|
|
|
|
LEADER |
00000cam a2200000Mu 4500 |
001 |
EBOOKCENTRAL_ocn797915370 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
121121s2009 enk o 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d OCLCQ
|d DEBSZ
|d OCLCQ
|d FEM
|d ZCU
|d MERUC
|d ICG
|d OCLCO
|d OCLCF
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d DKC
|d AU@
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 968096404
|a 969074845
|
020 |
|
|
|a 9781847194756
|
020 |
|
|
|a 1847194753
|
029 |
1 |
|
|a DEBBG
|b BV044166872
|
029 |
1 |
|
|a DEBSZ
|b 397335601
|
035 |
|
|
|a (OCoLC)797915370
|z (OCoLC)968096404
|z (OCoLC)969074845
|
037 |
|
|
|a 4238870453625321578
|b TotalBoox
|f Ebook only
|n www.totalboox.com
|
050 |
|
4 |
|a TK5105.8885.A6 .M384 2009
|
082 |
0 |
4 |
|a 005.8
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Mischel, Magnus.
|
245 |
1 |
0 |
|a ModSecurity 2.5.
|
260 |
|
|
|a Birmingham :
|b Packt Pub.,
|c 2009.
|
300 |
|
|
|a 1 online resource (469 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|2 rda
|
505 |
0 |
|
|a ModSecurity 2.5; ModSecurity 2.5; Credits; About the Author; About the Reviewers; Preface; What ModSecurity is; Why you need ModSecurity; What this book covers; What you need for this book; Who this book is for; Conventions; Reader feedback; Customer support; Errata; Piracy; Questions; 1. Installation and Configuration; Versions; Downloading; Checking the integrity of the downloaded source archive; Unpacking the source code; Required additional libraries and files; Compilation; Integrating ModSecurity with Apache; Configuration file; Completing the configuration; Testing your installation.
|
505 |
8 |
|
|a Creating a simple ModSecurity ruleDisguising the web server signature; Summary; 2. Writing Rules; SecRule syntax; Variables and collections; The transaction collection; Storing data between requests; Examining several variables; Quotes: Sometimes you need them and sometimes you don't; Creating chained rules; Rule IDs; An introduction to regular expressions; Examples of regular expressions; More about regular expressions; Using @rx to block a remote host; Simple string matching; Matching numbers; More about collections; Counting items in collections.
|
505 |
8 |
|
|a Filtering collection fields using a regular expressionBuilt-in fields; Transformation functions; Other operators; Set-based pattern matching with @pm and @pmFromFile; @pmFromFile; Performance of the phrase matching operators; Validating character ranges; Phases and rule ordering; Actions-what to do when a rule matches; Allowing requests; Blocking requests; Taking no action but continuing rule processing; Dropping requests; Redirecting and proxying requests; SecAction; Using the ctl action to control the rule engine; How to use the ctl action; Macro expansion; SecRule in practice.
|
505 |
8 |
|
|a Blocking uncommon request methodsRestricting access to certain times of day; Detecting credit card leaks; Detecting credit card numbers; The Luhn algorithm and false positives; Tracking the geographical location of your visitors; GEO collection fields; Blocking users from specific countries; Load balancing requests between servers on different continents; Pausing requests for a specified amount of time; Executing shell scripts; Sending alert emails; Sending more detailed alert emails; Counting file downloads; Blocking brute-force password guessing; Injecting data into responses.
|
505 |
8 |
|
|a Inspecting uploaded filesSummary; 3. Performance; A typical HTTP request; A real-world performance test; The core ruleset; Installing the core ruleset; Making sure it works; Performance testing basics; Using httperf; Getting a baseline: Testing without ModSecurity; Response time; Memory usage; CPU usage; ModSecurity without any loaded rules; ModSecurity with the core ruleset loaded; Response time; Memory usage; Finding the bottleneck; Wrapping up core ruleset performance; Optimizing performance; Memory consumption; Bypassing inspection of static content; Using @pm and @pmFromFile; Logging.
|
500 |
|
|
|a Writing regular expressions for best performance.
|
520 |
|
|
|a Prevent web application hacking with this easy to use guide.
|
588 |
0 |
|
|a Print version record.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
630 |
0 |
0 |
|a Apache (Computer file : Apache Group)
|
630 |
0 |
7 |
|a Apache (Computer file : Apache Group)
|2 fast
|
650 |
|
0 |
|a Firewalls (Computer security)
|
650 |
|
6 |
|a Coupe-feu (Sécurité informatique)
|
650 |
|
7 |
|a Firewalls (Computer security)
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Mischel, Magnus.
|t ModSecurity 2.5.
|d Birmingham : Packt Publishing, ©2009
|z 9781847194749
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=951160
|z Texto completo
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL951160
|
994 |
|
|
|a 92
|b IZTAP
|