Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications

Buy

FULLY REVISED IN JUNE 2017.

Bulletproof SSL and TLS is a complete guide to using SSL and TLS encryption to deploy secure servers and web applications. Written by Ivan Ristic, the author of the popular SSL Labs web site, this book will teach you everything you need to know to protect your systems from eavesdropping and impersonation attacks.

In this book, you'll find just the right mix of theory, protocol detail, vulnerability and weakness information, and deployment advice to get your job done:

  • Comprehensive coverage of the ever-changing field of SSL/TLS and Internet PKI, with updates to the digital version
  • For IT security professionals, help to understand the risks
  • For system administrators, help to deploy systems securely
  • For developers, help to design and implement secure web applications
  • Practical and concise, with added depth when details are relevant
  • Introduction to cryptography and the latest TLS protocol version
  • Discussion of weaknesses at every level, covering implementation issues, HTTP and browser problems, and protocol vulnerabilities
  • Coverage of the latest attacks, such as BEAST, CRIME, BREACH, Lucky 13, RC4 biases, Triple Handshake Attack, and Heartbleed
  • Thorough deployment advice, including advanced technologies, such as Strict Transport Security, Content Security Policy, and pinning
  • Guide to using OpenSSL to generate keys and certificates and to create and run a private certification authority
  • Guide to using OpenSSL to test servers for vulnerabilities
  • Practical advice for secure server configuration using Apache httpd, IIS, Java, Nginx, Microsoft Windows, and Tomcat

This book is available in paperback and a variety of digital formats without DRM. Digital version of Bulletproof SSL and TLS can be obtained directly from the author, at feistyduck.com.

(HTML tags aren't allowed.)

Physical Health of Adults with Intellectual and Developmental Disabilities
Physical Health of Adults with Intellectual and Developmental Disabilities

This fully revised and expanded second edition brings together findings from research and clinical practice, with comprehensive coverage of the important aspects of physical health in persons with intellectual disability. Professionals involved in the medical and social care and support of persons with intellectual disability should...

Policies and Research in Identity Management: Second IFIP WG 11.6 Working Conference
Policies and Research in Identity Management: Second IFIP WG 11.6 Working Conference

The world of the twenty-first century is, more than ever, global and impersonal. Criminal and terrorist threats, both physical and on the Internet, increase by the day. The demand for better methods of identification is growing, not only in companies and organizations, but also in the world at large.

Identity management is put...

DB2 Express-c: The Developer Handbook for Xml, Php, C/c++, Java, and .net
DB2 Express-c: The Developer Handbook for Xml, Php, C/c++, Java, and .net
This IBM® Redbook will help you get started in application development with XML, PHP, C/C++, Java™, and .NET using the free IBM database management system offering DB2® Express-C V9. This book is organized as follows:

* Chapter 1
...

The Jazz Process: Collaboration, Innovation, and Agility
The Jazz Process: Collaboration, Innovation, and Agility

"An insider’s guide to translating the creative techniques of jazz to the business world.”

Scott Berkun, author of The Myths of Innovation

 

What Can Your Team Learn From Jazz...

Microsoft  Windows  Small Business Server 2003 R2 Administrator's Companion
Microsoft Windows Small Business Server 2003 R2 Administrator's Companion
Get comprehensive information to deploy, manage, and troubleshoot Microsoft Windows Small Business Server 2003 R2 for messaging and collaboration, Internet access, database storage, printing, faxing, support for line-of-business applications, and end-to-end network administration.

The first time you noticed Microsoft...

Network Attacks and Defenses: A Hands-on Approach
Network Attacks and Defenses: A Hands-on Approach

The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is a growing requirement to counter the threat. Network security education generally lacks appropriate textbooks with detailed, hands-on exercises that include both...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy