Search Results - "Transport Layer Security"
Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 36
- Computer networks 29
- Computer security 19
- Application software 7
- Computer network protocols 7
- Cryptography 7
- Data encryption (Computer science) 7
- Management 6
- Internet 5
- TCP/IP (Computer network protocol) 5
- Wireless communication systems 5
- Application program interfaces (Computer software) 4
- Electronic commerce 4
- Bank credit cards 3
- Computers 3
- Distributed processing 3
- Electronic data processing 3
- Enterprise application integration (Computer systems) 3
- Java (Computer program language) 3
- Telecommunication 3
- Telecommunication systems 3
- Web sites 3
- World Wide Web 3
- Computer architecture 2
- Computers, Special purpose 2
- Data protection 2
- Design 2
- Penetration testing (Computer security) 2
- Programming languages (Electronic computers) 2
- Quantum communication 2
-
1
Guidelines for the selection and use of Transport Layer Security (TLS) implementations recommendations of the National Institute of Standards and Technology /
Published 2005Online Access
Online Access
Government Document Electronic eBook -
2
An Overview of High-performance Parallel Big Data transfers over multiple network channels with Transport Layer Security (TLS) and TLS plus Perfect Forward...
Published 2015Online Access
Government Document Electronic eBook -
3
TLS CRYPTOGRAPHY IN-DEPTH explore the intricacies of modern cryptography and the inner workings of TLS /
Published 2023Table of Contents: “…Chapter 6: Transport Layer Security at a Glance -- Birth of the World …”
Full Text (via O'Reilly/Safari)
eBook -
4
Postfix : the definitive guide /
Published 2004Table of Contents: “…Transport Layer Security --…”
Full Text (via O'Reilly/Safari)
eBook -
5
Pro encryption in SQL Server 2022 : provide the highest level of protection for your data /
Published 2022Table of Contents: “…transit using transport layer security --…”
Full Text (via O'Reilly/Safari)
eBook -
6
Internet and Intranet security /
Published 1998Table of Contents: “…Transport Layer Security Protocols --…”
Full Text (via Internet Archive)
eBook -
7
The wireless application protocol (WAP) : a Wiley tech brief /
Published 2000Table of Contents: “…Wireless Transport Layer Security (WTLS) --…”
Full Text (via EBSCO)
eBook -
8
-
9
Protocols for secure electronic commerce
Published 2016Table of Contents: “…transport layer security -- 7. The SET protocol -- 8. Payments …”
Full Text (via Taylor & Francis)
Electronic eBook -
10
Protocols for secure electronic commerce /
Published 2004Table of Contents: “…Layer); 6 TLS (Transport Layer Security) and WTLS (Wireless Transport Layer …”
Full Text (via Taylor & Francis)
eBook -
11
Protocols for secure electronic commerce /
Published 2004Table of Contents: “…Layer); 6 TLS (Transport Layer Security) and WTLS (Wireless Transport Layer …”
Full Text (via Taylor & Francis)
eBook -
12
-
13
-
14
Wireless security models, threats, and solutions /
Published 2002Table of Contents: “…-- Wireless transport layer Security (WTLS) -- Bluetooth chapter -- Voice …”
Full Text (via AccessEngineering)
Electronic eBook -
15
Security in fixed and wireless networks : an introduction to securing data communications /
Published 2003Table of Contents: “…architecture -- Transport layer security protocols -- Internet firewalls -- …”
Full Text (via Wiley)
eBook -
16
Wireless security : models, threats, and solutions /
Published 2002Table of Contents: “…-- Wireless transport layer Security (WTLS) -- Bluetooth chapter -- Voice …”
Full Text (via EBSCO)
eBook -
17
Protocols for authentication and key establishment /
Published 2020Table of Contents: “…Protocols -- Transport Layer Security Protocol -- Identity-Based Key Agreement …”
Full Text (via Springer)
eBook -
18
Full stack Python security cryptography, TLS, and attack resistance /
Published 2021Table of Contents: “…encryption -- 6. Transport layer security -- 7. HTTP session management -- 8. …”
Full Text (via Skillsoft)
Electronic eBook -
19
Guide to Internet cryptography : security protocols and real-world attack implications /
Published 2022Table of Contents: “…Security of HTTP -- Transport Layer Security -- A Short History of TLS -- Attacks …”
Full Text (via Springer)
eBook -
20