Network Security with OpenSSL: Cryptography for Secure Communications

( 2 )

Overview

Most applications these days are at least somewhat network aware, but how do you protect those applications against common network security threats? Many developers are turning to OpenSSL, an open source version of SSL/TLS, which is the most widely used protocol for secure network communications.The OpenSSL library is seeing widespread adoption for web sites that require cryptographic functions to protect a broad range of sensitive information, such as credit card numbers and other financial transactions. The ...

See more details below
Paperback (First Edition)
$29.42
BN.com price
(Save 26%)$39.95 List Price

Pick Up In Store

Reserve and pick up in 60 minutes at your local store

Other sellers (Paperback)
  • All (21) from $1.99   
  • New (8) from $22.35   
  • Used (13) from $1.99   
Network Security with OpenSSL: Cryptography for Secure Communications

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK 7.0
  • Samsung Galaxy Tab 4 NOOK 10.1
  • NOOK HD Tablet
  • NOOK HD+ Tablet
  • NOOK eReaders
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK for Web

Want a NOOK? Explore Now

NOOK Book (eBook)
$17.99
BN.com price
(Save 43%)$31.99 List Price

Overview

Most applications these days are at least somewhat network aware, but how do you protect those applications against common network security threats? Many developers are turning to OpenSSL, an open source version of SSL/TLS, which is the most widely used protocol for secure network communications.The OpenSSL library is seeing widespread adoption for web sites that require cryptographic functions to protect a broad range of sensitive information, such as credit card numbers and other financial transactions. The library is the only free, full-featured SSL implementation for C and C++, and it can be used programmatically or from the command line to secure most TCP-based network protocols.Network Security with OpenSSL enables developers to use this protocol much more effectively. Traditionally, getting something simple done in OpenSSL could easily take weeks. This concise book gives you the guidance you need to avoid pitfalls, while allowing you to take advantage of the library's advanced features. And, instead of bogging you down in the technical details of how SSL works under the hood, this book provides only the information that is necessary to use OpenSSL safely and effectively. In step-by-step fashion, the book details the challenges in securing network communications, and shows you how to use OpenSSL tools to best meet those challenges.As a system or network administrator, you will benefit from the thorough treatment of the OpenSSL command-line interface, as well as from step-by-step directions for obtaining certificates and setting up your own certification authority. As a developer, you will further benefit from the in-depth discussions and examples of how to use OpenSSL in your own programs. Although OpenSSL is written in C, information on how to use OpenSSL with Perl, Python and PHP is also included.OpenSSL may well answer your need to protect sensitive data. If that's the case, Network Security with OpenSSL is the only guide available on the subject.

This book documents the Open SSL library, and provides a solid foundation for developers who have a need for cryptographic functions.

Read More Show Less

Product Details

  • ISBN-13: 9780596002701
  • Publisher: O'Reilly Media, Incorporated
  • Publication date: 6/24/2002
  • Edition description: First Edition
  • Edition number: 1
  • Pages: 386
  • Sales rank: 681,135
  • Product dimensions: 7.00 (w) x 9.20 (h) x 0.90 (d)

Meet the Author

John Viega, Founder and Chief Scientist of Secure Software (www.securesoftware.com), is a well-known security expert, and coauthor of Building Secure Software (Addison-Wesley) and Network Security with OpenSSL (O'Reilly). John is responsible for numerous software security tools, and is the original author of Mailman, the GNU mailing list manager. He holds a B.A. and M.S. in Computer Science from the University of Virginia. Mr. Viega is also an Adjunct Professor of Computer Science at Virginia Tech (Blacksburg, VA) and a Senior Policy Researcher at the Cyberspace Policy Institute, and he serves on the Technical Advisory Board for the Open Web Applications Security Project. He also founded a Washington, D.C. area security interest group that conducts monthly lectures presented by leading experts in the field. He is the author or coauthor of nearly 80 technical publications, including numerous refereed research papers and trade articles.

Matt Messier, Director of Engineering at Secure Software, is a security authority who has been programming for nearly two decades. Besides coauthoring Network Security with OpenSSL, Matt coauthored the Safe C String Library, RATS, and EGADS, an Entropy Gathering and Distribution System used for securely seeding pseudo-random number generators. Prior to joining Secure Software, Matt worked for IBM and Lotus, on source and assembly level debugging techniques, and operating system concepts.

Pravir Chandra, Research Scientist at Secure Software Solutions, is an expert in language-level security. Most recently, he co-authored the DARPA-funded "catscan" tool for static security analysis of C source code. Pravir holds a B.S. in Computer Science from Case Western Reserve University, and wants you to know that Cleveland rocks!

Read More Show Less

Table of Contents

Dedication;
Preface;
About This Book;
Conventions Used in This Book;
Comments and Questions;
Acknowledgments;
Chapter 1: Introduction;
1.1 Cryptography for the Rest of Us;
1.2 Overview of SSL;
1.3 Problems with SSL;
1.4 What SSL Doesn't Do Well;
1.5 OpenSSL Basics;
1.6 Securing Third-Party Software;
Chapter 2: Command-Line Interface;
2.1 The Basics;
2.2 Message Digest Algorithms;
2.3 Symmetric Ciphers;
2.4 Public Key Cryptography;
2.5 S/MIME;
2.6 Passwords and Passphrases;
2.7 Seeding the Pseudorandom Number Generator;
Chapter 3: Public Key Infrastructure (PKI);
3.1 Certificates;
3.2 Obtaining a Certificate;
3.3 Setting Up a Certification Authority;
Chapter 4: Support Infrastructure;
4.1 Multithread Support;
4.2 Internal Error Handling;
4.3 Abstract Input/Output;
4.4 Random Number Generation;
4.5 Arbitrary Precision Math;
4.6 Using Engines;
Chapter 5: SSL/TLS Programming;
5.1 Programming with SSL;
5.2 Advanced Programming with SSL;
Chapter 6: Symmetric Cryptography;
6.1 Concepts in Symmetric Cryptography;
6.2 Encrypting with the EVP API;
6.3 General Recommendations;
Chapter 7: Hashes and MACs;
7.1 Overview of Hashes and MACs;
7.2 Hashing with the EVP API;
7.3 Using MACs;
7.4 Secure HTTP Cookies;
Chapter 8: Public Key Algorithms;
8.1 When to Use Public Key Cryptography;
8.2 Diffie-Hellman;
8.3 Digital Signature Algorithm (DSA);
8.4 RSA;
8.5 The EVP Public Key Interface;
8.6 Encoding and Decoding Objects;
Chapter 9: OpenSSL in Other Languages;
9.1 Net::SSLeay for Perl;
9.2 M2Crypto for Python;
9.3 OpenSSL Support in PHP;
Chapter 10: Advanced Programming Topics;
10.1 Object Stacks;
10.2 Configuration Files;
10.3 X.509;
10.4 PKCS#7 and S/MIME;
10.5 PKCS#12;
Appendix A: Command-Line Reference;
Colophon;

Read More Show Less

Customer Reviews

Average Rating 5
( 2 )
Rating Distribution

5 Star

(2)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing all of 2 Customer Reviews
  • Anonymous

    Posted November 4, 2013

    ~EternityClan~

    Warrior's Den.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted November 22, 2002

    Excellent!

    OpenSSL is a terrific programming resource, but the online documentation on it is hard to understand and index. This book brings most of it all together, and provides enough examples to answer most of your questions. One thing that it lacks is tie-ins with Java; most of its examples are in Perl and Python. I'm currently trying to see if certain ideas can be implemented in Java. A great book, and great read!

    Was this review helpful? Yes  No   Report this review
Sort by: Showing all of 2 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)