Skip to content

Web Security A Step-by-Step Reference Guide

Best in textbook rentals since 2012!

ISBN-10: 0201634899

ISBN-13: 9780201634891

Edition: 1998

Authors: Lincoln D. Stein

List price: $34.99
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

Web Security eschews lengthy discussions of security theory in favor of a practical step-by-step approach. Each section is built around a "checklist" of items that readers can use to evaluate the security of their existing Web site and take action to improve it. In addition to protecting against intruders, readers will learn how to protect a Web site from other hostile Web sites. Readers will learn which resources require protection, and how they may currently be at risk. Stein explains basic strategies for protecting an existing Web site with as little cost and disruption as possible. Also covered are the risks and security solutions associated with implementing Internet services on a Web…    
Customers also bought

Book details

List price: $34.99
Copyright year: 1998
Publisher: Addison Wesley Professional
Publication date: 12/31/1997
Binding: Paperback
Pages: 448
Size: 7.50" wide x 9.50" long x 1.00" tall
Weight: 1.628
Language: English

Preface
What Is Web Security?
The Three Parts of Web Security
Risks
The Layout of This Book
Document Confidentiality
Basic Cryptography
How Cryptography Works
Symmetric Cryptography
Public Key Cryptography
Online Resources
Printed Resources
SSL, SET, and Digital Payment Systems
Secure Sockets Layer
SET and Other Digital Payment Systems
Checklist
Online Resources
SET and Other Digital Money Systems
Client-Side Security
Using SSL
SSL at Work
Personal Certificates
Checklist
Online Resources
Printed Resources
Active Content
Bad by Design or Bad by Accident?
Traditional Threats
Helper Applications and Plug-Ins
Java
ActiveX
JavaScript and VBScript
The Browser as a Security Hole
Exotic Technologies
What Can You Do?
Changing Active Content Settings
Checklist
Resources
Web Privacy
What Web Surfing Reveals
Server Logs
Cookies
PICS
Advice for Users
Advice for Webmasters
Policy Initiatives
Checklist
Resources
Server-Side Security
Server Security
Why Are Websites Vulnerable?
Frequently Asked Questions about Web Server Security
Overview: Steps to Securing a Website
Online Resources
UNIX Web Servers
Hardening a UNIX Web Server
Configuring the Web Server
Monitoring Logs
Monitor the Integrity of System Files and Binaries
Back Up Your System
Checklist
Online Resources
Printed Resources
Windows NT Web Servers
NT Security Concepts
Windows NT Security Risks
Securing a Windows NT Web Server
Configuring the Web Server
Checklist
Online Resources
Printed Resources
Access Control
Types of Access Control
Access Control Based on IP Address or Host Name
Access Control Based on User Name and Password
Other Types of Access Control
Access Control and CGI Scripts
Checklist
Online Resources
Encryption and Certificate-Based Access Control
SSL-Enabled Web Servers
Using Client Certificates for Access Control
Using Client Certificates for Web Server Access Control
Becoming Your Own Certifying Authority
Final Words
Checklist
Online Resources
Printed Resources
Safe CGI Scripting
Introduction to CGI Scripts and Server Modules
Common Failure Modes
Other Advice
Safe Scripting in Perl
CGI Wrappers
Checklist
Online Resources
Printed Resources
Remote Authoring and Administration
Degrees of Trust
Controlling Access to the Web Server Host
Remote Authoring Via FTP
Microsoft FrontPage
The HTTP PUT Protocol
An Upload Staging Area
Administering the Web Server Remotely
Access to the Server for Web Developers
Checklist
Online Resources
Printed