Skip to main content

Abstract

At the heart of network programming is the need to transfer information from one place to another. When this transfer is done between processes on the same host or between hosts on a private network, then we don’t need to be so concerned about network security—the main considerations are general protocol design and endpoint security through authorization. However, with the rise of the Internet, it has become necessary to consider what happens to the information as it is passed between computers, routers, and other networks. The advent of semipublic networks has created a need for network security Thus, protocol design has taken on a new dimension as it has become necessary to consider not only how the information should be packaged, transferred, and interpreted, but also how to ensure that only authorized parties can access the information.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Keir Davis, John W. Turner, Nathan Yocom

About this chapter

Cite this chapter

Davis, K., Turner, J.W., Yocom, N. (2004). Securing Network Communication. In: The Definitive Guide to Linux Network Programming. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4302-0748-1_10

Download citation

  • DOI: https://doi.org/10.1007/978-1-4302-0748-1_10

  • Publisher Name: Apress, Berkeley, CA

  • Print ISBN: 978-1-59059-322-6

  • Online ISBN: 978-1-4302-0748-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics