Implementing SSL / TLS Using Cryptography and PKI and over 2 million other books are available for Amazon Kindle . Learn more


or
Sign in to turn on 1-Click ordering.
Trade in Yours
For a 5.64 Gift Card
Trade in
More Buying Choices
Have one to sell? Sell yours here
Sorry, this item is not available in
Image not available for
Colour:
Image not available

 
Start reading Implementing SSL / TLS Using Cryptography and PKI on your Kindle in under a minute.

Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.

Implementing SSL/TLS Using Cryptography and PKI [Paperback]

Joshua Davies
5.0 out of 5 stars  See all reviews (2 customer reviews)
RRP: 42.50
Price: 27.63 & FREE Delivery in the UK. Details
You Save: 14.87 (35%)
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
Only 3 left in stock (more on the way).
Dispatched from and sold by Amazon. Gift-wrap available.
Want it Monday, 14 July? Choose Express delivery at checkout. Details

Formats

Amazon Price New from Used from
Kindle Edition 26.25  
Paperback 27.63  
Trade In this Item for up to 5.64
Trade in Implementing SSL/TLS Using Cryptography and PKI for an Amazon Gift Card of up to 5.64, which you can then spend on millions of items across the site. Trade-in values may vary (terms apply). Learn more

Book Description

14 Jan 2011
Hands–on, practical guide to implementing SSL and TLS protocols for Internet security If you are a network professional who knows C programming, this practical book is for you.  Focused on how to implement Secure Socket Layer (SSL) and Transport Layer Security (TLS), this book guides you through all necessary steps, whether or not you have a working knowledge of cryptography. The book covers SSLv2, TLS 1.0, and TLS 1.2, including implementations of the relevant cryptographic protocols, secure hashing, certificate parsing, certificate generation, and more.  Coverage includes: Understanding Internet Security Protecting against Eavesdroppers with Symmetric Cryptography Secure Key Exchange over an Insecure Medium with Public Key Cryptography Authenticating Communications Using Digital Signatures Creating a Network of Trust Using X.509 Certificates A Usable, Secure Communications Protocol: Client–Side TLS Adding Server–Side TLS 1.0 Support Advanced SSL Topics Adding TLS 1.2 Support to Your TLS Library Other Applications of SSL A Binary Representation of Integers: A Primer Installing TCPDump and OpenSSL Understanding the Pitfalls of SSLv2 Set up and launch a working implementation of SSL with this practical guide.

Special Offers and Product Promotions

  • Spend 30 and get Norton 360 21.0 - 3 Computers, 1 Year 2014 for 24.99. Here's how (terms and conditions apply)

Frequently Bought Together

Implementing SSL/TLS Using Cryptography and PKI + Network Security with OpenSSL: Cryptography for Secure Communications
Buy the selected items together


Product details

  • Paperback: 696 pages
  • Publisher: John Wiley & Sons; 1 edition (14 Jan 2011)
  • Language: English
  • ISBN-10: 0470920416
  • ISBN-13: 978-0470920411
  • Product Dimensions: 24.3 x 18.4 x 3.7 cm
  • Average Customer Review: 5.0 out of 5 stars  See all reviews (2 customer reviews)
  • Amazon Bestsellers Rank: 172,459 in Books (See Top 100 in Books)
  • See Complete Table of Contents

More About the Author

Discover books, learn about writers, and more.

Product Description

From the Back Cover

Let′s get down to a practical implementation of SSL and TLS SSL/TLS is a standardized, widely implemented, peer–reviewed protocol for applying cryptographic primitives to arbitrary networked communications. It provides privacy, integrity, and a measure of authenticity to otherwise inherently untrustworthy network connections. While most books detail the protocol, this one is intended to provide you with a nearly complete SSL/TLS library, developed incrementally using C code. Whether or not you have a working knowledgeof cryptography, you′ll find this practical guide helps you understand the internals of these libraries so that, when it comes time to use one, you will have a firm understanding of what takes place at each stage. Understand secure sockets and the HTTP protocol Learn to protect against eavesdroppers with symmetric cryptography Secure key exchanges over an insecure medium with public key cryptography and boost security with elliptic curve cryptography Examine the use of digital signatures and X.509 certificates Develop a usable, secure communications protocol with client–side TLS Add server–side TLS 1.0 support Use SSL in advanced situations, including safely reusing key material with sessionresumption and verifying identity with client authentication Go to www.wiley.com/go/implementingssl to find code and other features related to this book

About the Author

Joshua Davies is a principal architect for Travelocity.com, responsible for the architecture of the main Web site with a focus on networking and security. Previously, he designed distributed systems for AT&T, Digex, and the Mexican telecommunications giant Pegaso.

Inside This Book (Learn More)
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index
Search inside this book:

What Other Items Do Customers Buy After Viewing This Item?


Customer Reviews

4 star
0
3 star
0
2 star
0
1 star
0
5.0 out of 5 stars
5.0 out of 5 stars
Most Helpful Customer Reviews
5.0 out of 5 stars Great book full of details 1 April 2013
Format:Paperback|Verified Purchase
This must be one of the best works on SSL TLS ever.
Lots of code and gory detail that all developers will love
Comment | 
Was this review helpful to you?
5.0 out of 5 stars Relevant and well explained 16 Feb 2013
Format:Paperback|Verified Purchase
If you want to use and properly understand the mainstream cryptographic tools and algorithms, this book explains them well and in as much depth as you'd like.

Only if you want to design new algorithms, look at the more mathematical books.
Comment | 
Was this review helpful to you?
Most Helpful Customer Reviews on Amazon.com (beta)
Amazon.com: 5.0 out of 5 stars  10 reviews
9 of 9 people found the following review helpful
5.0 out of 5 stars Must read if you want to understand SSL and learn how to use OpenSSL 15 Dec 2012
By Amazon Customer - Published on Amazon.com
Format:Paperback|Verified Purchase
This book is for S/W engineers or students who want to learn SSL and/or use OpenSSL to integrate SSL into their apps.

That OpenSSL book (Network Security with OpenSSL) doesn't work. It cannot even explain OpenSSL APIs well enough, not to mention SSL. I mean, that book tells you to call API foo() first and then bar() next. But it doesn't tell you why. Given so many complicated data structures and APIs involved, you'd be stuck immediately if you want to do something not covered in the book.

But this book shows you all the real world details about SSL, and how to implement an SSL library. The structure of those SSL APIs implemented is similar to OpenSSL. Concepts involved are the same. From this book, you can learn how those concepts and algorithms are pieced together. That's why you'll know how to use OpenSSL after reading this book.

I find the notes on some SSL history across the book are also very useful. These facts are hard to find, and usually not mentioned in formal documents. It helps you understand why SSL works like this today.

Salute to the author !
9 of 9 people found the following review helpful
5.0 out of 5 stars The perfect "by programmers, for programmers" book 8 July 2011
By Ross Canning - Published on Amazon.com
Format:Kindle Edition|Verified Purchase
This book explains a very complex topic (SSL) in a clear, step-by-step fashion.

As well as examining the cryptographic protocols themselves, the author explains the background reasons and history behind their design. He isn't afraid to get into the complex details, but he always stays focused on what's important: designing and implementing SSL. When explaining elliptic curve cryptography, for example, he briefly summarizes the esoteric maths that underlie it - enough to wet your appetite, if you're interested in that kind of thing - but then concentrates on how to actually implement ECC in code.

The author's writing style is friendly, informal and very readable. Even the grammar is near-flawless.

The author provides clear, well-thought-out sample code for everything - right there in the book. No having to download code from a broken link!
12 of 14 people found the following review helpful
5.0 out of 5 stars wow! 5 April 2011
By SB - Published on Amazon.com
Format:Paperback|Verified Purchase
this is a great book to learn cryptography algorithms from in addition to TLS/SSL -- author walks you thru every step -- explains the mechanics of the algorithm, gives examples & then walks thru code -- it is a 'landmark' practictioner's book
4 of 4 people found the following review helpful
5.0 out of 5 stars Perfect 27 Aug 2011
By Mark - Published on Amazon.com
Format:Paperback|Verified Purchase
Exactly what I was looking for. Concepts/algorithms are well explained and paired with good c code implementations. This book is a keeper.
3 of 3 people found the following review helpful
5.0 out of 5 stars This is very useful book 13 Feb 2013
By yamini - Published on Amazon.com
Format:Kindle Edition|Verified Purchase
This book is very good for Developers starting to learn about SSL/TLS. I liked this book so much. This is very useful book.
Were these reviews helpful?   Let us know
Search Customer Reviews
Only search this product's reviews

Customer Discussions

This product's forum
Discussion Replies Latest Post
No discussions yet

Ask questions, Share opinions, Gain insight
Start a new discussion
Topic:
First post:
Prompts for sign-in
 

Search Customer Discussions
Search all Amazon discussions
   


Look for similar items by category


Feedback