دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش:
نویسندگان: Michael W. Lucas
سری:
ISBN (شابک) : 9781642350524, 9781642350517
ناشر:
سال نشر:
تعداد صفحات: 239
زبان: English
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود)
حجم فایل: 4 مگابایت
در صورت تبدیل فایل کتاب TLS Mastery به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب تسلط TLS نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
Acknowledgements Chapter 0: Introduction Who Should Read This Book? TLS, SSL, and Versions Why TLS? Using openssl(1) The OpenSSL Manual The United States and FIPS Applications and TLS TLS versus DTLS Encryption and This Book What’s in This Book Chapter 1: TLS Cryptography Hashes and Cryptographic Hashes Symmetric Encryption Public Key Encryption Message Authentication Codes Digital Signatures Key Lengths Breaking Algorithms Cipher Suites Cipher Suite Names Alternate Cipher Names Included Cipher Suites Cipher Lists and Cipher Ordering When HIGH Isn’t Enough Trust Models and Certificate Authorities Private Key Protection TLS Resumption TLS Secure Renegotiation Perfect Forward Secrecy Server Name Indication Chapter 2: TLS Connections Connecting to Ports Connecting versus Debugging Line Feeds, Carriage Returns, and Newlines TLS-Dedicated TCP Ports Opportunistic TLS Connection Commands DTLS Silencing s_client Specific TLS Versions Choosing Ciphers Chapter 3: Certificates Certificate Standards Trust Anchors Making Your Own Trust Bundle The OpenSSL Trust Bundle Certificate Components Extensions and Constraints Validation Levels Trust and Your Certificate The Chain of Trust Intermediate CAs The Tree of Trust Certificate Validation Encoding Distinguished Encoding Rules (DER) Privacy-Enhanced Mail (PEM) Converting Between Encodings OpenSSL Without Input Files PKCS #12 Creating a PKCS #12 File Viewing a PKCS #12 File Exporting From PKCS#12 Files Certificate Contents Certificate Extensions Certificate Transparency Digital Signature Incomprehensible Certificate Information Skip Keys and Signatures Multi-Name Certificates Wildcard Certificates Viewing Remote Certificates Choosing a CA Chapter 4: Revocation and Invalidation Revoking Certificates Certificate Revocation Lists Online Certificate Status Protocol OCSP Stapling Revocation Failures Browsers Versus Revocation Validation Solutions Chapter 5: TLS Negotiation Certificate Validation Protocol Settings Session and Resumption TLS 1.2 Session and Resumption TLS 1.3 Session and Resumption TLS Failure Examples Chapter 6: Certificate Signing Requests and Commercial CAs Reusing CSRs Why Go Commercial? Gathering Information Public Key Algorithm Common Names OpenSSL Configuration Files Creating CSRs Creating ECDSA CSRs Main req Section Password Management req_distinguished_name Extensions Elliptic Curve Parameters Files Requesting ECDSA Certificates Generating RSA CSRs RSA CSR Configuration File Requesting RSA Certificates Client CSRs Certificates Without Subjects CSRs Without Configuration Files Viewing CSRs Using the CSR and Certificate Reconnecting Files and Finding Reused Keys Chapter 7: Automated Certificate Management Environment How ACME Works ACME Registration ACME Process ACME Challenges HTTP-01 DNS-01 TLS-ALPN-01 Which Challenge Should I Use? Testing ACME ACME clients Dehydrated Dehydrated Hooks Certificate Directory and User Core Dehydrated Configuration Changing CAs Additional Settings Domain List Dehydrated with HTTP-01 Web Server Setup Apache Configuration HTTP-01 Hook Script Running Dehydrated The Dehydrated Directory The Certificate Directory Archiving Certificates Certificate Deployment DNS-01 Challenges DNS-01 Test Environment Configuring a Dynamic Child Zone DNS Aliases DNS-01 Hook Script Running Dehydrated with DNS-01 DNS-01 Collisions Per-Domain Configurations ACME Renewals Chapter 8: HSTS and CAA HTTP Strict Transport Security HSTS Drawbacks Deploying HSTS HSTS Preload Certification Authority Authorization Chapter 9: TLS Testing and Certificate Analysis Server Configuration Testing Private Testing Certificate Transparency Finding Bogus Certificates Certificate Transparency in Certificates What Failure Looks Like Chapter 10: Becoming a CA Private Trust Anchors CA Software OpenSSL CAs Building an OpenSSL CA Root CA Organization and Defaults Configuring CA Policies Configuring Requests Creating the Root Certificate Configuring the Intermediate CA Creating the Intermediate CA Certificate Certificate Databases Chain File Preparing the OCSP Responder Web Site Certificates Revoking Certificates Generating CRLs Client Certificates Private OCSP Responder Name Constraint CAs Becoming a Global Root Afterword Sponsors Print Sponsors Patronizers