The four chapters in Part III present a suite of techniques and technologies to track identity, enforce security, and control access to content:
Chapter 11 talks about techniques to identify users, so content can be personalized to the user audience.
Chapter 12highlights the basic mechanisms to verify user identity. This chapter also examines how HTTP authentication interfaces with databases.
Chapter 13explains digest authentication, a complex proposed enhancement to HTTP that provides significantly enhanced security.
Chapter 14 is a detailed overview of Internet cryptography, digital certificates, and the Secure Sockets Layer (SSL).