Flylib.com
Security Technologies for the World Wide Web, Second Edition
Security Technologies for the World Wide Web, Second Edition
ISBN: 1580533485
EAN: 2147483647
Year: 2003
Pages: 142
Authors:
Rolf Oppliger
BUY ON AMAZON
Table of Contents
BackCover
Security Technologies for the World Wide Web, Second Edition
Preface
Chapter 1: Introduction
1.2 WWW
1.3 Vulnerabilities, threats, and countermeasures
1.4 Generic security model
References
Chapter 2: HTTP Security
2.2 User authentication, authorization, and access control In general, organizations run Web
2.3 Basic authentication
2.4 Digest access authentication
2.5 Certificate-based authentication
2.6 Server configuration
2.7 Conclusions
References
Chapter 3: Proxy Servers and Firewalls
3.2 Static packet filtering
3.3 Dynamic packet filtering or stateful inspection
3.4 Circuit-level gateways
3.5 Application-level gateways
3.6 Firewall configurations
3.7 Network address translation
3.8 Configuring the browser
3.9 Conclusions
References
Chapter 4: Cryptographic Techniques
4.2 Cryptographic hash functions
4.3 Secret key cryptography
4.4 Public key cryptography
4.5 Digital envelopes
4.6 Protection of cryptographic keys
4.7 Generation of pseudorandom bit sequences
4.8 Legal issues
4.9 Notation
References
Chapter 5: Internet Security Protocols
5.2 Network access layer security protocols
5.3 Internet layer security protocols
5.4 Transport layer security protocols
5.5 Application layer security protocols
5.6 Conclusions
References
Chapter 6: SSL and TLS Protocols
6.2 TLS Protocol
6.3 SSL and TLS certificates
6.4 Firewall traversal
6.5 Conclusions
References
Chapter 7: Certificate Management and Public Key Infrastructures
7.2 Public key certificates
7.3 IETF PKIX WG
7.4 Certificate revocation
7.5 Certificates for the WWW
7.6 Conclusions
References
Chapter 8: Authentication and Authorization Infrastructures
8.2 Microsoft .NET Passport
8.3 Kerberos-based AAIs
8.4 PKI-based AAIs
8.5 Conclusions
References
Chapter 9: Electronic Payment Systems
9.2 Electronic cash systems
9.3 Electronic checks
9.4 Electronic credit-card payments
9.5 Micropayment systems
9.6 Conclusions
References
Chapter 10: Client-side Security
10.2 Binary mail attachments
10.3 Helper applications and plug-ins
10.4 Scripting languages
10.5 Java applets
10.6 ActiveX controls
10.7 Security zones
10.8 Implications for firewalls
10.9 Conclusions
References
Chapter 11: Server-side Security
11.2 CGI
11.3 Server APIs
11.4 FastCGI
11.5 Server-side includes
11.6 ASP
11.7 JSP
11.8 Conclusions
References
Chapter 12: Privacy Protection and Anonymity Services
12.2 Early work
12.3 Cookies
12.4 Anonymous browsing
12.5 Anonymous publishing
12.6 Voluntary privacy standards
12.7 Conclusions
References
Chapter 13: Intellectual Property Protection
13.2 Usage control
13.3 Digital copyright labeling
13.4 Digital Millennium Copyright Act
13.5 Conclusions
References
Chapter 14: Censorship on the WWW
14.2 Content blocking
14.3 Content rating and self-determination
14.4 Conclusions
References
Chapter 15: Risk Management
15.2 Formal risk analysis
15.3 Alternative approaches and technologies
15.4 Conclusions
References
Chapter 16: Conclusions and Outlook
Abbreviations and Acronyms
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X
List of Figures
List of Tables
Security Technologies for the World Wide Web, Second Edition
ISBN: 1580533485
EAN: 2147483647
Year: 2003
Pages: 142
Authors:
Rolf Oppliger
BUY ON AMAZON
ERP and Data Warehousing in Organizations: Issues and Challenges
ERP System Acquisition: A Process Model and Results From an Austrian Survey
The Second Wave ERP Market: An Australian Viewpoint
Data Mining for Business Process Reengineering
Intrinsic and Contextual Data Quality: The Effect of Media and Personal Involvement
Development of Interactive Web Sites to Enhance Police/Community Relations
FileMaker Pro 8: The Missing Manual
Editing Whats in Your Fields
Print-Related Layout Options
Comments
Printing
Organizing Complex Scripts
The Java Tutorial: A Short Course on the Basics, 4th Edition
What Is an Object?
The Catch or Specify Requirement
Questions and Exercises
Overview of the Swing API
Appendix C. Collections
Pocket Guide to the National Electrical Code(R), 2005 Edition (8th Edition)
Article 320 Armored Cable Type AC
Article 324 Flat Conductor Cable Type FCC
Article 701 Legally Required Standby Systems
Article 702 Optional Standby Systems
Example No. D1(a) One-Family Dwelling
Web Systems Design and Online Consumer Behavior
Chapter III Two Models of Online Patronage: Why Do Consumers Shop on the Internet?
Chapter VII Objective and Perceived Complexity and Their Impacts on Internet Communication
Chapter XI User Satisfaction with Web Portals: An Empirical Study
Chapter XII Web Design and E-Commerce
Chapter XIII Shopping Agent Web Sites: A Comparative Shopping Environment
HTI+ Home Technology Integrator & CEDIA Installer I All-In-One Exam Guide
Distributed Video Basics
Designing and Installing Distributed Video Systems
Home Lighting Devices
Designing and Installing a Home Telephone System
User Interfaces
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies