|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
EBOOKCENTRAL_ocn796382943 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
121121s2009 xx o 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d OCLCQ
|d DEBSZ
|d OCLCQ
|d ZCU
|d MERUC
|d U3W
|d OCLCF
|d OCLCO
|d OCLCQ
|d OCLCO
|d ICG
|d INT
|d OCLCQ
|d DKC
|d AU@
|d OCLCQ
|d OCLCO
|d OCLCQ
|d STF
|d OCLCO
|d OCLCL
|
019 |
|
|
|a 1388674130
|
020 |
|
|
|a 9781596934481
|
020 |
|
|
|a 1596934484
|
020 |
|
|
|a 9781596934474
|q (print)
|
020 |
|
|
|a 1596934476
|
029 |
1 |
|
|a DEBBG
|b BV044166472
|
029 |
1 |
|
|a DEBSZ
|b 431153965
|
035 |
|
|
|a (OCoLC)796382943
|z (OCoLC)1388674130
|
050 |
|
4 |
|a TK5105.59 .O67 2009
|
072 |
|
0 |
|a COM060040
|
082 |
0 |
4 |
|a 005.8
|a 621.38
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Oppliger, Rolf.
|
245 |
1 |
0 |
|a SSL and TLS :
|b Theory and Practice.
|
260 |
|
|
|a Norwood :
|b Artech House,
|c 2009.
|
300 |
|
|
|a 1 online resource (280 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
505 |
0 |
|
|a SSL and TLS: Theory and Practice; Contents; Foreword; Preface; Acknowledgments; Chapter 1 Introduction; 1.1 OSI SECURITY ARCHITECTURE; 1.1.1 Security Services; 1.1.2 Security Mechanisms; 1.2 SECURITY DEFINITION; 1.3 FINAL REMARKS; References; Chapter 2 Cryptography Primer; 2.1 INTRODUCTION; 2.1.1 Preliminary Remarks; 2.1.2 Cryptographic Systems; 2.1.3 Classes of Cryptographic Systems; 2.1.4 Secure Cryptosystems; 2.1.5 Historical Background Information; 2.1.6 Legal Situation; 2.2 CRYPTOSYSTEMS OVERVIEW; 2.2.1 Unkeyed Cryptosystems; 2.2.2 Secret Key Cryptosystems; 2.2.3 Public Key Cryptosystems.
|
505 |
8 |
|
|a 2.3 FINAL REMARKSReferences; Chapter 3 Transport Layer Security; 3.1 INTRODUCTION; 3.2 PROTOCOL EVOLUTION; 3.3 FINAL REMARKS; References; Chapter 4 SSL Protocol; 4.1 INTRODUCTION; 4.2 PROTOCOLS; 4.2.1 SSL Record Protocol; 4.2.2 SSL Handshake Protocol; 4.2.3 SSL Change Cipher Spec Protocol; 4.2.4 SSL Alert Protocol; 4.2.5 SSL Application Data Protocol; 4.3 TRAFFIC ANALYSIS OF AN SSL SESSION; 4.4 SECURITY ANALYSIS; 4.5 FINAL REMARKS; References; Chapter 5 TLS Protocol; 5.1 INTRODUCTION; 5.1.1 TLS PRF; 5.1.2 Generation of KeyingMaterial; 5.2 TLS 1.0; 5.2.1 Cipher Suites.
|
505 |
8 |
|
|a 5.2.2 CertificateManagement5.2.3 Alert Messages; 5.2.4 Other Differences; 5.3 TLS 1.1; 5.3.1 Preliminary Remarks; 5.3.2 Cipher Suites; 5.3.3 CertificateManagement; 5.3.4 Alert Messages; 5.3.5 Other Differences; 5.4 TLS 1.2; 5.4.1 TLS Extensions; 5.4.2 Cipher Suites; 5.4.3 CertificateManagement; 5.4.4 Alert Messages; 5.4.5 Other Differences; 5.5 TRAFFIC ANALYSIS OF A TLS SESSION; 5.6 SECURITY ANALYSIS; 5.7 FINAL REMARKS; References; Chapter 6 DTLS Protocol; 6.1 INTRODUCTION; 6.2 DTLS 1.0; 6.2.1 Record Protocol; 6.2.2 Handshake Protocol; 6.3 DTLS 1.2; 6.4 SECURITY ANALYSIS; 6.5 FINAL REMARKS.
|
504 |
|
|
|a ReferencesChapter 7 Firewall Traversal; 7.1 INTRODUCTION; 7.2 SSL/TLS TUNNELING; 7.3 SSL/TLS PROXYING; 7.4 FINAL REMARKS; References; Chapter 8 Public Key Certificates and PKIs; 8.1 INTRODUCTION; 8.1.1 PGP Certificates; 8.1.2 X.509 Certificates; 8.2 SERVER CERTIFICATES; 8.2.1 Wildcard Certificates; 8.2.2 International Step-Up and SGC Certificates; 8.2.3 Extended Validation Certificates; 8.3 CLIENT CERTIFICATES; 8.4 FINAL REMARKS; References; Chapter 9 Conclusions and Outlook; 9.1 DEPLOYMENT; 9.2 RESEARCH CHALLENGES; 9.2.1 Performance Optimization; 9.2.2 Protection Against MITM Attacks.
|
505 |
8 |
|
|a 9.2.3 Trust Management9.3 FUTURE DEVELOPMENTS; References; Appendix Standardized TLS Cipher Suites; Abbreviations and Acronyms; About the Author; Index.
|
520 |
|
|
|a SSL (secure socket layer) and TLS (Transport Layer Security) are widely deployed security protocols that are used in all kinds of web-based e-commerce and e-business applications and are part of most contemporary security systems available today. This practical book provides a comprehensive introduction to these protocols, offering you a solid understanding of their design. You find discussions on the advantages and disadvantages of using SSL/TLS protocols compared to other Internet security protocols. This authoritative resource shows how to properly employ SSL and TLS and configure security.
|
588 |
0 |
|
|a Print version record.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Computer network protocols.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Internet
|x Security measures.
|
650 |
|
6 |
|a Protocoles de réseaux d'ordinateurs.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Internet
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Computer network protocols
|2 fast
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Internet
|x Security measures
|2 fast
|
758 |
|
|
|i has work:
|a SSL and TLS (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCGDhdbMxG6bRBTbFF6pJKq
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|a Oppliger, Rolf.
|t SSL and TLS : Theory and Practice.
|d Norwood : Artech House, ©2009
|z 9781596934474
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=946557
|z Texto completo
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL946557
|
994 |
|
|
|a 92
|b IZTAP
|