Flylib.com
Apache Security
Apache Security
ISBN: 0596007248
EAN: 2147483647
Year: 2005
Pages: 114
Authors:
Ivan Ristic
BUY ON AMAZON
Apache Security
Table of Contents
Dedication
Copyright
Preface
Audience
Scope
Contents of This Book
Online Companion
Conventions Used in This Book
Using Code Examples
We d Like to Hear from You
Safari Enabled
Acknowledgments
Chapter 1. Apache Security Principles
Section 1.1. Security Definitions
Section 1.2. Web Application Architecture Blueprints
Chapter 2. Installation and Configuration
Section 2.1. Installation
Section 2.2. Configuration and Hardening
Section 2.3. Changing Web Server Identity
Section 2.4. Putting Apache in Jail
Chapter 3. PHP
Section 3.1. Installation
Section 3.2. Configuration
Section 3.3. Advanced PHP Hardening
Chapter 4. SSL and TLS
Section 4.1. Cryptography
Section 4.2. SSL
Section 4.3. OpenSSL
Section 4.4. Apache and SSL
Section 4.5. Setting Up a Certificate Authority
Section 4.6. Performance Considerations
Chapter 5. Denial of Service Attacks
Section 5.1. Network Attacks
Section 5.2. Self-Inflicted Attacks
Section 5.3. Traffic Spikes
Section 5.4. Attacks on Apache
Section 5.5. Local Attacks
Section 5.6. Traffic-Shaping Modules
Section 5.7. DoS Defense Strategy
Chapter 6. Sharing Servers
Section 6.1. Sharing Problems
Section 6.2. Distributing Configuration Data
Section 6.3. Securing Dynamic Requests
Section 6.4. Working with Large Numbers of Users
Chapter 7. Access Control
Section 7.1. Overview
Section 7.2. Authentication Methods
Section 7.3. Access Control in Apache
Section 7.4. Single Sign-on
Chapter 8. Logging and Monitoring
Section 8.1. Apache Logging Facilities
Section 8.2. Log Manipulation
Section 8.3. Remote Logging
Section 8.4. Logging Strategies
Section 8.5. Log Analysis
Section 8.6. Monitoring
Chapter 9. Infrastructure
Section 9.1. Application Isolation Strategies
Section 9.2. Host Security
Section 9.3. Network Security
Section 9.4. Using a Reverse Proxy
Section 9.5. Network Design
Chapter 10. Web Application Security
Section 10.1. Session Management Attacks
Section 10.2. Attacks on Clients
Section 10.3. Application Logic Flaws
Section 10.4. Information Disclosure
Section 10.5. File Disclosure
Section 10.6. Injection Flaws
Section 10.7. Buffer Overflows
Section 10.8. Evasion Techniques
Section 10.9. Web Application Security Resources
Chapter 11. Web Security Assessment
Section 11.1. Black-Box Testing
Section 11.2. White-Box Testing
Section 11.3. Gray-Box Testing
Chapter 12. Web Intrusion Detection
Section 12.1. Evolution of Web Intrusion Detection
Section 12.2. Using mod_security
Appendix A. Tools
Section A.1. Learning Environments
Section A.2. Information-Gathering Tools
Section A.3. Network-Level Tools
Section A.4. Web Security Scanners
Section A.5. Web Application Security Tools
Section A.6. HTTP Programming Libraries
Colophon
Index
SYMBOL
A
B
C
D
E
F
H
I
J
K
L
M
N
O
P
R
S
T
U
V
W
X
Apache Security
ISBN: 0596007248
EAN: 2147483647
Year: 2005
Pages: 114
Authors:
Ivan Ristic
BUY ON AMAZON
ERP and Data Warehousing in Organizations: Issues and Challenges
The Second Wave ERP Market: An Australian Viewpoint
The Effects of an Enterprise Resource Planning System (ERP) Implementation on Job Characteristics – A Study using the Hackman and Oldham Job Characteristics Model
Intrinsic and Contextual Data Quality: The Effect of Media and Personal Involvement
Healthcare Information: From Administrative to Practice Databases
Relevance and Micro-Relevance for the Professional as Determinants of IT-Diffusion and IT-Use in Healthcare
Oracle Developer Forms Techniques
Form Management in an OPEN_FORM Configuration
Tracking QUERY_ONLY Mode
Error-Message Handling
Smart Classes and Smart Triggers - How Smart Are They?
When to Use the Same Trigger and How to Make It Fire at Multiple Levels
WebLogic: The Definitive Guide
Using WebLogics RMI over IIOP
WebLogic-Specific Configuration Options
Configuring Trust Between Two Domains
Creating an Identity Assertion Provider
SNMP Proxies
SQL Hacks
Hack 1. Run SQL from the Command Line
Hack 47. Exploit an SQL Injection Vulnerability
Hack 85. Traverse a Simple Tree
Hack 87. Generate a Calendar
Hack 95. Issue Automatic Updates
Oracle SQL*Plus: The Definitive Guide (Definitive Guides)
Starting Command-Line SQL*Plus
Executing a Script
The Concept of Null
Subqueries
iSQL*Plus User Preferences
Visual Studio Tools for Office(c) Using C# with Excel, Word, Outlook, and InfoPath
Special Excel Issues
Conclusion
Location, Location, Location
Creating Setup Packages
VSTO Support for Excel Schema Mapping
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies