If you are looking for a comprehensive, soup-to-nuts resource on SSL/TLS, look no further.
Are you a systems administrator just starting out? A developer looking to not just implement, but to understand? Or perhaps SSL/TLS has been a topic you\'ve avoided over the ye.
This book, geared towards bridging the gap between the absolute beginner and the veteran IT Professional, combines the theoretical and the practical in equal measure.
The first half of our book focuses on foundational theory, covering topics such as: Symmetric vs Asymmetric cryptographyOne-Way functionsDigital SignaturesKey GenerationHistory and Context The second half encourages fledgling administrators to jump in with both feet, outlining the quirks of common tasks such as: Generating a signing request for a certificate (CSR)Generating a self-signed certificate (and when it is safe to do or not do so)Converting certificates between different formats including java keystoresConfiguring servers to meet best practices, not in a vacuum, but for the security and compatibility needs of your business vertical.
This is the Black and White edition.
If you are looking for a comprehensive, soup-to-nuts resource on SSL/TLS, look no further.
This is the Black and White edition.
You can read this book cover to cover, crosswalk to the copiously linked RFCs, or use it as a desk reference.
This is SSL/TLS for everyone.
Are you a systems administrator just starting out? A developer looking to not just implement, but to understand? Or perhaps SSL/TLS has been a topic you\'ve avoided over the years because it is very dense and implementation can be fraught with fidgety pitfalls.
This book, geared towards bridging the gap between the absolute beginner and the veteran IT Professional, combines the theoretical and the practical in equal measure.
The first half of our book focuses on foundational theory, covering topics such as: Symmetric vs Asymmetric cryptographyOne-Way functionsDigital SignaturesKey GenerationHistory and Context The second half encourages fledgling administrators to jump in with both feet, outlining the quirks of common tasks such as: Generating a signing request for a certificate (CSR)Generating a self-signed certificate (and when it is safe to do or not do so)Converting certificates between different formats including java keystoresConfiguring servers to meet best practices, not in a vacuum, but for the security and compatibility needs of your business vertical.
If you are looking for a comprehensive, soup-to-nuts resource on SSL/TLS, look no further