SSL and TLS :: theory and practice /
This completely expanded second edition of SSL and TLS: Theory and Practice provides modernized material and a comprehensive overview of the SSL/TLS and DTLS protocols, including topics such as firewall traversal and public key certificates. SSL (secure socket layer) and TLS (Transport Layer Securit...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Norwood, MA :
Artech House,
[2016]
|
Ausgabe: | Second edition. |
Schriftenreihe: | Artech House information security and privacy series.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | This completely expanded second edition of SSL and TLS: Theory and Practice provides modernized material and a comprehensive overview of the SSL/TLS and DTLS protocols, including topics such as firewall traversal and public key certificates. SSL (secure socket layer) and TLS (Transport Layer Security) are widely deployed security protocols that are used in all kinds of web-based e-commerce and e-business applications and are part of most contemporary security systems available today. This practical book provides a complete introduction to these protocols, offering readers a solid understanding of their design. Updates to this edition include coverage of recent attacks mounted against SSL/TLS, new broad TLS extensions, and discussions on the importance of public key certificates and Internet PKI. Readers gain perspective on the many extensions that are available in the latest TLS protocol such as cipher suites, certificate management, and alert messages. This book includes coverage on the advantages and disadvantages of using SSL/TLS protocols compared to other Internet security protocols and provides the details necessary to correctly implement the protocols while saving time on the security practitioner's side. |
Beschreibung: | 1 online resource : illustrations |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781608079995 1608079996 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn960822729 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 161017t20162016maua ob 001 0 eng | ||
040 | |a AAA |b eng |e rda |e pn |c AAA |d OCLCO |d YDX |d N$T |d OCL |d COO |d SNK |d DKU |d INTCL |d UAB |d IGB |d D6H |d OCLCQ |d VTS |d CUV |d AGLDB |d G3B |d S8J |d S9I |d STF |d M8D |d UKAHL |d VT2 |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
019 | |a 1022774550 |a 1023562423 |a 1235827167 | ||
020 | |a 9781608079995 |q (electronic bk.) | ||
020 | |a 1608079996 |q (electronic bk.) | ||
020 | |z 9781608079988 |q (print) | ||
020 | |z 1608079988 |q (print) | ||
020 | |z 9711608079995 | ||
024 | 8 | |a 40026098932 | |
035 | |a (OCoLC)960822729 |z (OCoLC)1022774550 |z (OCoLC)1023562423 |z (OCoLC)1235827167 | ||
050 | 4 | |a TK5105.59 | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
082 | 7 | |a 005.8 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Oppliger, Rolf, |e author. |0 http://id.loc.gov/authorities/names/n96000042 | |
245 | 1 | 0 | |a SSL and TLS : |b theory and practice / |c Rolf Oppliger. |
250 | |a Second edition. | ||
264 | 1 | |a Norwood, MA : |b Artech House, |c [2016] | |
264 | 4 | |c ©2016 | |
300 | |a 1 online resource : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a data file | ||
490 | 1 | |a Artech House Information Security and Privacy Series | |
588 | 0 | |a Print version record. | |
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Chapter 1. Introduction -- Chapter 2. SSL Protocol -- Chapter 3. TLS Protocol -- Chapter 4. DTLS Protocol -- Chapter 5. Firewall Traversal -- Chapter 6. Public Key Certificates and Internet PKI -- Chapter 7. Concluding Remarks -- References -- Appendix A. Registered TLS Cipher Suites -- Appendix B. Padding Oracle Attacks -- Appendix C. Abbreviations and Acronyms. | |
520 | 8 | |a This completely expanded second edition of SSL and TLS: Theory and Practice provides modernized material and a comprehensive overview of the SSL/TLS and DTLS protocols, including topics such as firewall traversal and public key certificates. SSL (secure socket layer) and TLS (Transport Layer Security) are widely deployed security protocols that are used in all kinds of web-based e-commerce and e-business applications and are part of most contemporary security systems available today. This practical book provides a complete introduction to these protocols, offering readers a solid understanding of their design. Updates to this edition include coverage of recent attacks mounted against SSL/TLS, new broad TLS extensions, and discussions on the importance of public key certificates and Internet PKI. Readers gain perspective on the many extensions that are available in the latest TLS protocol such as cipher suites, certificate management, and alert messages. This book includes coverage on the advantages and disadvantages of using SSL/TLS protocols compared to other Internet security protocols and provides the details necessary to correctly implement the protocols while saving time on the security practitioner's side. |c Publisher. | |
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 0 | |a World Wide Web |x Security measures. | |
650 | 0 | |a Computer network protocols. |0 http://id.loc.gov/authorities/subjects/sh85029512 | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 6 | |a Web |x Sécurité |x Mesures. | |
650 | 6 | |a Protocoles de réseaux d'ordinateurs. | |
650 | 7 | |a COMPUTERS |x Security |x Networking. |2 bisacsh | |
650 | 7 | |a World Wide Web |x Security measures |2 fast | |
650 | 7 | |a Computer network protocols |2 fast | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
758 | |i has work: |a SSL and TLS (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGDhdbMxG6bRBTbFF6pJKq |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Oppliger, Rolf. |t SSL and TLS. |b Second edition. |d Boston : Artech House, [2016] |z 1608079988 |w (DLC) 2017446675 |w (OCoLC)951909923 |
830 | 0 | |a Artech House information security and privacy series. |0 http://id.loc.gov/authorities/names/no2007048455 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1498635 |3 Volltext |
938 | |a Askews and Holts Library Services |b ASKH |n AH36468436 | ||
938 | |a EBSCOhost |b EBSC |n 1498635 | ||
938 | |a IEEE |b IEEE |n 9100888 | ||
938 | |a YBP Library Services |b YANK |n 13779359 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn960822729 |
---|---|
_version_ | 1816882365576773632 |
adam_text | |
any_adam_object | |
author | Oppliger, Rolf |
author_GND | http://id.loc.gov/authorities/names/n96000042 |
author_facet | Oppliger, Rolf |
author_role | aut |
author_sort | Oppliger, Rolf |
author_variant | r o ro |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 |
callnumber-search | TK5105.59 |
callnumber-sort | TK 45105.59 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-4-EBA |
contents | Chapter 1. Introduction -- Chapter 2. SSL Protocol -- Chapter 3. TLS Protocol -- Chapter 4. DTLS Protocol -- Chapter 5. Firewall Traversal -- Chapter 6. Public Key Certificates and Internet PKI -- Chapter 7. Concluding Remarks -- References -- Appendix A. Registered TLS Cipher Suites -- Appendix B. Padding Oracle Attacks -- Appendix C. Abbreviations and Acronyms. |
ctrlnum | (OCoLC)960822729 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | Second edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04546cam a2200661 i 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn960822729</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">161017t20162016maua ob 001 0 eng </controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">AAA</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">AAA</subfield><subfield code="d">OCLCO</subfield><subfield code="d">YDX</subfield><subfield code="d">N$T</subfield><subfield code="d">OCL</subfield><subfield code="d">COO</subfield><subfield code="d">SNK</subfield><subfield code="d">DKU</subfield><subfield code="d">INTCL</subfield><subfield code="d">UAB</subfield><subfield code="d">IGB</subfield><subfield code="d">D6H</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">CUV</subfield><subfield code="d">AGLDB</subfield><subfield code="d">G3B</subfield><subfield code="d">S8J</subfield><subfield code="d">S9I</subfield><subfield code="d">STF</subfield><subfield code="d">M8D</subfield><subfield code="d">UKAHL</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">1022774550</subfield><subfield code="a">1023562423</subfield><subfield code="a">1235827167</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781608079995</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1608079996</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781608079988</subfield><subfield code="q">(print)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1608079988</subfield><subfield code="q">(print)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9711608079995</subfield></datafield><datafield tag="024" ind1="8" ind2=" "><subfield code="a">40026098932</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)960822729</subfield><subfield code="z">(OCoLC)1022774550</subfield><subfield code="z">(OCoLC)1023562423</subfield><subfield code="z">(OCoLC)1235827167</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.59</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Oppliger, Rolf,</subfield><subfield code="e">author.</subfield><subfield code="0">http://id.loc.gov/authorities/names/n96000042</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">SSL and TLS :</subfield><subfield code="b">theory and practice /</subfield><subfield code="c">Rolf Oppliger.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Second edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Norwood, MA :</subfield><subfield code="b">Artech House,</subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">data file</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Artech House Information Security and Privacy Series</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Chapter 1. Introduction -- Chapter 2. SSL Protocol -- Chapter 3. TLS Protocol -- Chapter 4. DTLS Protocol -- Chapter 5. Firewall Traversal -- Chapter 6. Public Key Certificates and Internet PKI -- Chapter 7. Concluding Remarks -- References -- Appendix A. Registered TLS Cipher Suites -- Appendix B. Padding Oracle Attacks -- Appendix C. Abbreviations and Acronyms.</subfield></datafield><datafield tag="520" ind1="8" ind2=" "><subfield code="a">This completely expanded second edition of SSL and TLS: Theory and Practice provides modernized material and a comprehensive overview of the SSL/TLS and DTLS protocols, including topics such as firewall traversal and public key certificates. SSL (secure socket layer) and TLS (Transport Layer Security) are widely deployed security protocols that are used in all kinds of web-based e-commerce and e-business applications and are part of most contemporary security systems available today. This practical book provides a complete introduction to these protocols, offering readers a solid understanding of their design. Updates to this edition include coverage of recent attacks mounted against SSL/TLS, new broad TLS extensions, and discussions on the importance of public key certificates and Internet PKI. Readers gain perspective on the many extensions that are available in the latest TLS protocol such as cipher suites, certificate management, and alert messages. This book includes coverage on the advantages and disadvantages of using SSL/TLS protocols compared to other Internet security protocols and provides the details necessary to correctly implement the protocols while saving time on the security practitioner's side.</subfield><subfield code="c">Publisher.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">World Wide Web</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer network protocols.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85029512</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Web</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Protocoles de réseaux d'ordinateurs.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">Networking.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">World Wide Web</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer network protocols</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">SSL and TLS (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGDhdbMxG6bRBTbFF6pJKq</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Oppliger, Rolf.</subfield><subfield code="t">SSL and TLS.</subfield><subfield code="b">Second edition.</subfield><subfield code="d">Boston : Artech House, [2016]</subfield><subfield code="z">1608079988</subfield><subfield code="w">(DLC) 2017446675</subfield><subfield code="w">(OCoLC)951909923</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Artech House information security and privacy series.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2007048455</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1498635</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH36468436</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">1498635</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">IEEE</subfield><subfield code="b">IEEE</subfield><subfield code="n">9100888</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">13779359</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn960822729 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:27:27Z |
institution | BVB |
isbn | 9781608079995 1608079996 |
language | English |
oclc_num | 960822729 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Artech House, |
record_format | marc |
series | Artech House information security and privacy series. |
series2 | Artech House Information Security and Privacy Series |
spelling | Oppliger, Rolf, author. http://id.loc.gov/authorities/names/n96000042 SSL and TLS : theory and practice / Rolf Oppliger. Second edition. Norwood, MA : Artech House, [2016] ©2016 1 online resource : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier data file Artech House Information Security and Privacy Series Print version record. Includes bibliographical references and index. Chapter 1. Introduction -- Chapter 2. SSL Protocol -- Chapter 3. TLS Protocol -- Chapter 4. DTLS Protocol -- Chapter 5. Firewall Traversal -- Chapter 6. Public Key Certificates and Internet PKI -- Chapter 7. Concluding Remarks -- References -- Appendix A. Registered TLS Cipher Suites -- Appendix B. Padding Oracle Attacks -- Appendix C. Abbreviations and Acronyms. This completely expanded second edition of SSL and TLS: Theory and Practice provides modernized material and a comprehensive overview of the SSL/TLS and DTLS protocols, including topics such as firewall traversal and public key certificates. SSL (secure socket layer) and TLS (Transport Layer Security) are widely deployed security protocols that are used in all kinds of web-based e-commerce and e-business applications and are part of most contemporary security systems available today. This practical book provides a complete introduction to these protocols, offering readers a solid understanding of their design. Updates to this edition include coverage of recent attacks mounted against SSL/TLS, new broad TLS extensions, and discussions on the importance of public key certificates and Internet PKI. Readers gain perspective on the many extensions that are available in the latest TLS protocol such as cipher suites, certificate management, and alert messages. This book includes coverage on the advantages and disadvantages of using SSL/TLS protocols compared to other Internet security protocols and provides the details necessary to correctly implement the protocols while saving time on the security practitioner's side. Publisher. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 World Wide Web Security measures. Computer network protocols. http://id.loc.gov/authorities/subjects/sh85029512 Réseaux d'ordinateurs Sécurité Mesures. Web Sécurité Mesures. Protocoles de réseaux d'ordinateurs. COMPUTERS Security Networking. bisacsh World Wide Web Security measures fast Computer network protocols fast Computer networks Security measures fast has work: SSL and TLS (Text) https://id.oclc.org/worldcat/entity/E39PCGDhdbMxG6bRBTbFF6pJKq https://id.oclc.org/worldcat/ontology/hasWork Print version: Oppliger, Rolf. SSL and TLS. Second edition. Boston : Artech House, [2016] 1608079988 (DLC) 2017446675 (OCoLC)951909923 Artech House information security and privacy series. http://id.loc.gov/authorities/names/no2007048455 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1498635 Volltext |
spellingShingle | Oppliger, Rolf SSL and TLS : theory and practice / Artech House information security and privacy series. Chapter 1. Introduction -- Chapter 2. SSL Protocol -- Chapter 3. TLS Protocol -- Chapter 4. DTLS Protocol -- Chapter 5. Firewall Traversal -- Chapter 6. Public Key Certificates and Internet PKI -- Chapter 7. Concluding Remarks -- References -- Appendix A. Registered TLS Cipher Suites -- Appendix B. Padding Oracle Attacks -- Appendix C. Abbreviations and Acronyms. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 World Wide Web Security measures. Computer network protocols. http://id.loc.gov/authorities/subjects/sh85029512 Réseaux d'ordinateurs Sécurité Mesures. Web Sécurité Mesures. Protocoles de réseaux d'ordinateurs. COMPUTERS Security Networking. bisacsh World Wide Web Security measures fast Computer network protocols fast Computer networks Security measures fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh94001277 http://id.loc.gov/authorities/subjects/sh85029512 |
title | SSL and TLS : theory and practice / |
title_auth | SSL and TLS : theory and practice / |
title_exact_search | SSL and TLS : theory and practice / |
title_full | SSL and TLS : theory and practice / Rolf Oppliger. |
title_fullStr | SSL and TLS : theory and practice / Rolf Oppliger. |
title_full_unstemmed | SSL and TLS : theory and practice / Rolf Oppliger. |
title_short | SSL and TLS : |
title_sort | ssl and tls theory and practice |
title_sub | theory and practice / |
topic | Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 World Wide Web Security measures. Computer network protocols. http://id.loc.gov/authorities/subjects/sh85029512 Réseaux d'ordinateurs Sécurité Mesures. Web Sécurité Mesures. Protocoles de réseaux d'ordinateurs. COMPUTERS Security Networking. bisacsh World Wide Web Security measures fast Computer network protocols fast Computer networks Security measures fast |
topic_facet | Computer networks Security measures. World Wide Web Security measures. Computer network protocols. Réseaux d'ordinateurs Sécurité Mesures. Web Sécurité Mesures. Protocoles de réseaux d'ordinateurs. COMPUTERS Security Networking. World Wide Web Security measures Computer network protocols Computer networks Security measures |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1498635 |
work_keys_str_mv | AT oppligerrolf sslandtlstheoryandpractice |