Web Security, Privacy & Commerce

副标题:无

作   者:[美]Simson Garfinkel,[美]Gene Spafford著

分类号:

ISBN:9787302059516

微信扫一扫,移动浏览光盘

简介

   自从这部经典之作的第一版出版以来,world wide web的应用得到了迅速普及,电子商务已经成为人们日常工作和生活的一部分。web的成长也带来了对我们的安全性和个人隐私的威胁——从信用卡诈骗到商家对个人隐私的入侵,从对web站点的丑化攻击到彻底瘫痪掉一些流行的站点。本书研究了当今面临的主要安全问题,篇幅几乎是第一版的两倍,对相关的内容进行了全面的更新,力图成为web安全问题的权威参考书。读者可以使用书中介绍的技术和技巧保护你的个人隐私、公司、系统和网络。[b]本书的主题包括:[/b] ·[b]web技术[/b]——密码系统、安全套接层(ssl)、公共密钥构架(pkl)、密码、数字签名和生物统计学。 ·[b]用户的web隐私和安全机制[/b]——cookie、日志文件、spam、web日志、个人信用信息、身份盗窃,以及插件、activex控件、java applet和javascript、flash、shockwave程序中的怀有敌意的活动代码。 ·[b]管理员和内容提供商的web服务器安全机制[/b]——cgi、php、ssl证书、p3p和隐私策略、数字支付、客户机方签名、代码签名、色情内容过滤、pics、智能属性和法律问题。       [font color="#cc0000"]“由于internet面临的安全威胁日益严重,解决方案也变得越来越复杂,人们往往为了应付表面的安全问题而抛弃了基本的安全原则。本书对现代计算环境中的安全性和个人隐私的基础问题进行了卓越的研究。本书内容中肯实用,叙述轻松流畅——甚至会让业界的专家们拍案叫绝!我向涉及安全工作的初学者和有经验的人员强烈推荐此书。本书也值得该领域的教师和作者一读再读。” ——gene kim(tripwire公司cto)    “本书应该让所有运营web站点的人认真阅读。书中介绍了让你做出明智决策所需要的理论,以及许多与理论紧密结合的实用示例。即使你已经有了多年运营web站点的经验,本书也会让你受益匪浅。”——reuven lerner(web/数据库顾问,linux journal专栏作家)[/font]

目录

preface

part i. web technology

1. the web security landscape

the web security problem

risk analysis and best practices


2. the architecture of the world wide web

history and terminology

a packet's tour of the web

who owns the internet?


3. cryptography basic

understanding cryptography

symmetric key algorithms

public key algorithms

message digest functions


4. cryptography and the web

cryptography and web security

working cryptographic systems and protocols

.what cryptography can't do

legal restrictions on cryptography


5. understanding ssl and tls

what is ssl?

ssl: the user's point of view


6. digital identification 1: passwords, biometrics, and digital signatures

physical identification

using public keys for identification

real-world public key examples


7. digital identification 11: digital certificates, cas, and pki

understanding digital certificates with pgp

certification authorities: third-party registrars

public key infrastructure

open policy issues


part ii. privacy and security for users

8. the web's war on your privacy

understanding privacy

user-provided information

log files

understanding cookies

web bugs

conclusion


9. privacy-protecting techniques

choosing a good service provider

picking a great password

cleaning up after yourself

avoiding spam and junk email

identity theft


10. privacy-protecting technologies

blocking ads and crushing cookies

anonymous browsing

secure email


11 . backups and antitheft

using backups to protect your data

preventing theft


12. mobile code i: plug-ins, activex, and visual basic

when good browsers go bad

helper applications and plug-ins

microsoft's activex

the risks of downloaded code

conclusion


13. mobile code ii: java, javascript, flash, and shockwave

java

javascript

flash and shockwave

conclusion


part iii. web server security

14. physical security for servers

planning for the forgotten threats

protecting computer hardware

protecting your data

personnel

story: a failed site inspection


15. host security for servers

current host security problems

securing the host computer

minimizing risk by minimizing services

operating securely

secure remote access and content updating

firewalls and the web

conclusion


16. securing web applications

a legacy of extensibility and risk

rules to code by

securely using fields, hidden fields, and cookies

rules for programming languages

using php securely

writing scripts that run with additional privileges

connecting to databases

conclusion


17. deploying ssl server certificates

planning for your ssl server

creating ssl servers with freebsd

installing an ssl certificate on microsoft iis

obtaining a certificate from a commercial ca

when things go wrong


18. securing your web service

protecting via redundancy

protecting your dns

protecting your domain registration


19. computer crime

your legal options after a break-in

criminal hazards

criminal subject matter


part iv. security for content providers

20. controlling access to your web content

access control strategies

controlling access with apache

controlling access with microsoft iis


21 . client-side digital certificates

client certificates

a tour of the verisign digital id center


22. code signing and microsoft's authenticode

why code signing?

microsoft's authenticode technology

obtaining a software publishing certificate

other code signing methods


23. pornography, filtering software, and censorship

pornography filtering

pics

rsaci

conclusion


24. privacy policies, legislation, and p3p

policies that protect privacy and privacy policies

children's online privacy protection act

p3p

conclusion


25. digital payments

charga-plates, diners club, and credit cards

internet-based payment systems

how to evaluate a credit card payment system


26. intellectual property and actionable content

copyright

patents

trademarks

actionable content


part v. appendixes

a. lessons from vineyard.net

b. the ssl/ tls protocol

c. p3p: the platform for privacy preferences project

d. the pics specification

e . references

index


已确认勘误

次印刷

页码 勘误内容 提交人 修订印次

Web Security, Privacy & Commerce
    • 名称
    • 类型
    • 大小

    光盘服务联系方式: 020-38250260    客服QQ:4006604884

    意见反馈

    14:15

    关闭

    云图客服:

    尊敬的用户,您好!您有任何提议或者建议都可以在此提出来,我们会谦虚地接受任何意见。

    或者您是想咨询:

    用户发送的提问,这种方式就需要有位在线客服来回答用户的问题,这种 就属于对话式的,问题是这种提问是否需要用户登录才能提问

    Video Player
    ×
    Audio Player
    ×
    pdf Player
    ×
    Current View

    看过该图书的还喜欢

    some pictures

    解忧杂货店

    东野圭吾 (作者), 李盈春 (译者)

    loading icon