Методы защиты данных в Web
Keywords:
SSL, TLS, computer technologies, protocolsAbstract
The article describes the use of SSL and TLS protocols to protect data transmitted by means of computer technologies. The SSL Protocol is de-signed to provide reliable protection of end-to-end data transmission using the TCP Protocol. SSL is not a single Protocol, but two layers of protocols. SSL Record Protocol (SSL Record Protocol) provides a basic set of security features used by higher-level protocols. These tools, in particular, can use the hypertext transfer Protocol (HTTP), designed to provide data exchange when interacting with clients and web servers
References
Титоренко Г.А. Информационные технологии
управления. М., Юнити: 2002.
Мельников В. Защита информации в компьютерных системах. – М.: Финансы и статистика, Электронинформ, 1997
Downloads
Published
How to Cite
Issue
Section
License
The author transfers for a period of 5 years to the Central Research Institute of Russian Sign Language non-exclusive rights to use the article in any form and in any way specified in Article 1270 of the Civil Code of the Russian Federation. The transfer of rights occurs at the time of downloading any materials through an automated system on this site.