Implementing SSL / TLS Using Cryptography and PKI
Let's get down to a practical implementation of SSL and TLS

SSL/TLS is a standardized, widely implemented, peer-reviewed protocol for applying cryptographic primitives to arbitrary networked communications. It provides privacy, integrity, and a measure of authenticity to otherwise inherently untrustworthy network connections.

While most books detail the protocol, this one is intended to provide you with a nearly complete SSL/TLS library, developed incrementally using C code. Whether or not you have a working knowledgeof cryptography, you'll find this practical guide helps you understand the internals of these libraries so that, when it comes time to use one, you will have a firm understanding of what takes place at each stage.

  • Understand secure sockets and the HTTP protocol
  • Learn to protect against eavesdroppers with symmetric cryptography
  • Secure key exchanges over an insecure medium with public key cryptography and boost security with elliptic curve cryptography
  • Examine the use of digital signatures and X.509 certificates
  • Develop a usable, secure communications protocol with client-side TLS
  • Add server-side TLS 1.0 support
  • Use SSL in advanced situations, including safely reusing key material with sessionresumption and verifying identity with client authentication

Go to wiley.com/go/implementingssl to find code and other features related to this book

1124375113
Implementing SSL / TLS Using Cryptography and PKI
Let's get down to a practical implementation of SSL and TLS

SSL/TLS is a standardized, widely implemented, peer-reviewed protocol for applying cryptographic primitives to arbitrary networked communications. It provides privacy, integrity, and a measure of authenticity to otherwise inherently untrustworthy network connections.

While most books detail the protocol, this one is intended to provide you with a nearly complete SSL/TLS library, developed incrementally using C code. Whether or not you have a working knowledgeof cryptography, you'll find this practical guide helps you understand the internals of these libraries so that, when it comes time to use one, you will have a firm understanding of what takes place at each stage.

  • Understand secure sockets and the HTTP protocol
  • Learn to protect against eavesdroppers with symmetric cryptography
  • Secure key exchanges over an insecure medium with public key cryptography and boost security with elliptic curve cryptography
  • Examine the use of digital signatures and X.509 certificates
  • Develop a usable, secure communications protocol with client-side TLS
  • Add server-side TLS 1.0 support
  • Use SSL in advanced situations, including safely reusing key material with sessionresumption and verifying identity with client authentication

Go to wiley.com/go/implementingssl to find code and other features related to this book

38.0 In Stock
Implementing SSL / TLS Using Cryptography and PKI

Implementing SSL / TLS Using Cryptography and PKI

by Joshua Davies
Implementing SSL / TLS Using Cryptography and PKI

Implementing SSL / TLS Using Cryptography and PKI

by Joshua Davies

eBook

$38.00 

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers

LEND ME® See Details

Overview

Let's get down to a practical implementation of SSL and TLS

SSL/TLS is a standardized, widely implemented, peer-reviewed protocol for applying cryptographic primitives to arbitrary networked communications. It provides privacy, integrity, and a measure of authenticity to otherwise inherently untrustworthy network connections.

While most books detail the protocol, this one is intended to provide you with a nearly complete SSL/TLS library, developed incrementally using C code. Whether or not you have a working knowledgeof cryptography, you'll find this practical guide helps you understand the internals of these libraries so that, when it comes time to use one, you will have a firm understanding of what takes place at each stage.

  • Understand secure sockets and the HTTP protocol
  • Learn to protect against eavesdroppers with symmetric cryptography
  • Secure key exchanges over an insecure medium with public key cryptography and boost security with elliptic curve cryptography
  • Examine the use of digital signatures and X.509 certificates
  • Develop a usable, secure communications protocol with client-side TLS
  • Add server-side TLS 1.0 support
  • Use SSL in advanced situations, including safely reusing key material with sessionresumption and verifying identity with client authentication

Go to wiley.com/go/implementingssl to find code and other features related to this book


Product Details

ISBN-13: 9781118038772
Publisher: Wiley
Publication date: 01/07/2011
Sold by: JOHN WILEY & SONS
Format: eBook
Pages: 704
File size: 7 MB
From the B&N Reads Blog

Customer Reviews