|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
EBOOKCENTRAL_ocn434023456 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
090827s2008 enka ob 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d OCLCQ
|d CEF
|d OCLCQ
|d N$T
|d IDEBK
|d OCLCQ
|d E7B
|d OCLCQ
|d DEBSZ
|d OCLCQ
|d OCLCO
|d OCLCF
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d AGLDB
|d OCLCQ
|d OCLCO
|d U3W
|d VTS
|d NLE
|d INT
|d OCLCQ
|d OCLCO
|d UKMGB
|d OCLCQ
|d STF
|d UAB
|d AU@
|d OCLCO
|d M8D
|d UKAHL
|d CNCEN
|d HS0
|d OCLCQ
|d K6U
|d OCLCO
|d QGK
|d OCLCQ
|d OCLCO
|d INARC
|d OCLCL
|
015 |
|
|
|a GBB742554
|2 bnb
|
016 |
7 |
|
|a 018011628
|2 Uk
|
019 |
|
|
|a 666949163
|a 708090327
|a 715153658
|a 764553523
|a 1259080003
|
020 |
|
|
|a 9781847194886
|
020 |
|
|
|a 1847194885
|
020 |
|
|
|a 9781847194893
|q (electronic bk.)
|
020 |
|
|
|a 1847194893
|q (electronic bk.)
|
020 |
|
|
|a 1281856169
|
020 |
|
|
|a 9781281856166
|
020 |
|
|
|a 9786611856168
|
020 |
|
|
|a 6611856161
|
029 |
1 |
|
|a CHBIS
|b 006152203
|
029 |
1 |
|
|a CHVBK
|b 171347897
|
029 |
1 |
|
|a DEBBG
|b BV043044805
|
029 |
1 |
|
|a DEBSZ
|b 355448262
|
029 |
1 |
|
|a DEBSZ
|b 421632283
|
029 |
1 |
|
|a HEBIS
|b 29151829X
|
029 |
1 |
|
|a NZ1
|b 13870472
|
029 |
1 |
|
|a UKMGB
|b 018011628
|
035 |
|
|
|a (OCoLC)434023456
|z (OCoLC)666949163
|z (OCoLC)708090327
|z (OCoLC)715153658
|z (OCoLC)764553523
|z (OCoLC)1259080003
|
037 |
|
|
|a CL0500000046
|b Safari Books Online
|
050 |
|
4 |
|a TK5105.59
|b .C36 2008
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Canavan, Tom.
|
245 |
1 |
0 |
|a Joomla! web security :
|b secure your Joomla! website from common security threats with this easy-to-use guide /
|c Tom Canavan.
|
260 |
|
|
|a Birmingham, U.K. :
|b Packt Pub.,
|c ©2008.
|
300 |
|
|
|a 1 online resource (1 volume (unpaged)) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a From technologies to solutions
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
0 |
|
|a Print version record.
|
520 |
|
|
|a In Detail Joomla! is one of the most powerful open-source content management systems used to build websites and other powerful online applications. While Joomla! itself is inherently safe, misconfigurations, vulnerable components, poorly configured hosts, and weak passwords can all contribute to the downfall of your site. So, you need to know how to secure your website from security threats. Today every website needs to take security into consideration. Using the knowledge here, your Joomla! site can be ahead of the security threats so prevalent today. This book will take you all the way from the most basic steps of preparation to the nuts and bolts of actual protection. It is packed full of relevant and real-world topics such as security tools, configuration suggestions, setting up your test and development environment, reading and interpreting log files, and techniques used by bad hackers on the Internet. In addition to this you will learn how to respond to a site emergency should one occur and how to collect the evidence needed to pursue law enforcement action. The book provides a concise overview of all the parts needed to construct a defence-in-depth strategy for your Joomla! site. At the end of the book you will have a solid security foundation to take your Joomla! website to a higher level of security than the basic site setup. What you will learn from this book? This book covers: Implementing steps for successful Joomla! website architecture Setting up metrics to measure security Exploring the test and development environment; developing your test plan to make sure everything will work as planned Utilizing your test and development site for disaster recovery Measuring the performance of your software development projects using a software development management system Exploring several tools to help protect your website Diving into security vulnerabilities: why they exist; some typical counter measures Exploring SQL Injections - how they can hurt you and how to prevent them Mastering the two important security layers - php.ini and .htaccess Reading and analyzing logs relevant to protecting your Joomla! site Handling Security Incidents in a professional manner Blocking nuisance IP addresses Approach This book will give you a strong, hands-on approach to security. It starts out with the most basic of considerations such as choosing the right hosting sites then moves quickly into securing the Joomla! site and servers. This is a security ha ...
|
505 |
0 |
|
|a Cover; Table of Contents; Preface; Chapter 1: Let's Get Started; Introduction; Common Terminology; Hosting-Selection and Unique Needs; What Is a Host?; Choosing a Host; Questions to Ask a Prospective Host; Facilities; Things to Ask Your Host about Facility Security; Environmental Questions about the Facility; Site Monitoring and Protection; Patching and Security; Shared Hosting; Dedicated Hosting; Architecting for a Successful Site; What Is the Purpose of Your Site?; Eleven Steps to Successful Site Architecture; Downloading Joomla!; Settings; .htaccess; Permissions; User Management
|
505 |
8 |
|
|a Common Trip UpsFailure to Check Vulnerability List First; Register Globals, Again; Permissions; Poor Documentation; Got Backups?; Setting Up Security Metrics; Summary; Chapter 2: Test and Development; Welcome to the Laboratory!; Test and Development Environment; What Does This Have to Do with Security?; The Evil Hamster Wheel of Upgrades; Determine the Need for Upgrade; Developing Your Test Plan; Essential Parameters for a Successful Test; Using Your Test and Development Site for Disaster Planning; Updating Your Disaster Recovery Documentation
|
505 |
8 |
|
|a Make DR Testing a Part of Your Upgrade/Rollout CycleCrafting Good Documentation; Using a Software Development Management System; Tour of Lighthouse from Artifact Software; Reporting; Using the Ravenswood Joomla! Server; Roll-out; Summary; Chapter 3: Tools; Introduction; Tools, Tools, and More Tools; HISA; Installation Check; Web-Server Environment; Required Settings for Joomla!; Recommended Settings; Joomla Tools Suite with Services; How's Our Health?; NMAP-Network Mapping Tool from insecure.org; Wireshark; Metasploit-The Penetration Testers Tool Set; Nessus Vulnerability Scanner
|
505 |
8 |
|
|a Why You Need NessusSummary; Chapter 4: Vulnerabilities; Introduction; Importance of Patching is Paramount; What is a Vulnerability?; Memory Corruption Vulnerabilities; SQL Injections; Command Injection Attacks; Attack Example; Why do Vulnerabilities Exist?; What Can be Done to Prevent Vulnerabilities?; Developers; Poor Testing and Planning; Forbidden; Improper Variable Sanitization and Dangerous Inputs; Not Testing in a Broad Enough Environment; Testing for Various Versions of SQL; Interactions with Other Third-Party Extensions; End Users; Social Engineering; Poor Patching and Updating
|
546 |
|
|
|a English.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
630 |
0 |
0 |
|a Joomla! (Computer file)
|
630 |
0 |
7 |
|a Joomla! (Computer file)
|2 blmlsh
|
630 |
0 |
7 |
|a Joomla! (Computer file)
|2 fast
|
650 |
|
0 |
|a Web sites
|x Security measures.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Web sites
|x Authoring programs.
|
650 |
|
0 |
|a Web site development.
|
650 |
|
6 |
|a Sites Web
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sites Web
|x Systèmes-auteur.
|
650 |
|
6 |
|a Sites Web
|x Développement.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Web sites
|x Security measures.
|2 blmlsh
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 blmlsh
|
650 |
|
7 |
|a Web sites
|x Authoring programs.
|2 blmlsh
|
650 |
|
7 |
|a Web site development.
|2 blmlsh
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Web site development
|2 fast
|
650 |
|
7 |
|a Web sites
|x Authoring programs
|2 fast
|
650 |
|
7 |
|a Web sites
|x Security measures
|2 fast
|
758 |
|
|
|i has work:
|a Joomla! web security (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCFKQbF3WhHM6VYxhcm6qcP
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|a Canavan, Tom.
|t Joomla! web security.
|d Birminghm, U.K.: Packt Publishing, 2008
|z 1847194885
|w (OCoLC)316688070
|
830 |
|
0 |
|a From technologies to solutions.
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=978105
|z Texto completo
|
938 |
|
|
|a Internet Archive
|b INAR
|n joomlawebsecurit0000cana
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH26942786
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 355700
|
994 |
|
|
|a 92
|b IZTAP
|