Muutke küpsiste eelistusi

E-raamat: Security Technologies for the World Wide Web, Second Edition

  • Formaat: 444 pages
  • Ilmumisaeg: 31-Jan-2002
  • Kirjastus: Artech House Publishers
  • ISBN-13: 9781580535854
  • Formaat - PDF+DRM
  • Hind: 87,75 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: 444 pages
  • Ilmumisaeg: 31-Jan-2002
  • Kirjastus: Artech House Publishers
  • ISBN-13: 9781580535854

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Intended for professionals, this comprehensive security primer covers the major topics in the field, with chapters on HTTP, proxy servers and firewalls, cryptography, internet security protocols, SSL and TSL protocols, certificate management and public key infrastructures, authentication and authorization infrastructures, electronic payment systems, client-side security, server-side security, privacy protection, intellectual property, censorship, and risk management. Opplinger is a security consultant. Annotation c. Book News, Inc., Portland, OR (booknews.com)
Preface xv
References xx
Acknowledgments xxiii
Introduction
1(20)
Internet
1(4)
WWW
5(3)
Vulnerabilities, threats, and countermeasures
8(2)
Generic security model
10(11)
Security policy
12(1)
Host security
13(1)
Network security
13(3)
Organizational security
16(1)
Legal security
17(1)
References
17(4)
HTTP Security
21(28)
HTTP
21(5)
User authentication, authorization, and access control
26(3)
Basic authentication
29(5)
Digest access authentication
34(7)
Certificate-based authentication
41(1)
Server configuration
42(4)
Configuring HTTP basic authentication
42(3)
Configuring HTTP digest access authentication
45(1)
Conclusions
46(3)
References
48(1)
Proxy Servers and Firewalls
49(38)
Introduction
49(5)
Static packet filtering
54(3)
Dynamic packet filtering or stateful inspection
57(1)
Circuit-level gateways
58(6)
Application-level gateways
64(4)
Firewall configurations
68(6)
Dual-homed firewall
69(2)
Screened host firewall
71(1)
Screened subnet firewall
72(2)
Network address translation
74(2)
Configuring the browser
76(4)
Conclusions
80(7)
References
83(4)
Cryptographic Techniques
87(30)
Introduction
87(3)
Cryptographic hash functions
90(2)
Secret key cryptography
92(4)
DES
93(1)
Triple-DES
93(2)
IDEA
95(1)
SAFER
95(1)
Blowfish
95(1)
CAST-128
95(1)
RC2, RC4, RC5, and RC6
95(1)
AES
96(1)
Public key cryptography
96(7)
RSA
100(1)
Diffie-Hellman
101(1)
ElGamal
102(1)
DSS
102(1)
ECC
102(1)
Digital envelopes
103(2)
Protection of cryptographic keys
105(2)
Generation of pseudorandom bit sequences
107(1)
Legal issues
107(4)
Patent claims
108(1)
Regulations
109(1)
Electronic and digital signature legislation
110(1)
Notation
111(6)
References
113(4)
Internet Security Protocols
117(36)
Introduction
117(1)
Network access layer security protocols
118(7)
Layer 2 Forwarding Protocol
121(1)
Point-to-Point Tunneling Protocol
122(2)
Layer 2 Tunneling Protocol
124(1)
Virtual private networking
124(1)
Internet layer security protocols
125(18)
IP security architecture
128(3)
IPsec protocols
131(5)
IKE Protocol
136(5)
Implementations
141(2)
Transport layer security protocols
143(1)
Application layer security protocols
143(3)
Security-enhanced application protocols
144(1)
Authentication and key distribution systems
144(1)
Layering security protocols above the application layer
145(1)
Conclusions
146(7)
References
148(5)
SSL and TLS Protocols
153(32)
SSL Protocol
153(18)
History
153(2)
Architecture
155(4)
SSL Record Protocol
159(2)
SSL Handshake Protocol
161(6)
Security analysis
167(2)
Implementations
169(2)
TLS Protocol
171(4)
SSL and TLS certificates
175(3)
Firewall traversal
178(4)
SSL/TLS tunneling
179(2)
SSL/TLS proxy servers
181(1)
Conclusions
182(3)
References
183(2)
Certificate Management and Public Key Infrastructures
185(28)
Introduction
185(2)
Public key certificates
187(6)
PGP certificates
188(2)
X.509 certificates
190(3)
IETF PKIX WG
193(3)
Certificate revocation
196(5)
CRLs
198(1)
OCSP
199(1)
Alternative schemes
200(1)
Certificates for the WWW
201(6)
CA certificates
201(2)
Server or site certificates
203(1)
Personal certificates
204(1)
Software publisher certificates
205(2)
Conclusions
207(6)
References
210(3)
Authentication and Authorization Infrastructures
213(36)
Introduction
213(3)
Microsoft .NET Passport
216(15)
Overview
217(2)
.NET Passport user accounts
219(3)
.NET Passport SSI service
222(6)
Complementary services
228(2)
Security analysis
230(1)
Kerberos-based AAIs
231(10)
Kerberos
231(9)
SESAME
240(1)
Windows 2000
240(1)
PKI-based AAIs
241(4)
Conclusions
245(4)
References
245(4)
Electronic Payment Systems
249(18)
Introduction
249(6)
Electronic cash systems
255(2)
Electronic checks
257(2)
Electronic credit-card payments
259(2)
Micropayment systems
261(1)
Conclusions
262(5)
References
264(3)
Client-side Security
267(30)
Introduction
267(4)
Binary mail attachments
271(1)
Helper applications and plug-ins
272(3)
Scripting languages
275(3)
Java applets
278(5)
Security architecture
279(2)
Security policy
281(1)
Code signing
281(2)
ActiveX controls
283(5)
Security zones
288(3)
Implications for firewalls
291(2)
Conclusions
293(4)
References
294(3)
Server-side Security
297(20)
Introduction
297(3)
CGI
300(9)
Server APIs
309(1)
FastCGI
310(1)
Server-side includes
311(1)
ASP
312(1)
JSP
313(1)
Conclusions
314(3)
References
314(3)
Privacy Protection and Anonymity Services
317(30)
Introduction
317(4)
Early work
321(3)
Cookies
324(4)
Anonymous browsing
328(8)
Anonymizing HTTP proxy servers
329(1)
JAP
330(1)
Crowds
330(3)
Onion routing
333(3)
Freedom network
336(1)
Anonymous publishing
336(5)
JANUS and the rewebber service
336(2)
TAZ servers and the rewebber network
338(2)
Publius
340(1)
Voluntary privacy standards
341(2)
Privacy seals
341(1)
P3P
342(1)
Conclusions
343(4)
References
344(3)
Intellectual Property Protection
347(12)
Introduction
347(2)
Usage control
349(2)
Digital copyright labeling
351(5)
Introduction
351(1)
Categories of watermarking techniques
352(3)
Attacks
355(1)
Digital Millenium Copyright Act
356(1)
Conclusions
357(2)
References
358(1)
Censorship on the WWW
359(16)
Introduction
359(1)
Content blocking
360(5)
IP address blocking
361(2)
URL blocking
363(2)
Content rating and self-determination
365(6)
Conclusions
371(4)
References
373(2)
Risk Management
375(10)
Introduction
375(3)
Formal risk analysis
378(1)
Alternative approaches and technologies
379(3)
Security Scanning
379(2)
Intrusion Detection
381(1)
Conclusions
382(3)
References
383(2)
Conclusions and Outlook
385(4)
Abbreviations and Acronyms 389(14)
About the Author 403(2)
Index 405