out of 1 people found this review helpful.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted November 4, 2013

    ~EternityClan~

    EternityClan Camp.

    0 out of 1 people found this review helpful.

    Was this review helpful? Yes  No   Report this review
Sort by: Showing all of 2 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)