Part III: Identification, Authorization, and Security

The four chapters in Part III present a suite of techniques and technologies to track identity, enforce security, and control access to content:

·         Chapter 11 talks about techniques to identify users, so content can be personalized to the user audience.

·         Chapter 12 highlights the basic mechanisms to verify user identity. This chapter also examines how HTTP authentication interfaces with databases.

·         Chapter 13 explains digest authentication, a complex proposed enhancement to HTTP that provides significantly enhanced security.

·         Chapter 14 is a detailed overview of Internet cryptography, digital certificates, and the Secure Sockets Layer (SSL).

 


Hypertext Transfer Protocol (HTTP)