Atjaunināt sīkdatņu piekrišanu

E-grāmata: Web Security, Privacy & Commerce: Security for Users, Administrators and ISPs

3.45/5 (53 ratings by Goodreads)
  • Formāts: 788 pages
  • Sērija : OREILLY
  • Izdošanas datums: 15-Nov-2001
  • Izdevniecība: O'Reilly Media
  • Valoda: eng
  • ISBN-13: 9781449305246
Citas grāmatas par šo tēmu:
  • Formāts - EPUB+DRM
  • Cena: 32,13 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: 788 pages
  • Sērija : OREILLY
  • Izdošanas datums: 15-Nov-2001
  • Izdevniecība: O'Reilly Media
  • Valoda: eng
  • ISBN-13: 9781449305246
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This guide for users and administrators examines the real risks inherent in Web use and outlines techniques and available technologies for minimizing security threats. The book covers the architecture of the Web, cryptography, SSDL and TLS, digital identification, privacy and its protection, theft and its prevention, mobile codes, physical security for servers, host security, Web applications security, computer crime, content control, code signing, filtering and censorship, logical and policy aspects, digital payments, and intellectual property rights. Garfinkel is a security consultant; Spafford teaches at Purdue University. Annotation c. Book News, Inc., Portland, OR (booknews.com) Web Security, Privacy & Commerce cuts through the hype and the front page stories. It tells readers what the real risks are and explains how to minimize them. Whether a casual (but concerned) Web surfer or a system administrator responsible for the security of a critical Web server, this book will tells users what they need to know. Since the first edition of this classic reference was published, World Wide Web use has exploded and e-commerce has become a daily part of business and personal life. As Web use has grown, so have the threats to our security and privacy--from credit card fraud to routine invasions of privacy by marketers to web site defacements to attacks that shut down popular web sites. Web Security, Privacy & Commerce goes behind the headlines, examines the major security risks facing us today, and explains how we can minimize them. It describes risks for Windows and Unix, Microsoft Internet Explorer and Netscape Navigator, and a wide range of current programs and products. In vast detail, the book covers: Web technology--The technological underpinnings of the modern Internet and the cryptographic foundations of e-commerce are discussed, along with SSL (the Secure Sockets Layer), the significance of the PKI (Public Key Infrastructure), and digital identification, including passwords, digital signatures, and biometrics. Web privacy and security for users--Learn the real risks to user privacy, including cookies, log files, identity theft, spam, web logs, and web bugs, and the most common risk, users own willingness to provide e-commerce sites with personal information. Hostile mobile code in plug-ins, ActiveX controls, Java applets, and JavaScript, Flash, and Shockwave programs are also covered. Web server security--Administrators and service providers discover how to secure their systems and web services. Topics include CGI, PHP, SSL certificates, law enforcement issues, and more. Web content security--Zero in on web publishing issues for content providers, includingintellectual property, copyright and trademark issues, P3P and privacy policies, digital payments, client-side digital signatures, code signing, pornography filtering and PICS, and other controls on web content. Nearly double the size of the first edition, this completely updated volume is destined to be the definitive reference on Web security risks and the techniques and technologies you can use to protect your privacy, your organization, your system, and your network.
Preface xi
Part I. Web Technology
The Web Security Landscape
3(10)
The Web Security Problem
3(7)
Risk Analysis and Best Practices
10(3)
The Architecture of the World Wide Web
13(33)
History and Terminology
13(7)
A Packet's Tour of the Web
20(13)
Who Owns the Internet?
33(13)
Cryptography Basics
46(32)
Understanding Cryptography
46(7)
Symmetric Key Algorithms
53(12)
Public Key Algorithms
65(6)
Message Digest Functions
71(7)
Cryptography and the Web
78(29)
Cryptography and Web Security
78(3)
Working Cryptographic Systems and Protocols
81(7)
What Cryptography Can't Do
88(2)
Legal Restrictions on Cryptography
90(17)
Understanding SSL and TLS
107(12)
What Is SSL?
107(8)
SSL: The User's Point of View
115(4)
Digital Identification I: Passwords, Biometrics, and Digital Signatures
119(34)
Physical Identification
119(11)
Using Public Keys for Identification
130(10)
Real-World Public Key Examples
140(13)
Digital Identification II: Digital Certificates, CAs, and PKI
153(50)
Understanding Digital Certificates with PGP
153(7)
Certification Authorities: Third-Party Registrars
160(14)
Public Key Infrastructure
174(13)
Open Policy Issues
187(16)
Part II. Privacy and Security for Users
The Web's War on Your Privacy
203(27)
Understanding Privacy
204(3)
User-Provided Information
207(3)
Log Files
210(6)
Understanding Cookies
216(9)
Web Bugs
225(4)
Conclusion
229(1)
Privacy-Protecting Techniques
230(32)
Choosing a Good Service Provider
230(1)
Picking a Great Password
231(11)
Cleaning Up After Yourself
242(10)
Avoiding Spam and Junk Email
252(4)
Identity Theft
256(6)
Privacy-Protecting Technologies
262(22)
Blocking Ads and Crushing Cookies
262(6)
Anonymous Browsing
268(7)
Secure Email
275(9)
Backups and Antitheft
284(14)
Using Backups to Protect Your Data
284(11)
Preventing Theft
295(3)
Mobile Code I: Plug-Ins, ActiveX, and Visual Basic
298(29)
When Good Browsers Go Bad
299(5)
Helper Aplications and Plug-ins
304(4)
Microsoft's ActiveX
308(10)
The Risks of Downloaded Code
318(8)
Conclusion
326(1)
Mobile Code II: Java, JavaScript, Flash, and Shockwave
327(36)
Java
327(19)
JavaScript
346(12)
Flash and Shockwave
358(1)
Conclusion
359(4)
Part III. Web Server Security
Physical Security for Servers
363(33)
Planning for the Forgotten Threats
363(3)
Protecting Computer Hardware
366(15)
Protecting Your Data
381(11)
Personnel
392(1)
Story: A Failed Site Inspection
392(4)
Host Security for Servers
396(39)
Current Host Security Problems
397(8)
Securing the Host Computer
405(6)
Minimizing Risk by Minimizing Services
411(2)
Operating Securely
413(10)
Secure Remote Access and Content Updating
423(8)
Firewalls and the Web
431(2)
Conclusion
433(2)
Securing Web Applications
435(37)
A Legacy of Extensibility and Risk
435(8)
Rules to Code By
443(5)
Securely Using Fields, Hidden Fields, and Cookies
448(6)
Rules for Programming Languages
454(3)
Using PHP Securely
457(10)
Writing Scripts That Run with Additional Privileges
467(1)
Connecting to Databases
468(3)
Conclusion
471(1)
Deploying SSL Server Certificates
472(38)
Planning for Your SSL Server
472(5)
Creating SSL Servers with FreeBSD
477(24)
Installing an SSL Certificate on Microsoft IIS
501(2)
Obtaining a Certificate from a Commercial CA
503(3)
When Things Go Wrong
506(4)
Securing Your Web Service
510(7)
Protecting Via Redundancy
510(4)
Protecting Your DNS
514(1)
Protecting Your Domain Registration
515(2)
Computer Crime
517(16)
Your Legal Options After a Break-In
517(6)
Criminal Hazards
523(3)
Criminal Subject Matter
526(7)
Part IV. Security for Content Providers
Controlling Access to Your Web Content
533(17)
Access Control Strategies
533(5)
Controlling Access with Apache
538(7)
Controlling Access with Microsoft IIS
545(5)
Client-Side Digital Certificates
550(10)
Client Certificates
550(3)
A Tour of the Veri Sign Digital ID Center
553(7)
Code Signing and Microsoft's Authenticode
560(19)
Why Code Signing?
560(4)
Microsoft's Authenticode Technology
564(13)
Obtaining a Software Publishing Certificate
577(1)
Other Code Signing Methods
577(2)
Pornography, Filtering Software, and Censorship
579(13)
Pornography Filtering
579(3)
PICS
582(7)
RSACi
589(2)
Conclusion
591(1)
Privacy Policies, Legislation, and P3P
592(18)
Policies That Protect Privacy and Privacy Policies
592(9)
Children's Online Privacy Protection Act
601(5)
P3P
606(3)
Conclusion
609(1)
Digital Payments
610(32)
Charga-Plates, Diners Club, and Credit Cards
610(10)
Internet-Based Payment Systems
620(20)
How to Evaluate a Credit Card Payment System
640(2)
Intellectual Property and Actionable Content
642(93)
Copyright
642(3)
Patents
645(1)
Trademarks
646(4)
Actionable Content
650(5)
Part V. Appendixes
A. Lessons from Vineyard.NET
655(33)
B. The SSL/TLS Protocol
688(11)
C. P3P: The Platform for Privacy Preferences Project
699(9)
D. The PICS Specification
708(8)
E. References
716(19)
Index 735


Simson Garfinkel is a journalist, entrepreneur, and international authority on computer security. He is chief technology officer at Sandstorm Enterprises, a Boston-based firm that develops state-of-the-art computer security tools. Garfinkel is also a columnist for Technology Review Magazine and a frequent contributor to Wired Magazine. His articles have appeared in more than 50 publications, including ComputerWorld, Forbes, and The New York Times. Gene Spafford is a professor at Purdue University and director of CERIAS, the world's premier multi-disciplinary academic center for information security. Spafford is a Fellow of the AAAS, ACM, and IEEE, and has additionally been recognized for his research and teaching in infosec with the National Computer Systems Security Award, the William Hugh Murray Medal of the NCISSE, election to the ISSA Hall of Fame, and the Charles Murphy Award at Purdue. He was named as a CISSP, honoris causa in 2000.