Vous en avez un à vendre?

SSL et TLS : Conception et construction de systèmes sécurisés par Eric Rescorla (2000,...

État :
Bon
Prix :
4,10 $US
Environ5,63 $C
Expédition :
3,99 $US (environ 5,48 $C) Expédition au tarif économique. En savoir plussur l'expédition
Lieu : Suwanee, Georgia, États-Unis
Livraison :
Livraison prévue entre le lun. 24 juin et le ven. 28 juin à 43230
Le délai de livraison est estimé en utilisant notre méthode exclusive, basée sur la proximité de l'acheteur du lieu où se trouve l'objet, le service d'expédition sélectionné, l'historique d'expédition du vendeur et d'autres facteurs. Les délais de livraison peuvent varier, particulièrement lors de périodes achalandées.
Paiements :
     

Magasinez en toute confiance

Garantie de remboursement eBay
Recevez l'objet commandé ou obtenez un remboursement. 

Informations sur le vendeur

Le vendeur assume l'entière responsabilité de cette annonce.
Numéro de l'objet eBay :175573343329

Caractéristiques de l'objet

État
Bon: Un livre qui a été lu, mais qui est en bon état. La couverture présente des dommages infimes, ...
Subject
Internet / General, Networking / Vendor Specific, Security / Networking, Networking / Network Protocols
ISBN
9780201615982
Subject Area
Computers
Publication Name
Ssl and Tls : Designing and Building Secure Systems
Publisher
Addison Wesley Professional
Item Length
9.1 in
Publication Year
2000
Type
Textbook
Format
Trade Paperback
Language
English
Item Height
1.3 in
Author
Eric Rescorla
Item Weight
28.8 Oz
Item Width
7 in
Number of Pages
528 Pages

À propos de ce produit

Product Information

This is the best book on SSL/TLS. Rescorla knows SSL/TLS as well as anyone and presents it both clearly and completely.... At times, I felt like hes been looking over my shoulder when I designed SSL v3. If network security matters to you, buy this book. Paul Kocher, Cryptography Research, Inc. Co-Designer of SSL v3 Having the right crypto is necessary but not sufficient to having secure communications. If youre using SSL/TLS, you should have SSL and TLS sitting on your shelf right next to Applied Cryptography. Bruce Schneier, Counterpane Internet Security, Inc. Author of Applied Cryptography Everything you wanted to know about SSL/TLS in one place. It covers the protocols down to the level of packet traces. It covers how to write software that uses SSL/TLS. And it contrasts SSL with other approaches. All this while being technically sound and readable Radia Perlman, Sun Microsystems, Inc. Author of Interconnections Secure Sockets Layer (SSL) and its IETF successor, Transport Layer Security (TLS), are the leading Internet security protocols, providing security for e-commerce, web services, and many other network functions. Using SSL/TLS effectively requires a firm grasp of it

Product Identifiers

Publisher
Addison Wesley Professional
ISBN-10
0201615983
ISBN-13
9780201615982
eBay Product ID (ePID)
1744568

Product Key Features

Number of Pages
528 Pages
Language
English
Publication Name
Ssl and Tls : Designing and Building Secure Systems
Publication Year
2000
Subject
Internet / General, Networking / Vendor Specific, Security / Networking, Networking / Network Protocols
Type
Textbook
Subject Area
Computers
Author
Eric Rescorla
Format
Trade Paperback

Dimensions

Item Height
1.3 in
Item Weight
28.8 Oz
Item Length
9.1 in
Item Width
7 in

Additional Product Features

LCCN
00-057593
Dewey Edition
21
Target Audience
Scholarly & Professional
Illustrated
Yes
Dewey Decimal
005.8
Lc Classification Number
Tk5105.59.R47 2001
Table of Content
Preface. 1. Security Concepts. Introduction. The Internet Threat Model. The Players. The Goals of Security. Tools of the Trade. Putting It All Together. A Simple Secure Messaging System. A Simple Secure Channel. The Export Situation. Real Cryptographic Algorithms. Symmetric Encryption: Stream Ciphers. Symmetric Encryption: Block Ciphers. Digest Algorithms. Key Establishment. Digital Signature. MACs. Key Length. Summary. 2. Introduction to SSL. Introduction. Standards and Standards Bodies. SSL Over view. SSL/TLS Design Goals. SSL and the TCP/IP Suite. SSL History. SSL for the Web. Everything over SSL. Getting SSL. Summary. 3. Basic SSL. Introduction. SSL Over view. Handshake. SSL Record Protocol. Putting the Pieces Together. A Real Connection. Some More Connection Details. SSL Specification Language. Handshake Message Structure. Handshake Messages. Key Derivation. Record Protocol. Alerts and Closure. Summary. 4. Advanced SSL. Introduction. Session Resumption. Client Authentication. Ephemeral RSA. Rehandshake. Server Gated Cryptography. DSS and DH. Elliptic Curve Cipher Suites. Kerberos. FORTEZZA. The Story So Far. Session Resumption Details. Client Authentication Details. Ephemeral RSA Details. SGC Details. DH/DSS Details. FORTEZZA Details. Error Alerts. SSLv2 Backward Compatibility. Summary. 5. SSL Security. Introduction. What SSL Provides. Protect the master_secret. Protect the Server''s Private Key. Use Good Randomness. Check the Certificate Chain. Algorithm Selection. The Story So Far. Compromise of the master_secret. Protecting Secrets in Memory. Securing the Server''s Private Key. Random Number Generation. Certificate Chain Verification. Partial Compromise. Known Attacks. Timing Cryptanalysis. Million Message Attack. Small-Subgroup Attack. Downgrade to Export. Summary. 6. SSL Performance. Introduction. SSL Is Slow. Performance Principles. Cryptography Is Expensive. Session Resumption. Handshake Algorithm and Key Choice. Bulk Data Transfer. Basic SSL Performance Rules. The Story So Far. Handshake Time Allocation. Normal RSA Mode. RSA with Client Authentication. Ephemeral RSA. DSS/DHE. DSS/DHE with Client Authentication. Performance Improvements with DH. Record Processing. Java. SSL Servers under Load. Hardware Acceleration. Inline Hardware Accelerators. Network Latency. The Nagle Algorithm. Handshake Buffering. Advanced SSL Performance Rules. Summary. 7. Designing with SSL. Introduction. Know What You Want to Secure. Client Authentication Options. Reference Integrity. Inappropriate Tasks. Protocol Selection. Reducing Handshake Overhead. Design Strategy. The Story So Far. Separate Ports. Upward Negotiation. Downgrade Attacks. Reference Integrity. Username/Password Authentication. SSL Client Authentication. Mutual Username/Password Authentication. Rehandshake. Secondary Channels. Closure. Summary. 8. Coding with SSL. Introduction. SSL Implementations. Sample Programs. Context Initialization. Client Connect. Server Accept. Simple I/O Handling. Multiplexed I/O Using Threads. Multiplexed I/O with select(). Closure. Session Resumption. What''s Missing? Summary. 9. HTTP over SSL. Introduction. Securing the Web. HTTP. HTML. URLs. HTTP Connection Behavior. Proxies. Virtual Hosts. Protocol Selection. Client Authentication. Reference Integrity. HTTPS. HTTPS Overview. URLs and Reference Integrity. Connection Closure. Proxies. Virtual Hosts. Client Authentication. Referrer. Substitution Attacks.
Copyright Date
2001

Description de l'objet du vendeur

desert.fox

desert.fox

100% d'évaluations positives
11 objets vendus
Autres objets du vendeurContacter

Évaluations et avis sur le produit

Aucune évaluation ni aucun avis jusqu'à maintenant.
Soyez le premier à rédiger un avis.