CLASS="CHAPTER" BGCOLOR="#FFFFFF" TEXT="#000000" LINK="#0000FF" VLINK="#840084" ALINK="#0000FF" >
Secure Programming for Linux and Unix HOWTO
Prev
Next
Chapter 11. Special Topics
Understanding is a fountain of life to those who have it, but folly brings punishment to fools.
Proverbs 16:22 (NIV)
Table of Contents
11.1.
Passwords
11.2.
Authenticating on the Web
11.2.1.
Authenticating on the Web: Logging In
11.2.2.
Authenticating on the Web: Subsequent Actions
11.2.3.
Authenticating on the Web: Logging Out
11.3.
Random Numbers
11.4.
Specially Protect Secrets (Passwords and Keys) in User Memory
11.5.
Cryptographic Algorithms and Protocols
11.5.1.
Cryptographic Protocols
11.5.2.
Symmetric Key Encryption Algorithms
11.5.3.
Public Key Algorithms
11.5.4.
Cryptographic Hash Algorithms
11.5.5.
Integrity Checking
11.5.6.
Randomized Message Authentication Mode (RMAC)
11.5.7.
Other Cryptographic Issues
11.6.
Using PAM
11.7.
Tools
11.8.
Windows CE
11.9.
Write Audit Records
11.10.
Physical Emissions
11.11.
Miscellaneous
Prev
Home
Next
PHP
Passwords