Flylib.com
Security Technologies for the World Wide Web, Second Edition
Security Technologies for the World Wide Web, Second Edition
ISBN: 1580533485
EAN: 2147483647
Year: 2003
Pages: 142
Authors:
Rolf Oppliger
BUY ON AMAZON
Table of Contents
BackCover
Security Technologies for the World Wide Web, Second Edition
Preface
Chapter 1: Introduction
1.2 WWW
1.3 Vulnerabilities, threats, and countermeasures
1.4 Generic security model
References
Chapter 2: HTTP Security
2.2 User authentication, authorization, and access control In general, organizations run Web
2.3 Basic authentication
2.4 Digest access authentication
2.5 Certificate-based authentication
2.6 Server configuration
2.7 Conclusions
References
Chapter 3: Proxy Servers and Firewalls
3.2 Static packet filtering
3.3 Dynamic packet filtering or stateful inspection
3.4 Circuit-level gateways
3.5 Application-level gateways
3.6 Firewall configurations
3.7 Network address translation
3.8 Configuring the browser
3.9 Conclusions
References
Chapter 4: Cryptographic Techniques
4.2 Cryptographic hash functions
4.3 Secret key cryptography
4.4 Public key cryptography
4.5 Digital envelopes
4.6 Protection of cryptographic keys
4.7 Generation of pseudorandom bit sequences
4.8 Legal issues
4.9 Notation
References
Chapter 5: Internet Security Protocols
5.2 Network access layer security protocols
5.3 Internet layer security protocols
5.4 Transport layer security protocols
5.5 Application layer security protocols
5.6 Conclusions
References
Chapter 6: SSL and TLS Protocols
6.2 TLS Protocol
6.3 SSL and TLS certificates
6.4 Firewall traversal
6.5 Conclusions
References
Chapter 7: Certificate Management and Public Key Infrastructures
7.2 Public key certificates
7.3 IETF PKIX WG
7.4 Certificate revocation
7.5 Certificates for the WWW
7.6 Conclusions
References
Chapter 8: Authentication and Authorization Infrastructures
8.2 Microsoft .NET Passport
8.3 Kerberos-based AAIs
8.4 PKI-based AAIs
8.5 Conclusions
References
Chapter 9: Electronic Payment Systems
9.2 Electronic cash systems
9.3 Electronic checks
9.4 Electronic credit-card payments
9.5 Micropayment systems
9.6 Conclusions
References
Chapter 10: Client-side Security
10.2 Binary mail attachments
10.3 Helper applications and plug-ins
10.4 Scripting languages
10.5 Java applets
10.6 ActiveX controls
10.7 Security zones
10.8 Implications for firewalls
10.9 Conclusions
References
Chapter 11: Server-side Security
11.2 CGI
11.3 Server APIs
11.4 FastCGI
11.5 Server-side includes
11.6 ASP
11.7 JSP
11.8 Conclusions
References
Chapter 12: Privacy Protection and Anonymity Services
12.2 Early work
12.3 Cookies
12.4 Anonymous browsing
12.5 Anonymous publishing
12.6 Voluntary privacy standards
12.7 Conclusions
References
Chapter 13: Intellectual Property Protection
13.2 Usage control
13.3 Digital copyright labeling
13.4 Digital Millennium Copyright Act
13.5 Conclusions
References
Chapter 14: Censorship on the WWW
14.2 Content blocking
14.3 Content rating and self-determination
14.4 Conclusions
References
Chapter 15: Risk Management
15.2 Formal risk analysis
15.3 Alternative approaches and technologies
15.4 Conclusions
References
Chapter 16: Conclusions and Outlook
Abbreviations and Acronyms
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X
List of Figures
List of Tables
Security Technologies for the World Wide Web, Second Edition
ISBN: 1580533485
EAN: 2147483647
Year: 2003
Pages: 142
Authors:
Rolf Oppliger
BUY ON AMAZON
Java for RPG Programmers, 2nd Edition
The World Of Java
Structured Operations And Statements
String Manipulation
More Java
Appendix A Using Java on the AS/400
AutoCAD 2005 and AutoCAD LT 2005. No Experience Required
Grouping Objects into Blocks
Generating Elevations
Controlling Text in a Drawing
Dimensioning a Drawing
Using Layouts to Set Up a Print
Programming .Net Windows Applications
Publish and Subscribe
Creating a User Control
Menus and Bars
Creating Your First Menu
The ADO.NET Object Model
Python Standard Library (Nutshell Handbooks) with
The telnetlib Module
The unicodedata Module
The winsound Module
The curses Module
The bisect Module
User Interfaces in C#: Windows Forms and Custom Controls
Classic Controls
Modern Controls
Design-Time Support for Custom Controls
GDI+ Basics
GDI+ Controls
Digital Character Animation 3 (No. 3)
Designing a Character
Chapter Four. Basics of Animation
Secondary Action
Animating Walks
Animating Dialogue
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies