Java Reference
In-Depth Information
The SSL protocol is very involved and is beyond the scope of this topic. If you have further
interest, I suggest getting the latest specification from the Netscape Web site at .
In this chapter, we briefly discussed some of the more common security protocols. You saw
how you can roll your own security, a technique that really isn't secure. We covered basic and
digest authentication and their problems. Finally, we discussed the Secure Sockets Layer proto-
col, which is a very secure and widely used protocol.
In the next chapter, you will learn about the basics of XML and servlets.
Search WWH ::

Custom Search