Flylib.com
Security Technologies for the World Wide Web, Second Edition
Security Technologies for the World Wide Web, Second Edition
ISBN: 1580533485
EAN: 2147483647
Year: 2003
Pages: 142
Authors:
Rolf Oppliger
BUY ON AMAZON
Table of Contents
BackCover
Security Technologies for the World Wide Web, Second Edition
Preface
Chapter 1: Introduction
1.2 WWW
1.3 Vulnerabilities, threats, and countermeasures
1.4 Generic security model
References
Chapter 2: HTTP Security
2.2 User authentication, authorization, and access control In general, organizations run Web
2.3 Basic authentication
2.4 Digest access authentication
2.5 Certificate-based authentication
2.6 Server configuration
2.7 Conclusions
References
Chapter 3: Proxy Servers and Firewalls
3.2 Static packet filtering
3.3 Dynamic packet filtering or stateful inspection
3.4 Circuit-level gateways
3.5 Application-level gateways
3.6 Firewall configurations
3.7 Network address translation
3.8 Configuring the browser
3.9 Conclusions
References
Chapter 4: Cryptographic Techniques
4.2 Cryptographic hash functions
4.3 Secret key cryptography
4.4 Public key cryptography
4.5 Digital envelopes
4.6 Protection of cryptographic keys
4.7 Generation of pseudorandom bit sequences
4.8 Legal issues
4.9 Notation
References
Chapter 5: Internet Security Protocols
5.2 Network access layer security protocols
5.3 Internet layer security protocols
5.4 Transport layer security protocols
5.5 Application layer security protocols
5.6 Conclusions
References
Chapter 6: SSL and TLS Protocols
6.2 TLS Protocol
6.3 SSL and TLS certificates
6.4 Firewall traversal
6.5 Conclusions
References
Chapter 7: Certificate Management and Public Key Infrastructures
7.2 Public key certificates
7.3 IETF PKIX WG
7.4 Certificate revocation
7.5 Certificates for the WWW
7.6 Conclusions
References
Chapter 8: Authentication and Authorization Infrastructures
8.2 Microsoft .NET Passport
8.3 Kerberos-based AAIs
8.4 PKI-based AAIs
8.5 Conclusions
References
Chapter 9: Electronic Payment Systems
9.2 Electronic cash systems
9.3 Electronic checks
9.4 Electronic credit-card payments
9.5 Micropayment systems
9.6 Conclusions
References
Chapter 10: Client-side Security
10.2 Binary mail attachments
10.3 Helper applications and plug-ins
10.4 Scripting languages
10.5 Java applets
10.6 ActiveX controls
10.7 Security zones
10.8 Implications for firewalls
10.9 Conclusions
References
Chapter 11: Server-side Security
11.2 CGI
11.3 Server APIs
11.4 FastCGI
11.5 Server-side includes
11.6 ASP
11.7 JSP
11.8 Conclusions
References
Chapter 12: Privacy Protection and Anonymity Services
12.2 Early work
12.3 Cookies
12.4 Anonymous browsing
12.5 Anonymous publishing
12.6 Voluntary privacy standards
12.7 Conclusions
References
Chapter 13: Intellectual Property Protection
13.2 Usage control
13.3 Digital copyright labeling
13.4 Digital Millennium Copyright Act
13.5 Conclusions
References
Chapter 14: Censorship on the WWW
14.2 Content blocking
14.3 Content rating and self-determination
14.4 Conclusions
References
Chapter 15: Risk Management
15.2 Formal risk analysis
15.3 Alternative approaches and technologies
15.4 Conclusions
References
Chapter 16: Conclusions and Outlook
Abbreviations and Acronyms
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X
List of Figures
List of Tables
Security Technologies for the World Wide Web, Second Edition
ISBN: 1580533485
EAN: 2147483647
Year: 2003
Pages: 142
Authors:
Rolf Oppliger
BUY ON AMAZON
ADO.NET 3.5 Cookbook (Cookbooks (OReilly))
Connecting to an Oracle Database
Creating a Strongly Typed DataSet
Using Parameterized SQL Statements
Improving Performance While Filling a DataSet
Enumerating and Maintaining Database Objects
Crystal Reports 9 on Oracle (Database Professionals)
Oracle SQL
PL/SQL
Optimizing: The Oracle Side
Other Tips
Appendix A Common Issues
Lotus Notes and Domino 6 Development (2nd Edition)
Working in the Application Design Environment
Understanding Pages
New Technologies and LotusScript
Enabling Database Encryption
Applying Field-Level Security
FileMaker Pro 8: The Missing Manual
Editing Whats in Your Fields
Creating a Calculation Field
Logical Functions
Managing Accounts
A.1. Getting Help from FileMaker Itself
Managing Enterprise Systems with the Windows Script Host
Networking Resources
Registry Operations
Application Automation
Network Administration/WMI
Security
C & Data Structures (Charles River Media Computer Engineering)
Data Types
The scanf Function
Preprocessing
Strings
Miscellaneous Problems
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies