Flylib.com
Security Technologies for the World Wide Web, Second Edition
Security Technologies for the World Wide Web, Second Edition
ISBN: 1580533485
EAN: 2147483647
Year: 2003
Pages: 142
Authors:
Rolf Oppliger
BUY ON AMAZON
Table of Contents
BackCover
Security Technologies for the World Wide Web, Second Edition
Preface
Chapter 1: Introduction
1.2 WWW
1.3 Vulnerabilities, threats, and countermeasures
1.4 Generic security model
References
Chapter 2: HTTP Security
2.2 User authentication, authorization, and access control In general, organizations run Web
2.3 Basic authentication
2.4 Digest access authentication
2.5 Certificate-based authentication
2.6 Server configuration
2.7 Conclusions
References
Chapter 3: Proxy Servers and Firewalls
3.2 Static packet filtering
3.3 Dynamic packet filtering or stateful inspection
3.4 Circuit-level gateways
3.5 Application-level gateways
3.6 Firewall configurations
3.7 Network address translation
3.8 Configuring the browser
3.9 Conclusions
References
Chapter 4: Cryptographic Techniques
4.2 Cryptographic hash functions
4.3 Secret key cryptography
4.4 Public key cryptography
4.5 Digital envelopes
4.6 Protection of cryptographic keys
4.7 Generation of pseudorandom bit sequences
4.8 Legal issues
4.9 Notation
References
Chapter 5: Internet Security Protocols
5.2 Network access layer security protocols
5.3 Internet layer security protocols
5.4 Transport layer security protocols
5.5 Application layer security protocols
5.6 Conclusions
References
Chapter 6: SSL and TLS Protocols
6.2 TLS Protocol
6.3 SSL and TLS certificates
6.4 Firewall traversal
6.5 Conclusions
References
Chapter 7: Certificate Management and Public Key Infrastructures
7.2 Public key certificates
7.3 IETF PKIX WG
7.4 Certificate revocation
7.5 Certificates for the WWW
7.6 Conclusions
References
Chapter 8: Authentication and Authorization Infrastructures
8.2 Microsoft .NET Passport
8.3 Kerberos-based AAIs
8.4 PKI-based AAIs
8.5 Conclusions
References
Chapter 9: Electronic Payment Systems
9.2 Electronic cash systems
9.3 Electronic checks
9.4 Electronic credit-card payments
9.5 Micropayment systems
9.6 Conclusions
References
Chapter 10: Client-side Security
10.2 Binary mail attachments
10.3 Helper applications and plug-ins
10.4 Scripting languages
10.5 Java applets
10.6 ActiveX controls
10.7 Security zones
10.8 Implications for firewalls
10.9 Conclusions
References
Chapter 11: Server-side Security
11.2 CGI
11.3 Server APIs
11.4 FastCGI
11.5 Server-side includes
11.6 ASP
11.7 JSP
11.8 Conclusions
References
Chapter 12: Privacy Protection and Anonymity Services
12.2 Early work
12.3 Cookies
12.4 Anonymous browsing
12.5 Anonymous publishing
12.6 Voluntary privacy standards
12.7 Conclusions
References
Chapter 13: Intellectual Property Protection
13.2 Usage control
13.3 Digital copyright labeling
13.4 Digital Millennium Copyright Act
13.5 Conclusions
References
Chapter 14: Censorship on the WWW
14.2 Content blocking
14.3 Content rating and self-determination
14.4 Conclusions
References
Chapter 15: Risk Management
15.2 Formal risk analysis
15.3 Alternative approaches and technologies
15.4 Conclusions
References
Chapter 16: Conclusions and Outlook
Abbreviations and Acronyms
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X
List of Figures
List of Tables
Security Technologies for the World Wide Web, Second Edition
ISBN: 1580533485
EAN: 2147483647
Year: 2003
Pages: 142
Authors:
Rolf Oppliger
BUY ON AMAZON
The .NET Developers Guide to Directory Services Programming
Extended DN Queries
Collection Class Usage
Managing Passwords for Active Directory Users
Determining User Group Membership in Active Directory and ADAM
Summary
FileMaker Pro 8: The Missing Manual
Creating a New Database
Printing and Preview Mode
Adding Field Controls to Layouts
Managing Data with Data Tunneling
Appendix B. FileMaker Error Codes
The Complete Cisco VPN Configuration Guide
Key Exchange
Authentication Methods
Summary
VPN Client GUI Options
Easy VPN Server Support for 6.x
Making Sense of Change Management: A Complete Guide to the Models, Tools and Techniques of Organizational Change
Part I - The Underpinning Theory
Team change
Restructuring
Cultural change
IT-based process change
Competency-Based Human Resource Management
Competency-Based Employee Recruitment and Selection
Competency-Based Employee Rewards
The Transformation to Competency-Based HR Management
Appendix A Frequently Asked Questions About Competency-Based HR Management
Appendix B Further Suggestions on Employee Development
Professional Struts Applications: Building Web Sites with Struts ObjectRelational Bridge, Lucene, and Velocity (Experts Voice)
The Challenges of Web Application Development
Managing Business Logic with Struts
Building a Data Access Tier with ObjectRelationalBridge
Templates and Velocity
Building the JavaEdge Application with Ant and Anthill
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies