Abstract
At the heart of network programming is the need to transfer information from one place to another. When this transfer is done between processes on the same host or between hosts on a private network, then we don’t need to be so concerned about network security—the main considerations are general protocol design and endpoint security through authorization. However, with the rise of the Internet, it has become necessary to consider what happens to the information as it is passed between computers, routers, and other networks. The advent of semipublic networks has created a need for network security Thus, protocol design has taken on a new dimension as it has become necessary to consider not only how the information should be packaged, transferred, and interpreted, but also how to ensure that only authorized parties can access the information.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Rights and permissions
Copyright information
© 2004 Keir Davis, John W. Turner, Nathan Yocom
About this chapter
Cite this chapter
Davis, K., Turner, J.W., Yocom, N. (2004). Securing Network Communication. In: The Definitive Guide to Linux Network Programming. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4302-0748-1_10
Download citation
DOI: https://doi.org/10.1007/978-1-4302-0748-1_10
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-59059-322-6
Online ISBN: 978-1-4302-0748-1
eBook Packages: Springer Book Archive