The SSL protocol is very involved and is beyond the scope of this topic. If you have further
interest, I suggest getting the latest specification from the Netscape Web site at
In this chapter, we briefly discussed some of the more common security protocols. You saw
how you can roll your own security, a technique that really isn't secure. We covered basic and
digest authentication and their problems. Finally, we discussed the Secure Sockets Layer proto-
col, which is a very secure and widely used protocol.
In the next chapter, you will learn about the basics of XML and servlets.