Next: , Up: Implementing an Insecure HTTP Client   [Index]


1.3.1 Steps in Implementing an Insecure HTTP Client