List of Tables


Chapter 2: HTTP Security

Table 2.1: ASCII Characters with Hexadecimal Values
Table 2.2: Characters Used in the Base-64 Encoding Scheme

Chapter 3: Proxy Servers and Firewalls

Table 3.1: Sockets Calls and SOCKS Counterparts
Table 3.2: Private IP Address Blocks (According to [21])

Chapter 4: Cryptographic Techniques

Table 4.1: Secret Key Cryptosystems
Table 4.2: ECC-Based Public Key Cryptosystems

Chapter 6: SSL and TLS Protocols

Table 6.1: Port Numbers Assigned for Application Protocols That Run on Top of SSL/TLS
Table 6.2: SSL Session State Information Elements
Table 6.3: SSL Connection State Information Elements
Table 6.4: TLS 1.0 Cipher Suites As Specified in [12]
Table 6.5: TLS 1.0 Key Exchange Algorithms As Specified in [12]
Table 6.6: TLS 1.0 Encryption Algorithms As Specified in [12]
Table 6.7: TLS 1.0 One-Way Hash Functions As Specified in [13]

Chapter 8: Authentication and Authorization Infrastructures

Table 8.1: Consent Levels Used by the Kids .NET Passport Service

Chapter 11: Server-side Security

Table 11.1: CGI Environment Variables (in Alphabetical Order)
Table 11.2: Some Additional Environment Variables for SSL/TLS (in Alphabetical Order)
Table 11.3: General Principles and Rules for Safe CGI Programming*
Table 11.4: Operators and Arguments for SSIs

Chapter 14: Censorship on the WWW

Table 14.1: The RSACi Levels for Violence, Nudity, Sex, and Language



Security Technologies for the World Wide Web
Security Technologies for the World Wide Web, Second Edition
ISBN: 1580533485
EAN: 2147483647
Year: 2003
Pages: 142
Authors: Rolf Oppliger

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net