In this part, the reader will closely explore how to make their software more reliable by writing more secure interactions between clients and servers. It will explain how to examine and profile the performance of your network software to improve and monitor performance. It will also examine strategies for scalability with caching.
The following chapters will be covered in this section:
Chapter 12, The Internet Protocol
Chapter 13, Transport Layer Security
Chapter 14, Authentication and Authorization on Networks
Chapter 15, Caching Strategies for Distributed Systems
Chapter 16, Performance Analysis and Monitoring