Hands-on, practical guide to implementing SSL and TLS protocols for Internet security
If you are a network professional who knows C programming, this practical book is for you.Focused on how to implement Secure Socket Layer (SSL) and Transport Layer Security (TLS), this book guides you through all necessary steps, whether or not you have a working knowledge of cryptography. The book covers SSLv2, TLS 1.0, and TLS 1.2, including implementations of the relevant cryptographic protocols, secure hashing, certificate parsing, certificate generation, and more.
Coverage includes:
Understanding Internet Security
Protecting against Eavesdroppers with Symmetric Cryptography
Secure Key Exchange over an Insecure Medium with Public Key Cryptography
Authenticating Communications Using Digital Signatures
Creating a Network of Trust Using X.509 Certificates
A Usable, Secure Communications Protocol: Client-Side TLS
Adding Server-Side TLS 1.0 Support
Advanced SSL Topics
Adding TLS 1.2 Support to Your TLS Library
Other Applications of SSL
A Binary Representation of Integers: A Primer
Installing TCPDump and OpenSSL
Understanding the Pitfalls of SSLv2
Set up and launch a working implementation of SSL with this practical guide.
Hands-on, practical guide to implementing SSL and TLS protocols for Internet security
If you are a network professional who knows C programming, this practical book is for you.Focused on how to implement Secure Socket Layer (SSL) and Transport Layer Security (TLS), this book guides you through all necessary steps, whether or not you have a working knowledge of cryptography. The book covers SSLv2, TLS 1.0, and TLS 1.2, including implementations of the relevant cryptographic protocols, secure hashing, certificate parsing, certificate generation, and more.
Coverage includes:
Understanding Internet Security
Protecting against Eavesdroppers with Symmetric Cryptography
Secure Key Exchange over an Insecure Medium with Public Key Cryptography
Authenticating Communications Using Digital Signatures
Creating a Network of Trust Using X.509 Certificates
A Usable, Secure Communications Protocol: Client-Side TLS
Adding Server-Side TLS 1.0 Support
Advanced SSL Topics
Adding TLS 1.2 Support to Your TLS Library
Other Applications of SSL
A Binary Representation of Integers: A Primer
Installing TCPDump and OpenSSL
Understanding the Pitfalls of SSLv2
Set up and launch a working implementation of SSL with this practical guide.
Note: The book has been read, but looks new. The book cover has no visible wear, and the dust jacket is included if applicable. No missing or damaged pages, no tears, possible very minimal creasing, no underlining or highlighting of text, and no writing in the margins.
Note
The book has been read, but looks new. The book cover has no visible wear, and the dust jacket is included if applicable. No missing or damaged pages, no tears, possible very minimal creasing, no underlining or highlighting of text, and no writing in the margins.
People who bought this also bought
[{"item_id":"10599","item_name":"SSL\/TLS Under Lock and Key: A Guide to Understanding SSL\/TLS Cryptography","item_brand":"Hollie Acres, Paul Baka, Jeremy Schatten","item_category":"Computing & Internet","list":"Product Page","price":"10.12","variant":"","quantity":1},{"item_id":"12020","item_name":"Efficient Ways to Use the Internet Securely: Protect Your Digital Assets, Privacy and Online Transactions - Digital Concerns 2","item_brand":"Mark Millery","item_category":"Computing & Internet","list":"Product Page","price":"13.30","variant":"","quantity":1},{"item_id":"18057","item_name":"Selected Areas in Cryptography SAC 2025: 32nd International Conference, Toronto, ON, Canada, August 1315, 2025, Revised Selected Papers - Lecture Notes in Computer Science","item_brand":"Christina Boura, Atefeh Mashatan, Ali Miri","item_category":"Computing & Internet","list":"Product Page","price":"48.99","variant":"","quantity":1},{"item_id":"18516","item_name":"Science of Cyber Security - SciSec 2022 Workshops: AI-CryptoSec, TA-BC-NFT, and MathSci-Qsafe 2022, Matsue, Japan, August 1012, 2022, Revised Selected Papers - Communications in Computer and Information Science 1680","item_brand":"Chunhua Su, Kouichi Sakurai","item_category":"Computing & Internet","list":"Product Page","price":"45.49","variant":"","quantity":1},{"item_id":"11476","item_name":"Introduction to Network Security - Chapman & Hall\/CRC Cryptography and Network Security Series","item_brand":"Douglas Jacobson","item_category":"Computing & Internet","list":"Product Page","price":"20.04","variant":"","quantity":1},{"item_id":"12648","item_name":"Public Key Cryptography: Applications and Attacks - IEEE Press Series on Information and Communication Networks Security","item_brand":"Lynn Margaret Batten","item_category":"Computing & Internet","list":"Product Page","price":"44.79","variant":"","quantity":1},{"item_id":"12997","item_name":"Guide to Internet Cryptography: Security Protocols and Real-World Attack Implications - Information Security and Cryptography","item_brand":"","item_category":"Language & Reference","list":"Product Page","price":"51.37","variant":"","quantity":1},{"item_id":"7970","item_name":"Cryptography Engineering: Design Principles and Practical Applications","item_brand":"Niels Ferguson, Bruce Schneier, Tadayoshi Kohno","item_category":"Computing & Internet","list":"Product Page","price":"6.36","variant":"","quantity":1}]