O'Reilly logo

Linux® Socket Programming by Sean Walton

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 16. Adding Security to Network Programs and SSL

IN THIS CHAPTER

A secure system provides no more functionality than an insecure system—the data it provides is more reliable. An insecure system provides services and information sharing, but it is prone to attacks and becomes unreliable. This unreliability casts a shadow on the value of the services and can even harm the company's reputation or brand.

In most cases, security is assumed as you build the product. Rarely do business requirements say, "The server must be impervious to Denial of Service attacks." Security is a foundational requirement ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required