This section describes how an applications developer can discover and effectively utilize transports that have been enhanced with the SSL security protocol. We begin by providing some background information which is necessary to explain the goals and techniques which are integral in any security discussion.