Flylib.com
Security Technologies for the World Wide Web, Second Edition
Security Technologies for the World Wide Web, Second Edition
ISBN: 1580533485
EAN: 2147483647
Year: 2003
Pages: 142
Authors:
Rolf Oppliger
BUY ON AMAZON
Table of Contents
BackCover
Security Technologies for the World Wide Web, Second Edition
Preface
Chapter 1: Introduction
1.2 WWW
1.3 Vulnerabilities, threats, and countermeasures
1.4 Generic security model
References
Chapter 2: HTTP Security
2.2 User authentication, authorization, and access control In general, organizations run Web
2.3 Basic authentication
2.4 Digest access authentication
2.5 Certificate-based authentication
2.6 Server configuration
2.7 Conclusions
References
Chapter 3: Proxy Servers and Firewalls
3.2 Static packet filtering
3.3 Dynamic packet filtering or stateful inspection
3.4 Circuit-level gateways
3.5 Application-level gateways
3.6 Firewall configurations
3.7 Network address translation
3.8 Configuring the browser
3.9 Conclusions
References
Chapter 4: Cryptographic Techniques
4.2 Cryptographic hash functions
4.3 Secret key cryptography
4.4 Public key cryptography
4.5 Digital envelopes
4.6 Protection of cryptographic keys
4.7 Generation of pseudorandom bit sequences
4.8 Legal issues
4.9 Notation
References
Chapter 5: Internet Security Protocols
5.2 Network access layer security protocols
5.3 Internet layer security protocols
5.4 Transport layer security protocols
5.5 Application layer security protocols
5.6 Conclusions
References
Chapter 6: SSL and TLS Protocols
6.2 TLS Protocol
6.3 SSL and TLS certificates
6.4 Firewall traversal
6.5 Conclusions
References
Chapter 7: Certificate Management and Public Key Infrastructures
7.2 Public key certificates
7.3 IETF PKIX WG
7.4 Certificate revocation
7.5 Certificates for the WWW
7.6 Conclusions
References
Chapter 8: Authentication and Authorization Infrastructures
8.2 Microsoft .NET Passport
8.3 Kerberos-based AAIs
8.4 PKI-based AAIs
8.5 Conclusions
References
Chapter 9: Electronic Payment Systems
9.2 Electronic cash systems
9.3 Electronic checks
9.4 Electronic credit-card payments
9.5 Micropayment systems
9.6 Conclusions
References
Chapter 10: Client-side Security
10.2 Binary mail attachments
10.3 Helper applications and plug-ins
10.4 Scripting languages
10.5 Java applets
10.6 ActiveX controls
10.7 Security zones
10.8 Implications for firewalls
10.9 Conclusions
References
Chapter 11: Server-side Security
11.2 CGI
11.3 Server APIs
11.4 FastCGI
11.5 Server-side includes
11.6 ASP
11.7 JSP
11.8 Conclusions
References
Chapter 12: Privacy Protection and Anonymity Services
12.2 Early work
12.3 Cookies
12.4 Anonymous browsing
12.5 Anonymous publishing
12.6 Voluntary privacy standards
12.7 Conclusions
References
Chapter 13: Intellectual Property Protection
13.2 Usage control
13.3 Digital copyright labeling
13.4 Digital Millennium Copyright Act
13.5 Conclusions
References
Chapter 14: Censorship on the WWW
14.2 Content blocking
14.3 Content rating and self-determination
14.4 Conclusions
References
Chapter 15: Risk Management
15.2 Formal risk analysis
15.3 Alternative approaches and technologies
15.4 Conclusions
References
Chapter 16: Conclusions and Outlook
Abbreviations and Acronyms
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X
List of Figures
List of Tables
Security Technologies for the World Wide Web, Second Edition
ISBN: 1580533485
EAN: 2147483647
Year: 2003
Pages: 142
Authors:
Rolf Oppliger
BUY ON AMAZON
Interprocess Communications in Linux: The Nooks and Crannies
Introduction
The /proc Filesystem
Waiting on Processes
IPC Using Socketpair
D.3. Generating Profile Data
Absolute Beginner[ap]s Guide to Project Management
Project Definition Checklist
The Essential Process for Managing Project Risks
Are You Sure Its a Risk?
Managing Project Communications
Managing Differences
Lotus Notes and Domino 6 Development (2nd Edition)
Archiving Versions with Templates
Working with Text Properties
Designing Views
Adding and Editing View Columns
Programming Practices
Lotus Notes Developers Toolbox: Tips for Rapid and Successful Deployment
Launching the Designer Client
What Are Functions and Commands?
Using Formula Language in LotusScript Code
LotusScript Agent to Modify All Documents Containing a Specific Field Value
Composite Application Development Tools
Mapping Hacks: Tips & Tools for Electronic Cartography
Hack 2. Route Planning Online
Hack 5. The Road Less Traveled by in MapQuest
Hack 13. Add Maps to Excel Spreadsheets with MapPoint
Hack 73. Make Your Own Contour Maps
Hack 80. Automatically Geocode U.S. Addresses
Telecommunications Essentials, Second Edition: The Complete Global Source (2nd Edition)
Coaxial Cable
The PSTN Versus the Internet
The Broadband Infrastructure
WPANs
The IP Multimedia Subsystem
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies