Preface |
|
xv | |
References |
|
xx | |
Acknowledgments |
|
xxiii | |
|
|
1 | (20) |
|
|
1 | (4) |
|
|
5 | (3) |
|
Vulnerabilities, threats, and countermeasures |
|
|
8 | (2) |
|
|
10 | (11) |
|
|
12 | (1) |
|
|
13 | (1) |
|
|
13 | (3) |
|
|
16 | (1) |
|
|
17 | (1) |
|
|
17 | (4) |
|
|
21 | (28) |
|
|
21 | (5) |
|
User authentication, authorization, and access control |
|
|
26 | (3) |
|
|
29 | (5) |
|
Digest access authentication |
|
|
34 | (7) |
|
Certificate-based authentication |
|
|
41 | (1) |
|
|
42 | (4) |
|
Configuring HTTP basic authentication |
|
|
42 | (3) |
|
Configuring HTTP digest access authentication |
|
|
45 | (1) |
|
|
46 | (3) |
|
|
48 | (1) |
|
Proxy Servers and Firewalls |
|
|
49 | (38) |
|
|
49 | (5) |
|
|
54 | (3) |
|
Dynamic packet filtering or stateful inspection |
|
|
57 | (1) |
|
|
58 | (6) |
|
Application-level gateways |
|
|
64 | (4) |
|
|
68 | (6) |
|
|
69 | (2) |
|
|
71 | (1) |
|
|
72 | (2) |
|
Network address translation |
|
|
74 | (2) |
|
|
76 | (4) |
|
|
80 | (7) |
|
|
83 | (4) |
|
|
87 | (30) |
|
|
87 | (3) |
|
Cryptographic hash functions |
|
|
90 | (2) |
|
|
92 | (4) |
|
|
93 | (1) |
|
|
93 | (2) |
|
|
95 | (1) |
|
|
95 | (1) |
|
|
95 | (1) |
|
|
95 | (1) |
|
|
95 | (1) |
|
|
96 | (1) |
|
|
96 | (7) |
|
|
100 | (1) |
|
|
101 | (1) |
|
|
102 | (1) |
|
|
102 | (1) |
|
|
102 | (1) |
|
|
103 | (2) |
|
Protection of cryptographic keys |
|
|
105 | (2) |
|
Generation of pseudorandom bit sequences |
|
|
107 | (1) |
|
|
107 | (4) |
|
|
108 | (1) |
|
|
109 | (1) |
|
Electronic and digital signature legislation |
|
|
110 | (1) |
|
|
111 | (6) |
|
|
113 | (4) |
|
Internet Security Protocols |
|
|
117 | (36) |
|
|
117 | (1) |
|
Network access layer security protocols |
|
|
118 | (7) |
|
Layer 2 Forwarding Protocol |
|
|
121 | (1) |
|
Point-to-Point Tunneling Protocol |
|
|
122 | (2) |
|
Layer 2 Tunneling Protocol |
|
|
124 | (1) |
|
Virtual private networking |
|
|
124 | (1) |
|
Internet layer security protocols |
|
|
125 | (18) |
|
|
128 | (3) |
|
|
131 | (5) |
|
|
136 | (5) |
|
|
141 | (2) |
|
Transport layer security protocols |
|
|
143 | (1) |
|
Application layer security protocols |
|
|
143 | (3) |
|
Security-enhanced application protocols |
|
|
144 | (1) |
|
Authentication and key distribution systems |
|
|
144 | (1) |
|
Layering security protocols above the application layer |
|
|
145 | (1) |
|
|
146 | (7) |
|
|
148 | (5) |
|
|
153 | (32) |
|
|
153 | (18) |
|
|
153 | (2) |
|
|
155 | (4) |
|
|
159 | (2) |
|
|
161 | (6) |
|
|
167 | (2) |
|
|
169 | (2) |
|
|
171 | (4) |
|
|
175 | (3) |
|
|
178 | (4) |
|
|
179 | (2) |
|
|
181 | (1) |
|
|
182 | (3) |
|
|
183 | (2) |
|
Certificate Management and Public Key Infrastructures |
|
|
185 | (28) |
|
|
185 | (2) |
|
|
187 | (6) |
|
|
188 | (2) |
|
|
190 | (3) |
|
|
193 | (3) |
|
|
196 | (5) |
|
|
198 | (1) |
|
|
199 | (1) |
|
|
200 | (1) |
|
|
201 | (6) |
|
|
201 | (2) |
|
Server or site certificates |
|
|
203 | (1) |
|
|
204 | (1) |
|
Software publisher certificates |
|
|
205 | (2) |
|
|
207 | (6) |
|
|
210 | (3) |
|
Authentication and Authorization Infrastructures |
|
|
213 | (36) |
|
|
213 | (3) |
|
|
216 | (15) |
|
|
217 | (2) |
|
.NET Passport user accounts |
|
|
219 | (3) |
|
.NET Passport SSI service |
|
|
222 | (6) |
|
|
228 | (2) |
|
|
230 | (1) |
|
|
231 | (10) |
|
|
231 | (9) |
|
|
240 | (1) |
|
|
240 | (1) |
|
|
241 | (4) |
|
|
245 | (4) |
|
|
245 | (4) |
|
Electronic Payment Systems |
|
|
249 | (18) |
|
|
249 | (6) |
|
|
255 | (2) |
|
|
257 | (2) |
|
Electronic credit-card payments |
|
|
259 | (2) |
|
|
261 | (1) |
|
|
262 | (5) |
|
|
264 | (3) |
|
|
267 | (30) |
|
|
267 | (4) |
|
|
271 | (1) |
|
Helper applications and plug-ins |
|
|
272 | (3) |
|
|
275 | (3) |
|
|
278 | (5) |
|
|
279 | (2) |
|
|
281 | (1) |
|
|
281 | (2) |
|
|
283 | (5) |
|
|
288 | (3) |
|
Implications for firewalls |
|
|
291 | (2) |
|
|
293 | (4) |
|
|
294 | (3) |
|
|
297 | (20) |
|
|
297 | (3) |
|
|
300 | (9) |
|
|
309 | (1) |
|
|
310 | (1) |
|
|
311 | (1) |
|
|
312 | (1) |
|
|
313 | (1) |
|
|
314 | (3) |
|
|
314 | (3) |
|
Privacy Protection and Anonymity Services |
|
|
317 | (30) |
|
|
317 | (4) |
|
|
321 | (3) |
|
|
324 | (4) |
|
|
328 | (8) |
|
Anonymizing HTTP proxy servers |
|
|
329 | (1) |
|
|
330 | (1) |
|
|
330 | (3) |
|
|
333 | (3) |
|
|
336 | (1) |
|
|
336 | (5) |
|
JANUS and the rewebber service |
|
|
336 | (2) |
|
TAZ servers and the rewebber network |
|
|
338 | (2) |
|
|
340 | (1) |
|
Voluntary privacy standards |
|
|
341 | (2) |
|
|
341 | (1) |
|
|
342 | (1) |
|
|
343 | (4) |
|
|
344 | (3) |
|
Intellectual Property Protection |
|
|
347 | (12) |
|
|
347 | (2) |
|
|
349 | (2) |
|
Digital copyright labeling |
|
|
351 | (5) |
|
|
351 | (1) |
|
Categories of watermarking techniques |
|
|
352 | (3) |
|
|
355 | (1) |
|
Digital Millenium Copyright Act |
|
|
356 | (1) |
|
|
357 | (2) |
|
|
358 | (1) |
|
|
359 | (16) |
|
|
359 | (1) |
|
|
360 | (5) |
|
|
361 | (2) |
|
|
363 | (2) |
|
Content rating and self-determination |
|
|
365 | (6) |
|
|
371 | (4) |
|
|
373 | (2) |
|
|
375 | (10) |
|
|
375 | (3) |
|
|
378 | (1) |
|
Alternative approaches and technologies |
|
|
379 | (3) |
|
|
379 | (2) |
|
|
381 | (1) |
|
|
382 | (3) |
|
|
383 | (2) |
|
|
385 | (4) |
Abbreviations and Acronyms |
|
389 | (14) |
About the Author |
|
403 | (2) |
Index |
|
405 | |