Cargando…

Joomla! web security : secure your Joomla! website from common security threats with this easy-to-use guide /

In Detail Joomla! is one of the most powerful open-source content management systems used to build websites and other powerful online applications. While Joomla! itself is inherently safe, misconfigurations, vulnerable components, poorly configured hosts, and weak passwords can all contribute to the...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Canavan, Tom
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham, U.K. : Packt Pub., ©2008.
Colección:From technologies to solutions.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBOOKCENTRAL_ocn434023456
003 OCoLC
005 20240329122006.0
006 m o d
007 cr unu||||||||
008 090827s2008 enka ob 001 0 eng d
040 |a UMI  |b eng  |e pn  |c UMI  |d OCLCQ  |d CEF  |d OCLCQ  |d N$T  |d IDEBK  |d OCLCQ  |d E7B  |d OCLCQ  |d DEBSZ  |d OCLCQ  |d OCLCO  |d OCLCF  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d AGLDB  |d OCLCQ  |d OCLCO  |d U3W  |d VTS  |d NLE  |d INT  |d OCLCQ  |d OCLCO  |d UKMGB  |d OCLCQ  |d STF  |d UAB  |d AU@  |d OCLCO  |d M8D  |d UKAHL  |d CNCEN  |d HS0  |d OCLCQ  |d K6U  |d OCLCO  |d QGK  |d OCLCQ  |d OCLCO  |d INARC  |d OCLCL 
015 |a GBB742554  |2 bnb 
016 7 |a 018011628  |2 Uk 
019 |a 666949163  |a 708090327  |a 715153658  |a 764553523  |a 1259080003 
020 |a 9781847194886 
020 |a 1847194885 
020 |a 9781847194893  |q (electronic bk.) 
020 |a 1847194893  |q (electronic bk.) 
020 |a 1281856169 
020 |a 9781281856166 
020 |a 9786611856168 
020 |a 6611856161 
029 1 |a CHBIS  |b 006152203 
029 1 |a CHVBK  |b 171347897 
029 1 |a DEBBG  |b BV043044805 
029 1 |a DEBSZ  |b 355448262 
029 1 |a DEBSZ  |b 421632283 
029 1 |a HEBIS  |b 29151829X 
029 1 |a NZ1  |b 13870472 
029 1 |a UKMGB  |b 018011628 
035 |a (OCoLC)434023456  |z (OCoLC)666949163  |z (OCoLC)708090327  |z (OCoLC)715153658  |z (OCoLC)764553523  |z (OCoLC)1259080003 
037 |a CL0500000046  |b Safari Books Online 
050 4 |a TK5105.59  |b .C36 2008 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
100 1 |a Canavan, Tom. 
245 1 0 |a Joomla! web security :  |b secure your Joomla! website from common security threats with this easy-to-use guide /  |c Tom Canavan. 
260 |a Birmingham, U.K. :  |b Packt Pub.,  |c ©2008. 
300 |a 1 online resource (1 volume (unpaged)) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a From technologies to solutions 
504 |a Includes bibliographical references and index. 
588 0 |a Print version record. 
520 |a In Detail Joomla! is one of the most powerful open-source content management systems used to build websites and other powerful online applications. While Joomla! itself is inherently safe, misconfigurations, vulnerable components, poorly configured hosts, and weak passwords can all contribute to the downfall of your site. So, you need to know how to secure your website from security threats. Today every website needs to take security into consideration. Using the knowledge here, your Joomla! site can be ahead of the security threats so prevalent today. This book will take you all the way from the most basic steps of preparation to the nuts and bolts of actual protection. It is packed full of relevant and real-world topics such as security tools, configuration suggestions, setting up your test and development environment, reading and interpreting log files, and techniques used by bad hackers on the Internet. In addition to this you will learn how to respond to a site emergency should one occur and how to collect the evidence needed to pursue law enforcement action. The book provides a concise overview of all the parts needed to construct a defence-in-depth strategy for your Joomla! site. At the end of the book you will have a solid security foundation to take your Joomla! website to a higher level of security than the basic site setup. What you will learn from this book? This book covers: Implementing steps for successful Joomla! website architecture Setting up metrics to measure security Exploring the test and development environment; developing your test plan to make sure everything will work as planned Utilizing your test and development site for disaster recovery Measuring the performance of your software development projects using a software development management system Exploring several tools to help protect your website Diving into security vulnerabilities: why they exist; some typical counter measures Exploring SQL Injections - how they can hurt you and how to prevent them Mastering the two important security layers - php.ini and .htaccess Reading and analyzing logs relevant to protecting your Joomla! site Handling Security Incidents in a professional manner Blocking nuisance IP addresses Approach This book will give you a strong, hands-on approach to security. It starts out with the most basic of considerations such as choosing the right hosting sites then moves quickly into securing the Joomla! site and servers. This is a security ha ... 
505 0 |a Cover; Table of Contents; Preface; Chapter 1: Let's Get Started; Introduction; Common Terminology; Hosting-Selection and Unique Needs; What Is a Host?; Choosing a Host; Questions to Ask a Prospective Host; Facilities; Things to Ask Your Host about Facility Security; Environmental Questions about the Facility; Site Monitoring and Protection; Patching and Security; Shared Hosting; Dedicated Hosting; Architecting for a Successful Site; What Is the Purpose of Your Site?; Eleven Steps to Successful Site Architecture; Downloading Joomla!; Settings; .htaccess; Permissions; User Management 
505 8 |a Common Trip UpsFailure to Check Vulnerability List First; Register Globals, Again; Permissions; Poor Documentation; Got Backups?; Setting Up Security Metrics; Summary; Chapter 2: Test and Development; Welcome to the Laboratory!; Test and Development Environment; What Does This Have to Do with Security?; The Evil Hamster Wheel of Upgrades; Determine the Need for Upgrade; Developing Your Test Plan; Essential Parameters for a Successful Test; Using Your Test and Development Site for Disaster Planning; Updating Your Disaster Recovery Documentation 
505 8 |a Make DR Testing a Part of Your Upgrade/Rollout CycleCrafting Good Documentation; Using a Software Development Management System; Tour of Lighthouse from Artifact Software; Reporting; Using the Ravenswood Joomla! Server; Roll-out; Summary; Chapter 3: Tools; Introduction; Tools, Tools, and More Tools; HISA; Installation Check; Web-Server Environment; Required Settings for Joomla!; Recommended Settings; Joomla Tools Suite with Services; How's Our Health?; NMAP-Network Mapping Tool from insecure.org; Wireshark; Metasploit-The Penetration Testers Tool Set; Nessus Vulnerability Scanner 
505 8 |a Why You Need NessusSummary; Chapter 4: Vulnerabilities; Introduction; Importance of Patching is Paramount; What is a Vulnerability?; Memory Corruption Vulnerabilities; SQL Injections; Command Injection Attacks; Attack Example; Why do Vulnerabilities Exist?; What Can be Done to Prevent Vulnerabilities?; Developers; Poor Testing and Planning; Forbidden; Improper Variable Sanitization and Dangerous Inputs; Not Testing in a Broad Enough Environment; Testing for Various Versions of SQL; Interactions with Other Third-Party Extensions; End Users; Social Engineering; Poor Patching and Updating 
546 |a English. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
630 0 0 |a Joomla! (Computer file) 
630 0 7 |a Joomla! (Computer file)  |2 blmlsh 
630 0 7 |a Joomla! (Computer file)  |2 fast 
650 0 |a Web sites  |x Security measures. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Web sites  |x Authoring programs. 
650 0 |a Web site development. 
650 6 |a Sites Web  |x Sécurité  |x Mesures. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Sites Web  |x Systèmes-auteur. 
650 6 |a Sites Web  |x Développement. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Web sites  |x Security measures.  |2 blmlsh 
650 7 |a Computer networks  |x Security measures.  |2 blmlsh 
650 7 |a Web sites  |x Authoring programs.  |2 blmlsh 
650 7 |a Web site development.  |2 blmlsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Web site development  |2 fast 
650 7 |a Web sites  |x Authoring programs  |2 fast 
650 7 |a Web sites  |x Security measures  |2 fast 
758 |i has work:  |a Joomla! web security (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCFKQbF3WhHM6VYxhcm6qcP  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Canavan, Tom.  |t Joomla! web security.  |d Birminghm, U.K.: Packt Publishing, 2008  |z 1847194885  |w (OCoLC)316688070 
830 0 |a From technologies to solutions. 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=978105  |z Texto completo 
938 |a Internet Archive  |b INAR  |n joomlawebsecurit0000cana 
938 |a Askews and Holts Library Services  |b ASKH  |n AH26942786 
938 |a EBSCOhost  |b EBSC  |n 355700 
994 |a 92  |b IZTAP