Wonder Club world wonders pyramid logo
×

Web security Book

Web security
Web security, Written for Web site administrators, developers, and end users, this book is a readable, real-world guide to securing your Web site with the latest in security technology, techniques, and tools. Lincoln D. Stein, keeper of the official Web Security FAQ, a, Web security has a rating of 4 stars
   2 Ratings
X
Web security, Written for Web site administrators, developers, and end users, this book is a readable, real-world guide to securing your Web site with the latest in security technology, techniques, and tools. Lincoln D. Stein, keeper of the official Web Security FAQ, a, Web security
4 out of 5 stars based on 2 reviews
5
0 %
4
100 %
3
0 %
2
0 %
1
0 %
Digital Copy
PDF format
1 available   for $99.99
Original Magazine
Physical Format

Sold Out

  • Web security
  • Written by author Lincoln D. Stein
  • Published by Reading, Mass. : Addison-Wesley, c1998., 1997/12/31
  • Written for Web site administrators, developers, and end users, this book is a readable, real-world guide to securing your Web site with the latest in security technology, techniques, and tools. Lincoln D. Stein, keeper of the official Web Security FAQ, a
Buy Digital  USD$99.99

WonderClub View Cart Button

WonderClub Add to Inventory Button
WonderClub Add to Wishlist Button
WonderClub Add to Collection Button

Book Categories

Authors

Preface.

1. What Is Web Security?

The Three Parts of Web Security.

Risks.

The Layout of This Book.

I. DOCUMENT CONFIDENTIALITY.

2. Basic Cryptography.

How Cryptography Works.

Symmetric Cryptography.

Public Key Cryptography.

Online Resources.

Printed Resources.

3. SSL, SET, and Digital Payment Systems.

Secure Sockets Layer.

SET and Other Digital Payment Systems.

Checklist.

Online Resources.

SET and Other Digital Money Systems.

II. CLIENT-SIDE SECURITY.

4. Using SSL.

SSL at Work.

Personal Certificates.

Checklist.

Online Resources.

Printed Resources.

5. Active Content .

Bad by Design or Bad by Accident? .

Traditional Threats .

Helper Applications and Plug-Ins .

Java .

ActiveX.

JavaScript and VBScript.

The Browser as a Security Hole.

Exotic Technologies.

What Can You Do?

Changing Active Content Settings.

Checklist.

Resources.

6. Web Privacy.

What Web Surfing Reveals.

Server Logs.

Cookies.

PICS.

Advice for Users.

Advice for Webmasters.

Policy Initiatives.

Checklist.

Resources.

III. SERVER-SIDE SECURITY.

7. Server Security.

Why Are Websites Vulnerable?

Frequently Asked Questions about Web Server Security.

Overview: Steps to Securing a Website.

Online Resources.

8. UNIX Web Servers.

Hardening a UNIX Web Server.

Configuring the Web Server.

Monitoring Logs.

Monitor the Integrity of System Files and Binaries.

Back Up Your System.

Checklist.

Online Resources.

Printed Resources.

9. Windows NT Web Servers.

NT Security Concepts.

Windows NT Security Risks.

Securing a Windows NT Web Server.

Configuring the Web Server.

Checklist.

Online Resources.

Printed Resources.

10. Access Control.

Types of Access Control.

Access Control Based on IP Address or Host Name.

Access Control Based on User Name and Password.

Other Types of Access Control.

Access Control and CGI Scripts.

Checklist.

Online Resources.

11. Encryption and Certificate-Based Access Control.

SSL-Enabled Web Servers.

Using Client Certificates for Access Control.

Using Client Certificates for Web Server Access Control.

Becoming Your Own Certifying Authority.

Final Words.

Checklist.

Online Resources.

Printed Resources.

12. Safe CGI Scripting.

Introduction to CGI Scripts and Server Modules.

Common Failure Modes.

Other Advice.

Safe Scripting in Perl.

CGI Wrappers.

Checklist.

Online Resources.

Printed Resources.

13. Remote Authoring and Administration.

Degrees of Trust.

Controlling Access to the Web Server Host.

Remote Authoring Via FTP.

Microsoft FrontPage.

The HTTP PUT Protocol.

An Upload Staging Area.

Administering the Web Server Remotely.

Access to the Server for Web Developers.

Checklist.

Online Resources.

Printed Resources.

14. Web Servers and Firewalls.

What Is a Firewall?

Selecting a Firewall System.

Configuring a Firewall.

Automatic Proxy Configuration for Browsers.

Examining Firewall Logs for Signs of Server Compromise.

Checklist.

Online Resources.

Printed Resources.

Bibliography.

Index.


Login

  |  

Complaints

  |  

Blog

  |  

Games

  |  

Digital Media

  |  

Souls

  |  

Obituary

  |  

Contact Us

  |  

FAQ

CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!!

X
WonderClub Home

This item is in your Wish List

Web security, Written for Web site administrators, developers, and end users, this book is a readable, real-world guide to securing your Web site with the latest in security technology, techniques, and tools. Lincoln D. Stein, keeper of the official Web Security FAQ, a, Web security

X
WonderClub Home

This item is in your Collection

Web security, Written for Web site administrators, developers, and end users, this book is a readable, real-world guide to securing your Web site with the latest in security technology, techniques, and tools. Lincoln D. Stein, keeper of the official Web Security FAQ, a, Web security

Web security

X
WonderClub Home

This Item is in Your Inventory

Web security, Written for Web site administrators, developers, and end users, this book is a readable, real-world guide to securing your Web site with the latest in security technology, techniques, and tools. Lincoln D. Stein, keeper of the official Web Security FAQ, a, Web security

Web security

WonderClub Home

You must be logged in to review the products

E-mail address:

Password: