MTU Cork Library Catalogue

Syndetics cover image
Image from Syndetics

Web security : a step-by-step reference guide / Lincoln D. Stein.

By: Stein, Lincoln D, 1960-.
Material type: materialTypeLabelBookPublisher: Reading, Mass. : Addison-Wesley, c1998Description: ix, 436 p. : ill. ; 24 cm. + pbk.ISBN: 0201634899 .Subject(s): Computer networks -- Security measures | World Wide Web -- Security measures | Web sites -- Security measuresDDC classification: 005.8
Contents:
What is Web Security? -- Part I: Document Confidentiality -- Basic Cryptography -- SSL, SET and Digital Payment Systems -- Part II: Client-Side Security -- Using SSL -- Active Content -- Web Privacy -- Part III: Server-Side Security -- Server Security -- UNIX Web Servers -- Windows NT Web Servers -- Access Control -- Encryption and Certificate-Based Access Control -- Safe CGI Scripting -- Remote Authoring and Administration -- Web Servers and Firewalls.
Holdings
Item type Current library Call number Copy number Status Date due Barcode Item holds
General Lending MTU Bishopstown Library Lending 005.8 (Browse shelf(Opens below)) 1 Available 00069055
General Lending MTU Bishopstown Library Lending 005.8 (Browse shelf(Opens below)) 1 Available 00086011
Total holds: 0

Enhanced descriptions from Syndetics:

This is a practical reference with a checklist approach to evaluate the security level of a web site. This book is a result of a surge of interest in the subject due to high-visiblity break-ins at the Department of Justice, CIA, and Microsoft. Appendixes include complete resource listing of security vendors and tools, firewall solutions and resellers.

Bibliography: (pages 421-422) and index.

What is Web Security? -- Part I: Document Confidentiality -- Basic Cryptography -- SSL, SET and Digital Payment Systems -- Part II: Client-Side Security -- Using SSL -- Active Content -- Web Privacy -- Part III: Server-Side Security -- Server Security -- UNIX Web Servers -- Windows NT Web Servers -- Access Control -- Encryption and Certificate-Based Access Control -- Safe CGI Scripting -- Remote Authoring and Administration -- Web Servers and Firewalls.

Table of contents provided by Syndetics

  • Preface
  • 1 What Is Web Security?
  • The Three Parts of Web Security
  • Risks
  • The Layout of This Book
  • I Document Confidentiality
  • 2 Basic Cryptography
  • How Cryptography Works
  • Symmetric Cryptography
  • Public Key Cryptography
  • Online Resources
  • Printed Resources
  • 3 SSL, SET, and Digital Payment Systems
  • Secure Sockets Layer
  • SET and Other Digital Payment Systems
  • Checklist
  • Online Resources
  • SET and Other Digital Money Systems
  • II Client-Side Security
  • 4 Using SSL
  • SSL at Work
  • Personal Certificates
  • Checklist
  • Online Resources
  • Printed Resources
  • 5 Active Content
  • Bad by Design or Bad by Accident?
  • Traditional Threats
  • Helper Applications and Plug-Ins
  • Java
  • ActiveX
  • JavaScript and VBScript
  • The Browser as a Security Hole
  • Exotic Technologies
  • What Can You Do?
  • Changing Active Content Settings
  • Checklist
  • Resources
  • 6 Web Privacy
  • What Web Surfing Reveals
  • Server Logs
  • Cookies
  • PICS
  • Advice for Users
  • Advice for Webmasters
  • Policy Initiatives
  • Checklist
  • Resources
  • III Server-Side Security
  • 7 Server Security
  • Why Are Websites Vulnerable?
  • Frequently Asked Questions about Web Server Security
  • Overview: Steps to Securing a Website
  • Online Resources
  • 8 UNIX Web Servers
  • Hardening a UNIX Web Server
  • Configuring the Web Server
  • Monitoring Logs
  • Monitor the Integrity of System Files and Binaries
  • Back Up Your System
  • Checklist
  • Online Resources
  • Printed Resources
  • 9 Windows NT Web Servers
  • NT Security Concepts
  • Windows NT Security Risks
  • Securing a Windows NT Web Server
  • Configuring the Web Server
  • Checklist
  • Online Resources
  • Printed Resources
  • 10 Access Control
  • Types of Access Control
  • Access Control Based on IP Address or Host Name
  • Access Control Based on User Name and Password
  • Other Types of Access Control
  • Access Control and CGI Scripts
  • Checklist
  • Online Resources
  • 11 Encryption and Certificate-Based Access Control
  • SSL-Enabled Web Servers
  • Using Client Certificates for Access Control
  • Using Client Certificates for Web Server Access Control
  • Becoming Your Own Certifying Authority
  • Final Words
  • Checklist
  • Online Resources
  • Printed Resources
  • 12 Safe CGI Scripting
  • Introduction to CGI Scripts and Server Modules
  • Common Failure Modes
  • Other Advice
  • Safe Scripting in Perl
  • CGI Wrappers
  • Checklist
  • Online Resources
  • Printed Resources
  • 13 Remote Authoring and Administration
  • Degrees of Trust
  • Controlling Access to the Web Server Host
  • Remote Authoring Via FTP
  • Microsoft FrontPage
  • The HTTP PUT Protocol
  • An Upload Staging Area
  • Administering the Web Server Remotely
  • Access to the Server for Web Developers
  • Checklist
  • Online Resources
  • Printed

Excerpt provided by Syndetics

This is the "how not to shoot yourself in the foot" book about Web security. Enough theory to be interesting, but not so much that it gets dry and academic. Enough war stories to be fun, but not so many that they overwhelm the rest. No political agenda. No favoritism. You'll find here nothing but practical, commonsense advice for sidestepping the hoard of little gotchas that currently plague the Web, plus you'll find a framework for deciding for yourself how to handle all the gotchas that are yet to be. Who is this book for? The first third of the book deals with problems that are relevant to anyone who uses the Web: privacy threats, the potential of the Web to spread viruses and other malicious software, the practice and pitfalls of electronic commerce. The remainder gives advice directed to Webmasters, system administrators, system security officers, and others who worry that their organizations' Web sites might be broken into or that their local area network can be compromised by nasty stuff brought in by their employees' Web surfing. If you already run a Web site, you'll want to read this book through. If you're a casual Web surfer, read the first part now and save the rest for later. If current trends continue, everyone will have a Web site and will have to worry about keeping it safe. Web Security: A Step-by-Step Reference Guide began life about two years ago as the World Wide Web Security FAQ. I was concerned that new Web sites were going up at an amazing rate, with little appreciation for the security implications. I was dismayed that much of the advice being dispensed was incomplete or simply misinformed. So I put together 30 or so frequently asked questions (with answers) to advise Webmasters on how to keep their sites safe from attack by unwanted intruders, and I posted it on my Web site. Over a period of months, the FAQ grew considerably as readers mailed in requests for more information, suggestions, and in some cases contributed their own questions and answers. To the original sections on server-side security, I added sections dealing with client-side (browser) security, privacy issues, sections on cryptography and digital money, and an ever-growing list of security holes in specific pieces of software. In 1996, the first of an epidemic of Web site break-ins shook the Web; in its aftermath, the number of "hits" on the FAQ grew tremendously. The FAQ is now mirrored on five continents and has been translated into Russian, Italian, and Chinese. When my editor initially suggested I turn the FAQ into a book, I was skeptical. First of all, the information was already on line. Second, the Web is changing so rapidly that any book on security issues is out of date by the time it hits the shelves. Finally, the whole FAQ was less than 50 typeset pages and I was dubious that it could be bulked up into a full-length book. To the first two objections, my editor responded that printed books and the Web are complementary. Printed books provide depth and comprehensiveness. The Web provides vast breadth and information that is always (we hope) up to date. As for my last objection, the weighty answer to that is in your hands. Acknowledgments I am grateful to everyone who helped during the conception, research, writing, and production of this book. Bob Bagwill, Jim Carroll, Tom Christiansen, Ian Redfern, Laura Pearlman, Bob Denny, and countless others contributed substantially to the WWW Security FAQ. Their insight and understanding has enriched the FAQ and this book, as well. Many thanks to Lewis Geer at Microsoft Corporation, who helped me sort out the ins and outs of Internet Explorer and active content, and to Brian Kendig at Netscape Corporation, who performed a similar role with Java and JavaScript. My warmest thanks also to my technical reviewers Mike Stok, Tom Markham, and Fred Douglis, each of whom came through with many helpful corrections and suggestions, in record time. At the MIT Genome Center, many thanks to Lois Bennett and Susan Alderman, two tirelessly cheerful system administrators who never seemed to mind my turning the Web site and LAN into a laboratory bench for every new scheme I wanted to try out. I gravely promise to them that I will never again rip out all the server software and replace it with "new and improved" code at the start of a four-day weekend. At Addison Wesley Longman, I am indebted to Carol Long, my first editor and the one who convinced me to launch this project, to Karen Gettman, who took over the project when Carol's career took her elsewhere, and to Mary Harrington, who kept everything from unraveling during the transition. Thanks also to Marilyn Rash, who coordinated the production effort. Last, many thanks to Jean Siao, who blinked not an eye as her Macintosh was slowly swallowed by tangled mats of network cabling and spare parts. Yes, you can play SimCity now without fear of electrocution. Nanjing August 1997 0201634899P04062001 Excerpted from Web Security: A Step-by-Step Reference Guide by Lincoln D. Stein All rights reserved by the original copyright owners. Excerpts are provided for display purposes only and may not be reproduced, reprinted or distributed without the written permission of the publisher.

Author notes provided by Syndetics

Lincoln Stein has an M.D. and is a scientist at Cold Spring Harbor Laboratory. When the Web first emerged, he created and maintained one of the earliest Internet sites for distribution of Human Genome Project data and has since become an acknowledged expert in Web, network, and Perl programming. Known for his exceptional ability to synthesize and present complex information, he writes for The Perl Journal and Web Techniques magazines and is the author of four other books.



0201634899AB04062001

Powered by Koha