CHAPTER 3 Security Protocols and Algorithms
Network and Internet security are dominated by security protocols. A veritable sea of cryptic abbreviations and acronyms can confuse and confound anyone new to the discipline of security. We will look at some specifics here, covering such protocols as SSL, SSH, and IPSEC. These protocols will be introduced here, and we will cover their histories, but SSL will be given much more attention later on (SSL is so important that it has its own dedicated chapter).
As you may already know, the Internet works on the same principles as your typical Local Area Network (LAN), just at a much larger scale. For this reason, we can look at network and Internet security as being essentially the same. Similar problems ...
Get Practical Embedded Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.