Bulletproof TLS and PKI, Second Edition: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications

Bulletproof TLS and PKI, Second Edition: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications
Author :
Publisher : Feisty Duck
Total Pages : 512
Release :
ISBN-10 : 1907117091
ISBN-13 : 9781907117091
Rating : 4/5 (091 Downloads)

Book Synopsis Bulletproof TLS and PKI, Second Edition: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications by : Ivan Ristic

Download or read book Bulletproof TLS and PKI, Second Edition: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications written by Ivan Ristic and published by Feisty Duck. This book was released on 2022-01-10 with total page 512 pages. Available in PDF, EPUB and Kindle. Book excerpt: Bulletproof TLS and PKI is a complete guide to using TLS encryption and PKI to deploy secure servers and web applications. Written by Ivan Ristic, author of the popular SSL Labs web site, this book will teach you everything you need to know to protect your systems from eavesdropping and impersonation attacks. In this book, you'll find just the right mix of theory, protocol detail, vulnerability and weakness information, and deployment advice to get your job done: Comprehensive coverage of the ever-changing field of SSL/TLS and Internet PKI, with updates to the digital version For IT professionals, help to understand security risks For system administrators, help to deploy systems securely For developers, help to secure web applications Practical and concise, with added depth as needed Introduction to cryptography and the Internet threat model Coverage of TLS 1.3 as well as earlier protocol versions Discussion of weaknesses at every level, covering implementation issues, HTTP and browser problems, and protocol vulnerabilities Coverage of the latest attacks, such as BEAST, CRIME, BREACH, Lucky 13, RC4 biases, Triple Handshake Attack, and Heartbleed Thorough deployment advice, including advanced technologies, such as Strict Transport Security, Content Security Policy, and pinning Guide to using OpenSSL to generate keys and certificates and to create and run a private certification authority Guide to using OpenSSL to test servers for vulnerabilities This book is also available in a variety of digital formats directly from the publisher. Visit us at www.feistyduck.com.


Bulletproof TLS and PKI, Second Edition: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications Related Books

Bulletproof TLS and PKI, Second Edition: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications
Language: en
Pages: 512
Authors: Ivan Ristic
Categories: Computers
Type: BOOK - Published: 2022-01-10 - Publisher: Feisty Duck

GET EBOOK

Bulletproof TLS and PKI is a complete guide to using TLS encryption and PKI to deploy secure servers and web applications. Written by Ivan Ristic, author of the
Bulletproof SSL and TLS
Language: en
Pages: 528
Authors: Ivan Ristic
Categories: Computers
Type: BOOK - Published: 2014 - Publisher: Feisty Duck

GET EBOOK

Bulletproof SSL and TLS is a complete guide to using SSL and TLS encryption to deploy secure servers and web applications. Written by Ivan Ristic, the author of
OpenSSL Cookbook
Language: en
Pages: 62
Authors: Ivan Ristic
Categories: Computers
Type: BOOK - Published: 2013-10-03 - Publisher: Feisty Duck

GET EBOOK

A guide to the most frequently used OpenSSL features and commands, written by Ivan Ristic. Comprehensive coverage of OpenSSL installation, configuration, and ke
Understanding PKI
Language: en
Pages: 360
Authors: Carlisle Adams
Categories: Computers
Type: BOOK - Published: 2003 - Publisher: Addison-Wesley Professional

GET EBOOK

PKI (public-key infrastructure) enables the secure exchange of data over otherwise unsecured media, such as the Internet. PKI is the underlying cryptographic se
Network Security with OpenSSL
Language: en
Pages: 387
Authors: John Viega
Categories: Computers
Type: BOOK - Published: 2002-06-17 - Publisher: "O'Reilly Media, Inc."

GET EBOOK

Most applications these days are at least somewhat network aware, but how do you protect those applications against common network security threats? Many develo