Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Tcl 8.5 Network Programming

You're reading from   Tcl 8.5 Network Programming Learn Tcl and you‚Äôll never look back when it comes to developing network-aware applications. This book is the perfect way in, taking you from the basics to more advanced topics in easy, logical steps.

Arrow left icon
Product type Paperback
Published in Jul 2010
Publisher Packt
ISBN-13 9781849510967
Length 588 pages
Edition 1st Edition
Languages
Tools
Concepts
Arrow right icon
Toc

Table of Contents (18) Chapters Close

Tcl 8.5 Network Programming
Credits
About the Authors
About the Reviewers
1. Preface
1. Introducing Tcl FREE CHAPTER 2. Advanced Tcl Features 3. Tcl Standalone Binaries 4. Troubleshooting Tcl applications 5. Data Storage 6. Networking in Tcl 7. Using Common Internet Services 8. Using Additional Internet Services 9. Learning SNMP 10. Web Programming in Tcl 11. TclHttpd in Client-Server Applications 12. SOAP and XML-RPC 13. SSL and Security

Learning Secure Socket Layer


SSL offers a security layer for communications over networks. SSL itself is a very generic standard for encrypting any form of communication. It is usually used for securing network connections to prevent messages from being modified and / or eavesdropped. We'll use it for securing TCP sockets, and show how applications can become SSL-enabled and switch to a secure model of communication.

SSL is the most popular standard for encrypted network communication and is used for almost all protocols, such as WWW, e-mail, FTP, and Jabber. It has multiple implementations, including open source ones such as OpenSSL, available fromhttp:// www.openssl.org/.

SSL offers end-to-end encryption of communication. It uses private and public key pairs for each of the peers communicating over the network. Public keys may be signed by a certificate authority (CA). Usually it is an application and / or machine in the network that deals with signing keys, and is trusted by other elements...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image