• Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Chapter 40. Network Programming > Customized Network Solutions

Customized Network Solutions

The Internet provides no transactional security whatsoever, nor do the socket-oriented communications methods discussed so far verify whether any particular request for reading or writing data is coming from a source that should have such access. To do this, you need a customized network protocol.

These protocols sit as a layer between your network protocol (that is, TCP/IP) and your application. They encrypt outgoing packets and decrypt incoming packets while verifying that you are still talking to whom you think you are talking.


PREVIEW

                                                                          

Not a subscriber?

Start A Free Trial


  
  • Creative Edge
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint