Cargando…

ModSecurity 2.5.

Prevent web application hacking with this easy to use guide.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Mischel, Magnus
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Pub., 2009.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mu 4500
001 EBOOKCENTRAL_ocn797915370
003 OCoLC
005 20240329122006.0
006 m o d
007 cr unu||||||||
008 121121s2009 enk o 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d OCLCQ  |d DEBSZ  |d OCLCQ  |d FEM  |d ZCU  |d MERUC  |d ICG  |d OCLCO  |d OCLCF  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d DKC  |d AU@  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 968096404  |a 969074845 
020 |a 9781847194756 
020 |a 1847194753 
029 1 |a DEBBG  |b BV044166872 
029 1 |a DEBSZ  |b 397335601 
035 |a (OCoLC)797915370  |z (OCoLC)968096404  |z (OCoLC)969074845 
037 |a 4238870453625321578  |b TotalBoox  |f Ebook only  |n www.totalboox.com 
050 4 |a TK5105.8885.A6 .M384 2009 
082 0 4 |a 005.8 
049 |a UAMI 
100 1 |a Mischel, Magnus. 
245 1 0 |a ModSecurity 2.5. 
260 |a Birmingham :  |b Packt Pub.,  |c 2009. 
300 |a 1 online resource (469 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |2 rda 
505 0 |a ModSecurity 2.5; ModSecurity 2.5; Credits; About the Author; About the Reviewers; Preface; What ModSecurity is; Why you need ModSecurity; What this book covers; What you need for this book; Who this book is for; Conventions; Reader feedback; Customer support; Errata; Piracy; Questions; 1. Installation and Configuration; Versions; Downloading; Checking the integrity of the downloaded source archive; Unpacking the source code; Required additional libraries and files; Compilation; Integrating ModSecurity with Apache; Configuration file; Completing the configuration; Testing your installation. 
505 8 |a Creating a simple ModSecurity ruleDisguising the web server signature; Summary; 2. Writing Rules; SecRule syntax; Variables and collections; The transaction collection; Storing data between requests; Examining several variables; Quotes: Sometimes you need them and sometimes you don't; Creating chained rules; Rule IDs; An introduction to regular expressions; Examples of regular expressions; More about regular expressions; Using @rx to block a remote host; Simple string matching; Matching numbers; More about collections; Counting items in collections. 
505 8 |a Filtering collection fields using a regular expressionBuilt-in fields; Transformation functions; Other operators; Set-based pattern matching with @pm and @pmFromFile; @pmFromFile; Performance of the phrase matching operators; Validating character ranges; Phases and rule ordering; Actions-what to do when a rule matches; Allowing requests; Blocking requests; Taking no action but continuing rule processing; Dropping requests; Redirecting and proxying requests; SecAction; Using the ctl action to control the rule engine; How to use the ctl action; Macro expansion; SecRule in practice. 
505 8 |a Blocking uncommon request methodsRestricting access to certain times of day; Detecting credit card leaks; Detecting credit card numbers; The Luhn algorithm and false positives; Tracking the geographical location of your visitors; GEO collection fields; Blocking users from specific countries; Load balancing requests between servers on different continents; Pausing requests for a specified amount of time; Executing shell scripts; Sending alert emails; Sending more detailed alert emails; Counting file downloads; Blocking brute-force password guessing; Injecting data into responses. 
505 8 |a Inspecting uploaded filesSummary; 3. Performance; A typical HTTP request; A real-world performance test; The core ruleset; Installing the core ruleset; Making sure it works; Performance testing basics; Using httperf; Getting a baseline: Testing without ModSecurity; Response time; Memory usage; CPU usage; ModSecurity without any loaded rules; ModSecurity with the core ruleset loaded; Response time; Memory usage; Finding the bottleneck; Wrapping up core ruleset performance; Optimizing performance; Memory consumption; Bypassing inspection of static content; Using @pm and @pmFromFile; Logging. 
500 |a Writing regular expressions for best performance. 
520 |a Prevent web application hacking with this easy to use guide. 
588 0 |a Print version record. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
630 0 0 |a Apache (Computer file : Apache Group) 
630 0 7 |a Apache (Computer file : Apache Group)  |2 fast 
650 0 |a Firewalls (Computer security) 
650 6 |a Coupe-feu (Sécurité informatique) 
650 7 |a Firewalls (Computer security)  |2 fast 
776 0 8 |i Print version:  |a Mischel, Magnus.  |t ModSecurity 2.5.  |d Birmingham : Packt Publishing, ©2009  |z 9781847194749 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=951160  |z Texto completo 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL951160 
994 |a 92  |b IZTAP