Web security, privacy and commerce
Since the first edition of this classic reference was published, World Wide Web use has exploded and e-commerce has become a daily part of business and personal life. As Web use has grown, so have the threats to our security and privacy--from credit card fraud to routine invasions of privacy by...
Autor principal: | |
---|---|
Otros Autores: | |
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Cambridge, Massachusetts :
O'Reilly
2002.
|
Edición: | 2nd ed |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627092506719 |
Tabla de Contenidos:
- Table of Contents; Preface; Web Security: Is Our Luck Running Out?; About This Book; Conventions Used in This Book; Comments and Questions; History and Acknowledgments; PART I. Web Technology; Chapter 1. The Web Security Landscape; The Web Security Problem; Risk Analysis and Best Practices; Chapter 2. The Architecture of the World Wide Web; History and Terminology; A Packet's Tour of the Web; Who Owns the Internet?; Chapter 3. Cryptography Basics; Understanding Cryptography; Symmetric Key Algorithms; Public Key Algorithms; Message Digest Functions; Chapter 4. Cryptographyand the Web
- Cryptography and Web SecurityWorking Cryptographic System sand Protocols; What Cryptography Can't Do; Legal Restrictions on Cryptography; Chapter 5. Understanding SSL and TLS; What Is SSL?; SSL: The User's Point of View; Chapter 6. Digital Identification I: Passwords, Biometrics, and Digital Signatures; Physical Identification; Using Public Keys for Identification; Real-World Public Key Examples; Chapter 7. Digital Identification II: Digital Certificates, CAs, and PKI; Understanding Digital Certificates with PGP; Public Key Infrastructure; Open Policy Issues
- PART II. Privacy and Security for UsersChapter 8. The Web's War on Your Privacy; Understanding Privacy; User-Provided Information; Log Files; Understanding Cookies; Web Bugs; Conclusion; Chapter 9. Privacy-Protecting Techniques; Choosing a Good Service Provider; Picking a Great Password; Cleaning Up After Yourself; Avoiding Spam and Junk Email; Identity Theft; Chapter 10. Privacy-Protecting Technologies; Blocking Ads and Crushing Cookies; Anonymous Browsing; Secure Email; Chapter 11. Backups and Antitheft; Using Backups to Protect Your Data; Preventing Theft
- Chapter 12. Mobile Code I: Plug-Ins, ActiveX, and Visual BasicWhen Good Browsers Go Bad; Helper Applications and Plug-ins; Microsoft's ActiveX; The Risks of Downloaded Code; Conclusion; Chapter 13. Mobile Code II: Java, JavaScript, Flash, and Shockwave; Java; JavaScript; Flash and Shockwave; Conclusion; PART III. Web Server Security; Chapter 14. Physical Security for Servers; Planning for the Forgotten Threats; Protecting Computer Hardware; Protecting Your Data; Personnel; Story: A Failed Site Inspection; Chapter 15. Host Security for Servers; Current Host Security Problems
- Securing the Host ComputerMinimizing Risk by Minimizing Services; Operating Securely; Secure Remote Access and ContentUpdating; Firewalls and the Web; Conclusion; Chapter 16. Securing Web Applications; A Legacy of Extensibility and Risk; Rules to Code By; Securely Using Fields, Hidden Fields, and Cookies; Rules for Programming Languages; Using PHP Securely; Writing Scripts That Run with Additional Privileges; Connecting to Databases; Conclusion; Chapter 17. Deploying SSL Server Certificates; Planning for Your SSL Server; Creating SSL Servers with FreeBSD
- Installing an SSL Certificate on Microsoft IIS