September 2002
Intermediate to advanced
656 pages
22h 14m
English
The four chapters in Part III present a suite of techniques and technologies to track identity, enforce security, and control access to content:
Chapter 11 talks about techniques to identify users, so content can be personalized to the user audience.
Chapter 12 highlights the basic mechanisms to verify user identity. This chapter also examines how HTTP authentication interfaces with databases.
Chapter 13 explains digest authentication, a complex proposed enhancement to HTTP that provides significantly enhanced security.
Chapter 14 is a detailed overview of Internet cryptography, digital certificates, and the Secure Sockets Layer (SSL).