Skip to Main Content
Hack Proofing Your Web Applications
book

Hack Proofing Your Web Applications

by Syngress
June 2001
Intermediate to advanced content levelIntermediate to advanced
512 pages
18h 49m
English
Syngress
Content preview from Hack Proofing Your Web Applications
Developing Security-Enabled Applications • Chapter 11 461
connections. SSL makes it possible for SSL-enabled clients and servers to
authenticate themselves to each other and to encrypt and decrypt all
data passed between them, as well as to detect tampering of data, after a
secure encrypted connection has been established.
SSL is made up of two protocols, the SSL record protocol and the
SSL handshake protocol.These protocols facilitate the definition of the
data format that is used in the transaction and to negotiate the level of
encryption and authentication used. SSL supports a broad range of
encryption algorithms, the most common of which include the ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Developer's Guide to Web Application Security

Developer's Guide to Web Application Security

Michael Cross
The CERT® Oracle® Secure Coding Standard for Java™

The CERT® Oracle® Secure Coding Standard for Java™

Fred Long, Dhruv Mohindra, Robert C. Seacord, Dean F. Sutherland, David Svoboda
Troubleshooting CentOS

Troubleshooting CentOS

Jonathan Hobson

Publisher Resources

ISBN: 9781928994312