LEADER 08165nam 22005053 450 001 9910860873803321 005 20240117231004.0 010 $a1-68569-016-5 035 $a(CKB)28154044500041 035 $a(MiAaPQ)EBC30747334 035 $a(Au-PeEL)EBL30747334 035 $a(EXLCZ)9928154044500041 100 $a20230921h20232023 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSSL and TLS$e: theory and practice /$fRolf Oppliger 205 $a3rd ed. 210 1$aNorwood :$cArtech House,$d[2023] 210 4$dİ2023. 215 $a1 online resource (xxv, 352 pages) $cillustrations 225 1 $aArtech House information security and privacy series 311 08$aPrint version: Oppliger, Rolf. SSL and TLS. Third edition. Norwood, MA : Artech House, [2023] 9781685690151 (OCoLC)1375548645 320 $aIncludes bibliographical references and index. 327 $aSSL and TLS: Theory and Practice Third Edition -- Contents -- Foreword -- Preface -- References -- Acknowledgments -- Chapter 1 Introduction -- 1.1 INFORMATION AND NETWORK SECURITY -- 1.1.1 Security Services -- 1.1.2 Security Mechanisms -- 1.2 TRANSPORT LAYER SECURITY -- 1.3 FINAL REMARKS -- References -- Chapter 2 SSL Protocol -- 2.1 INTRODUCTION -- 2.2 PROTOCOLS -- 2.2.1 SSL Record Protocol -- 2.2.2 SSL Handshake Protocol -- 2.2.3 SSL Change Cipher Spec Protocol -- 2.2.4 SSL Alert Protocol -- 2.2.5 SSL Application Data Protocol -- 2.3 PROTOCOL TRANSCRIPT -- 2.4 SECURITY ANALYSIS -- 2.5 FINAL REMARKS -- References -- Chapter 3 TLS Protocol -- 3.1 INTRODUCTION -- 3.1.1 TLS PRF -- 3.1.2 Generation of Keying Material -- 3.2 TLS 1.0 -- 3.2.1 Cipher Suites -- 3.2.2 Certificate Management -- 3.2.3 Alert Messages -- 3.2.4 Other Differences -- 3.3 TLS 1.1 -- 3.3.1 Cipher Suites -- 3.3.2 Certificate Management -- 3.3.3 Alert Messages -- 3.3.4 Other Differences -- 3.4 TLS 1.2 -- 3.4.1 TLS Extensions -- 3.4.2 Cipher Suites -- 3.4.3 Certificate Management -- 3.4.4 Alert Messages -- 3.4.5 Other Differences -- 3.5 TLS 1 -- 3.5.1 Handshake Protocol -- 3.5.2 Key Derivation -- 3.5.3 Certificate Management -- 3.5.4 Alert Messages -- 3.5.5 Other Differences -- 3.6 HSTS -- 3.7 PROTOCOL TRANSCRIPTS -- 3.7.1 TLS 1.0 -- 3.7.2 TLS 1.2 -- 3.8 SECURITY ANALYSIS -- 3.9 FINAL REMARKS -- References -- Chapter 4 DTLS Protocol -- 4.1 INTRODUCTION -- 4.2 DTLS 1.0 -- 4.2.1 Record Protocol -- 4.2.2 Handshake Protocol -- 4.3 DTLS 1.2 -- 4.4 DTLS 1.3 -- 4.4.1 Record Protocol -- 4.4.2 Handshake Protocol -- 4.5 SECURITY ANALYSIS -- 4.6 FINAL REMARKS -- References -- Chapter 5 Firewall Traversal -- 5.1 INTRODUCTION -- 5.2 SSL/TLS TUNNELING -- 5.3 SSL/TLS PROXYING -- 5.4 MIDDLEBOX MITIGATION -- 5.5 FINAL REMARKS -- References -- Chapter 6 Public Key Certificates and Internet PKI. 327 $a6.1 INTRODUCTION -- 6.2 X.509 CERTIFICATES -- 6.2.1 Certificate Format -- 6.2.2 Hierarchical Trust Model -- 6.3 SERVER CERTIFICATES -- 6.4 CLIENT CERTIFICATES -- 6.5 PROBLEMS AND PITFALLS -- 6.6 CERTIFICATE LEGITIMATION -- 6.6.1 Public Key Pinning -- 6.6.2 DNS Resource Records -- 6.6.3 Distributed Notaries -- 6.6.4 Certificate Transparency -- 6.7 FINAL REMARKS -- References -- Chapter 7 Concluding Remarks -- References -- Appendix A Attacks Against SSL/TLS -- A.1 BLEICHENBACHER ATTACK -- A.1.1 DROWN, ROBOT, and CATs -- A.1.2 Kl´?ma-Pokorn´y-Rosa Attack -- A.1.3 Manger Attack -- A.2 VAUDENAY ATTACK -- A.3 BEAST -- A.4 POODLE -- A.5 RENEGOTIATION ATTACKS -- A.6 COMPRESSION-RELATED ATTACKS -- A.7 KEY EXCHANGE DOWNGRADE ATTACKS -- A.7.1 FREAK -- A.7.2 Logjam -- References -- Appendix B TLS Cipher Suites -- Reference -- Appendix C TLS Extensions -- C.1 OVERVIEW -- C.2 DETAILED EXPLANATIONS -- C.2.1 Server name (0) Extension -- C.2.2 Max fragment length (1) and Record size limit (28) Extensions -- C.2.3 Client certificate url (2) Extension -- C.2.4 Trusted ca keys (3) Extension -- C.2.5 Truncated hmac (4) Extension -- C.2.6 Status request (5) and Status request v2 (17) Extensions -- C.2.7 User mapping (6) Extension -- C.2.8 Client authz (7) and Server authz (8) Extensions -- C.2.9 Cert type (9) Extension -- C.2.10 Supported groups (10) and ec point formats (11) Extensions -- C.2.11 Srp (12) Extension -- C.2.12 Signature algorithms (13) Extension -- C.2.13 Use srtp (14) Extension -- C.2.14 Heartbeat (15) Extension -- C.2.15 Application layer protocol negotiation (16) Extension -- C.2.16 Signed certificate timestamp (18) and transparency info (52) Extensions -- C.2.17 Client certificate type (19) and Server certificate_type (20) Extensions -- C.2.18 Padding (21) Extension -- C.2.19 Encrypt then mac (22) Extension -- C.2.20 Token binding (24) Extension. 327 $aC.2.21 Cached info (25) Extension -- C.2.22 Compress certificate (27) Extension -- C.2.23 Pwd protect (29), pwd clear (30), and password salt (31) Extensions -- C.2.24 Ticket pinning (32) Extension -- C.2.25 Tls cert with extern psk (33) Extension -- C.2.26 Session ticket (35) and ticket request (58) Extension -- C.2.27 TLMSP (36), TLMSP proxying (37), and TLMSP delegate (38) Extensions -- C.2.28 Supported ekt ciphers (39) Extension -- C.2.29 Pre shared key (41) Extension -- C.2.30 Early data (42) Extension -- C.2.31 Supported versions (43) Extension -- C.2.32 Cookie (44) Extension -- C.2.33 Psk key exchange modes (45) Extension -- C.2.34 Certificate authorities (47) Extension -- C.2.35 Oid filters (48) Extension -- C.2.36 Post handshake auth (49) Extension -- C.2.37 Signature algorithms cert (50) Extension -- C.2.38 Key share (51) Extension -- C.2.39 Connection id (54) Extension -- C.2.40 External id hash (55) and external session id (56) Extensions -- C.2.41 Quic transport parameters (57) Extention -- C.2.42 Dnssec chain (59) Extension -- C.2.43 Renegotiation info (65281) and extended master secret (23) Extensions -- References -- Abbreviations and Acronyms -- About the Author -- Index. 330 $aNow in its Third Edition, this completely revised and updated reference provides a thorough and comprehensive introduction into the SSL, TLS, and DTLS protocols, explaining all the details and technical subtleties and showing how the current design helps mitigate the attacks that have made press headlines in the past. The book tells the complete story of TLS, from its earliest incarnation (SSL 1.0 in 1994), all the way up to and including TLS 1.3. Detailed descriptions of each protocol version give you a full understanding of why the protocol looked like it did, and why it now looks like it does. You will get a clear, detailed introduction to TLS 1.3 and understand the broader context of how TLS works with firewall and network middleboxes, as well the key topic of public infrastructures and their role in securing TLS. You will also find similar details on DTLS, a close sibling of TLS that is designed to operate over UDP instead of TCP. The book helps you fully understand the rationale behind the design of the SSL, TLS, and DTLS protocols and all of its extensions. It also gives you an in-depth and accessible breakdown of the many vulnerabilities in earlier versions of TLS, thereby more fully equipping you to properly configure and use the protocols in the field and protect against specific (network-based) attacks. With its thorough discussion of widely deployed network security technology, coupled with its practical applications you can utilize today, this is a must-have book for network security practitioners and software/web application developers at all levels. 410 0$aArtech House information security and privacy series 606 $aComputer networks$xSecurity measures 606 $aWorld Wide Web$xSecurity measures 606 $aComputer network protocols 615 0$aComputer networks$xSecurity measures. 615 0$aWorld Wide Web$xSecurity measures. 615 0$aComputer network protocols. 700 $aOppliger$b Rolf$01606588 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910860873803321 996 $aSSL and TLS$93932462 997 $aUNINA LEADER 04608oam 22011414 450 001 9910973346103321 005 20250426110833.0 010 $a9786613820778 010 $a9781462350803 010 $a1462350801 010 $a9781451985313 010 $a1451985312 010 $a9781282392342 010 $a1282392344 010 $a9781451909722 010 $a1451909721 035 $a(CKB)3360000000443116 035 $a(EBL)3014551 035 $a(SSID)ssj0000940040 035 $a(PQKBManifestationID)11519258 035 $a(PQKBTitleCode)TC0000940040 035 $a(PQKBWorkID)10946631 035 $a(PQKB)10998188 035 $a(OCoLC)694141262 035 $a(MiAaPQ)EBC3014551 035 $a(IMF)WPIEE2006259 035 $a(IMF)WPIEA2006259 035 $aWPIEA2006259 035 $a(EXLCZ)993360000000443116 100 $a20020129d2006 uf 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt 182 $cc 183 $acr 200 10$aAllowances for Corporate Equity in Practice /$fAlexander Klemm 205 $a1st ed. 210 1$aWashington, D.C. :$cInternational Monetary Fund,$d2006. 215 $a1 online resource (35 p.) 225 1 $aIMF Working Papers 300 $a"November 2006." 311 08$a9781451865196 311 08$a1451865198 320 $aIncludes bibliographical references. 327 $a""Contents""; ""I. INTRODUCTION""; ""II. ACE TAX SYSTEMS""; ""III. ACE SYSTEMS IN PRACTICE""; ""IV. PREVIOUS ANALYSES OF ACE TAX SYSTEMS""; ""V. THE BRAZILIAN ACE VARIANT""; ""VI. CONCLUSION""; ""Appendix I. Effective Tax Rates""; ""REFERENCES"" 330 3 $aThis paper provides an overview of full and partial allowance for corporate equity (ACE) tax systems in practice. In the recent past, ACE systems have been used in Austria, Croatia, and Italy. Brazil still applies a variant of such a system and Belgium introduced one this year. This paper summarizes the empirical literature on past ACE systems, and provides a theoretical and empirical assessment of the Brazilian ACE variant. The main finding is that the Brazilian reform introduced an ACE system for a minority of firms only, with the majority instead having a system of dividend deductibility. Despite the reduction in the tax preference for debt finance, capital structures have not changed much, but dividends have increased. Investment appears to have benefited from the reform, although the extent to which this was due to the new structure rather than the tax cut is unclear. 410 0$aIMF Working Papers; Working Paper ;$vNo. 2006/259 606 $aCorporations$xFinance 606 $aCorporations$xTaxation 606 $aAllowance for corporate equity$2imf 606 $aBusiness Taxes and Subsidies$2imf 606 $aCorporate & business tax$2imf 606 $aCorporate income tax$2imf 606 $aCorporate Taxation$2imf 606 $aCorporations$2imf 606 $aEffective tax rate$2imf 606 $aFinancial Instruments$2imf 606 $aIncome tax systems$2imf 606 $aIncome tax$2imf 606 $aInstitutional Investors$2imf 606 $aInvestment & securities$2imf 606 $aInvestments: Stocks$2imf 606 $aNon-bank Financial Institutions$2imf 606 $aPension Funds$2imf 606 $aPublic finance & taxation$2imf 606 $aStocks$2imf 606 $aTax administration and procedure$2imf 606 $aTaxation$2imf 606 $aTaxation, Subsidies, and Revenue: General$2imf 607 $aBrazil$2imf 615 0$aCorporations$xFinance. 615 0$aCorporations$xTaxation. 615 7$aAllowance for corporate equity 615 7$aBusiness Taxes and Subsidies 615 7$aCorporate & business tax 615 7$aCorporate income tax 615 7$aCorporate Taxation 615 7$aCorporations 615 7$aEffective tax rate 615 7$aFinancial Instruments 615 7$aIncome tax systems 615 7$aIncome tax 615 7$aInstitutional Investors 615 7$aInvestment & securities 615 7$aInvestments: Stocks 615 7$aNon-bank Financial Institutions 615 7$aPension Funds 615 7$aPublic finance & taxation 615 7$aStocks 615 7$aTax administration and procedure 615 7$aTaxation 615 7$aTaxation, Subsidies, and Revenue: General 700 $aKlemm$b Alexander$01815705 801 0$bDcWaIMF 906 $aBOOK 912 $a9910973346103321 996 $aAllowances for Corporate Equity in Practice$94371222 997 $aUNINA LEADER 01469nlm0 22003251i 450 001 UON00525575 005 20250612025205.81 010 $a978-73-01-26208-5$be-book 100 $a20240805d2015 |0itac50 ba 101 $achi 102 $aCN 105 $a|||| ||||| 181 $ai$b e 182 $ab 200 1 $a?????????????????????????$fShengli Feng and Chunhong Shi 210 $aBeijing$cBeijing University Press$d2015 215 $a1 risorsa online (17, 224 p.) 517 1$3UON00525624$aChuzhonji hanyu yufadian jiaoxue zhinan 606 $aLingua cinese$xGrammatiche$3UONC000763$2FI 620 $aCN$dBeijing$3UONL000457 700 1$aFeng$bShengli$3UONV295928$01793792 701 1$aShi$bChunhong$3UONV295929$01793793 712 $aPeking University Press$3UONV250514$4650 801 $aIT$bSOL$c20250613$gRICA 856 4 $uhttps://www.proquest.com/legacydocview/EBC/4774847?accountid=107301$zAccesso per utenti con proxy server attivo 856 4 $uhttps://www.proquest.com/legacydocview/EBC/4774847?accountid=107301$zAccesso per utenti con proxy server attivo 912 $aUON00525575 951 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$bSI2024433 1Z 20240805Esaurito cartaceo, ma posseduto su Ebook Central di Proquest su abbonamento annu 996 $a?????????????????????????$94393428 997 $aUNIOR