Web SecurityWhether you are the only employee of a startup, a systems administrator managing a critical web server, a security consultant, or a systems manager overseeing an entire networked organization, this book provides you with an in-depth view of the risks in today's rapidly changing and increasingly insecure networked and digitally enabled environment. It will help you understand and analyze the risks involved and determine what level of security is needed; maintain a security system; formulate, implement, and streamline a usable policy; protect your Web setup from intrusion, sabotage, eavesdropping and tampering; scan the network for loopholes using the same array of tools hackers use; protect against active content, cookies, malicious code and hostile Java applets; secure electronic commerce and choose the right type of digital payment; select, secure, configure and set up firewalls; secure an extended and distributed enterprise network or Virtual Private Network. The companion CD ROM contains an array of NT 5.0, Windows 98 & Windows 95 tools to scan networks, Web servers and sites for vulnerabilities, tools to break into networks and web servers, encryption tools, Firewall software, cookie killers, digital signers, log analysis and dictionary based password cracking tools to give a reality check to your best bets on security. A companion website links you to the latest in the security scene both from the Underground and the industry and lets you access a variety of resources to keep up to date in this dynamic field. Rather than focus on Unix, this book covers Windows NT 5.0, IIS 4.0, Frontpage 98, Windows 98 and 95, as Windows is becoming the preferred platform for web development. Covers Windows NT, Windows 95 and Windows 98 Companion website provides additional content and free updates Discusses disaster recovery |
What people are saying - Write a review
User ratings
5 stars |
| ||
4 stars |
| ||
3 stars |
| ||
2 stars |
| ||
1 star |
|
LibraryThing Review
User Review - bostonian71 - LibraryThingImmensely detailed portrait of the New York East Side Jewish community, with lots of information about the adjustment and assimilation of the immigrant Jews into all aspects of the city's urban life ... Read full review
LibraryThing Review
User Review - bnation - LibraryThingI'm giving this book only two stars because even though the title includes the phrase "The Journey of the East European Jews to America" there appears to be nothing about any place other than New York ... Read full review
Contents
II | 1 |
III | 2 |
IV | 4 |
VI | 5 |
VII | 6 |
VIII | 7 |
IX | 8 |
X | 9 |
CXV | 156 |
CXVI | 157 |
CXVII | 160 |
CXIX | 163 |
CXX | 170 |
CXXI | 174 |
CXXII | 189 |
CXXIII | 210 |
XII | 11 |
XIII | 12 |
XIV | 13 |
XV | 14 |
XVI | 16 |
XVII | 17 |
XVIII | 25 |
XIX | 26 |
XX | 27 |
XXI | 28 |
XXII | 29 |
XXIV | 30 |
XXVI | 31 |
XXVIII | 32 |
XXIX | 33 |
XXXI | 34 |
XXXII | 35 |
XXXV | 36 |
XXXVI | 37 |
XXXVII | 39 |
XXXVIII | 40 |
XL | 43 |
XLI | 45 |
XLII | 48 |
XLIII | 49 |
XLIV | 50 |
XLV | 51 |
XLVII | 54 |
XLIX | 55 |
L | 56 |
LI | 57 |
LII | 58 |
LV | 59 |
LVII | 60 |
LIX | 64 |
LX | 65 |
LXII | 66 |
LXIII | 67 |
LXIV | 68 |
LXV | 70 |
LXVI | 74 |
LXVIII | 76 |
LXIX | 77 |
LXXII | 78 |
LXXIII | 79 |
LXXIV | 81 |
LXXV | 82 |
LXXVI | 83 |
LXXVII | 89 |
LXXVIII | 91 |
LXXX | 93 |
LXXXI | 94 |
LXXXII | 95 |
LXXXIII | 96 |
LXXXV | 98 |
LXXXVII | 100 |
LXXXVIII | 101 |
LXXXIX | 102 |
XCI | 103 |
XCII | 104 |
XCIV | 106 |
XCVI | 108 |
XCVII | 109 |
XCVIII | 110 |
XCIX | 112 |
C | 119 |
CI | 126 |
CII | 135 |
CIV | 136 |
CVI | 139 |
CVII | 141 |
CIX | 142 |
CXI | 145 |
CXII | 146 |
CXIV | 155 |
CXXIV | 211 |
CXXV | 212 |
CXXVII | 213 |
CXXVIII | 214 |
CXXIX | 215 |
CXXXI | 217 |
CXXXII | 218 |
CXXXIII | 219 |
CXXXIV | 223 |
CXXXV | 227 |
CXXXVI | 229 |
CXXXVII | 231 |
CXXXVIII | 232 |
CXL | 233 |
CXLI | 238 |
CXLII | 240 |
CXLIII | 241 |
CXLIV | 246 |
CXLV | 251 |
CXLVI | 252 |
CXLVIII | 253 |
CL | 254 |
CLII | 255 |
CLIII | 256 |
CLIV | 257 |
CLVI | 261 |
CLVII | 263 |
CLVIII | 264 |
CLIX | 265 |
CLXI | 270 |
CLXII | 271 |
CLXIV | 273 |
CLXV | 274 |
CLXVII | 276 |
CLXIX | 277 |
CLXXII | 278 |
CLXXIII | 279 |
CLXXV | 280 |
CLXXVI | 281 |
CLXXVIII | 319 |
CLXXX | 320 |
CLXXXI | 323 |
CLXXXIII | 324 |
CLXXXVI | 325 |
CLXXXIX | 326 |
CXC | 327 |
CXCII | 328 |
CXCIII | 329 |
CXCV | 331 |
CXCVII | 338 |
CXCVIII | 343 |
CXCIX | 344 |
CCI | 345 |
CCII | 347 |
CCIV | 349 |
CCVI | 350 |
CCVII | 352 |
CCIX | 353 |
CCX | 355 |
CCXI | 356 |
CCXIII | 357 |
CCXVI | 358 |
CCXVIII | 359 |
CCXIX | 362 |
CCXXI | 363 |
CCXXII | 366 |
CCXXIII | 367 |
CCXXV | 368 |
CCXXVI | 370 |
CCXXVII | 371 |
CCXXVIII | 373 |
CCXXIX | 383 |
CCXXX | 409 |
413 | |
Common terms and phrases
accept administrator allow anonymous application attack audit authentication authority bank browser Click client coins commerce Communicator configuration connection contains cookies create credit card customers database designed developed digital certificate document domain e-mail electronic Enable encryption ensure example Explorer Figure firewall Help host identify implementation internal Internet IP address issues Java machine Manager merchant Microsoft Netscape operations option organization packets password payment person possible prevent private key problem protect protocol proxy server public key receive remote Report request risk running scrip signature signed specific Technology transaction trust United valid verify View Windows NT
References to this book
A Practical Guide to Security Engineering and Information Assurance Debra S. Herrmann Limited preview - 2001 |
Testing Web Security: Assessing the Security of Web Sites and Applications Steven Splaine No preview available - 2002 |