Cargando…

Security technologies for the World Wide Web /

"This hands-on book gives you a comprehensive analysis of current trends in WWW security, plus an evaluation of existing technologies, such as anonymity services and security products. It helps you guarantee that electronic commerce applications on your website are executed with the utmost secu...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Oppliger, Rolf
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Boston, MA : Artech House, ©2000.
Colección:Artech House computer security series.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBSCO_ocm45843371
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cn|||||||||
008 010126s2000 maua ob 001 0 eng d
040 |a N$T  |b eng  |e pn  |c N$T  |d OCL  |d OCLCQ  |d YDXCP  |d OCLCQ  |d EXW  |d HNW  |d OCLCQ  |d TUU  |d OCLCQ  |d ZCU  |d OCLCO  |d QT5  |d OCLCE  |d W2U  |d OCLCF  |d OCLCQ  |d OCLCO  |d OCLCQ  |d Z5A  |d JBG  |d OCLCQ  |d SAV  |d ICD  |d QT7  |d OCLCQ  |d OCLCA  |d LUE  |d CEF  |d OCLCQ  |d INT  |d OCLCQ  |d LHU  |d BRX  |d JX9  |d UMK  |d VDB  |d CHBRC  |d UKEHC  |d OCLCO  |d OCLCQ  |d IOY  |d OCLCQ  |d CAUOI  |d D6H  |d OCLCQ 
019 |a 533131029  |a 607360361  |a 607770620  |a 612802996  |a 758976223  |a 961609764  |a 962723277  |a 988817971  |a 1004486126  |a 1004803935  |a 1005044953  |a 1007382942  |a 1008891387  |a 1013736884  |a 1017968341  |a 1021218022  |a 1044055290  |a 1053018918  |a 1055841628  |a 1071925738  |a 1084492983  |a 1087302248  |a 1108904366  |a 1123226998  |a 1127916741  |a 1135426126  |a 1200055615  |a 1320983083  |a 1331422485 
020 |a 0585337659  |q (electronic bk.) 
020 |a 9780585337654  |q (electronic bk.) 
020 |a 1580530451  |q (alk. paper) 
020 |a 9781580530453  |q (alk. paper) 
029 1 |a AU@  |b 000023098884 
029 1 |a DEBBG  |b BV043145861 
029 1 |a DEBSZ  |b 422511501 
029 1 |a GBVCP  |b 800743032 
029 1 |a NZ1  |b 11632712 
029 1 |a NZ1  |b 13666483 
035 |a (OCoLC)45843371  |z (OCoLC)533131029  |z (OCoLC)607360361  |z (OCoLC)607770620  |z (OCoLC)612802996  |z (OCoLC)758976223  |z (OCoLC)961609764  |z (OCoLC)962723277  |z (OCoLC)988817971  |z (OCoLC)1004486126  |z (OCoLC)1004803935  |z (OCoLC)1005044953  |z (OCoLC)1007382942  |z (OCoLC)1008891387  |z (OCoLC)1013736884  |z (OCoLC)1017968341  |z (OCoLC)1021218022  |z (OCoLC)1044055290  |z (OCoLC)1053018918  |z (OCoLC)1055841628  |z (OCoLC)1071925738  |z (OCoLC)1084492983  |z (OCoLC)1087302248  |z (OCoLC)1108904366  |z (OCoLC)1123226998  |z (OCoLC)1127916741  |z (OCoLC)1135426126  |z (OCoLC)1200055615  |z (OCoLC)1320983083  |z (OCoLC)1331422485 
042 |a dlr 
050 4 |a QA76.9.A25  |b O68 1999eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 21 
084 |a 54.65  |2 bcl 
049 |a UAMI 
100 1 |a Oppliger, Rolf. 
245 1 0 |a Security technologies for the World Wide Web /  |c Rolf Oppliger. 
260 |a Boston, MA :  |b Artech House,  |c ©2000. 
300 |a 1 online resource (xxi, 419 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
347 |b PDF 
490 1 |a Artech House computer security series 
500 |a "Artech House computing library." 
504 |a Includes bibliographical references and index. 
505 0 0 |t Internet --  |t WWW --  |t Vulnerabilities, threats, and countermeasures --  |t Generic security model --  |t Security policy --  |t Host security --  |t Network security --  |t Organizational security --  |t Legal security --  |t HTTP Security --  |t HTTP --  |t User authentication, authorization, and access control --  |t Basic authentication --  |t Digest access authentication --  |t Certificate-based authentication --  |t Sever configuration --  |t Configuring HTTP basic authentication --  |t Configuring HTTP digest access authentication --  |t Proxy Servers and Firewalls --  |t Static packet filtering --  |t Dynamic packet filtering or stateful inspection --  |t Circuit-level gateways --  |t Application-level gateways --  |t Firewall configurations --  |t Dual-homed firewall --  |t Screened host firewall --  |t Screened subnet firewall --  |t Network address translation --  |t Configuring the browser --  |t Cryptographic Techniques --  |t Cryptographic hash functions --  |t Secret key cryptography --  |t DES --  |t Triple-DES --  |t IDEA --  |t SAFER --  |t Blowfish --  |t CAST-128 --  |t RC2, RC4, RC5, and RC6 --  |t AES --  |t Public key cryptography --  |t RSA --  |t Diffie-Hellman --  |t ElGamal --  |t DSS --  |t ECC --  |t Digital envelopes --  |t Protection of cryptographic keys --  |t Generation of pseudorandom bit sequences --  |t Legal issues --  |t Patent claims --  |t Regulations --  |t Electronic and digital signature legislation --  |t Internet Security Protocols --  |t Network access layer security protocols --  |t Layer 2 Forwarding Protocol --  |t Point-to-Point Tunneling Protocol --  |t Layer 2 Tunneling Protocol --  |t Virtual private networking --  |t Internet layer security protocols --  |t IP security architecture. 
506 |3 Use copy  |f Restrictions unspecified  |2 star  |5 MiAaHDL 
533 |a Electronic reproduction.  |b [Place of publication not identified] :  |c HathiTrust Digital Library,  |d 2010.  |5 MiAaHDL 
538 |a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.  |u http://purl.oclc.org/DLF/benchrepro0212  |5 MiAaHDL 
583 1 |a digitized  |c 2010  |h HathiTrust Digital Library  |l committed to preserve  |2 pda  |5 MiAaHDL 
588 0 |a Print version record. 
520 1 |a "This hands-on book gives you a comprehensive analysis of current trends in WWW security, plus an evaluation of existing technologies, such as anonymity services and security products. It helps you guarantee that electronic commerce applications on your website are executed with the utmost security and protection. What's more, it helps you understand content protection and the benefits and drawbacks of censorship on the web."--BOOK JACKET. "Geared toward proactive Internet security professionals, this handy resource helps you comprehend existing security technologies, evaluate and choose those that best suit your needs, understand corresponding software and hardware, and more."--Jacket 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Computer security. 
650 0 |a World Wide Web  |x Security measures. 
650 6 |a Sécurité informatique. 
650 6 |a Web  |x Sécurité  |x Mesures. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a World Wide Web  |x Security measures.  |2 fast  |0 (OCoLC)fst01181329 
650 1 7 |a World wide web.  |2 gtt 
650 1 7 |a Beveiliging.  |2 gtt 
776 0 8 |i Print version:  |a Oppliger, Rolf.  |t Security technologies for the World Wide Web.  |d Boston, MA : Artech House, ©2000  |z 1580530451  |w (DLC) 99045835  |w (OCoLC)42295827 
830 0 |a Artech House computer security series. 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=42390  |z Texto completo 
936 |a BATCHLOAD 
938 |a EBSCOhost  |b EBSC  |n 42390 
938 |a YBP Library Services  |b YANK  |n 2323101 
994 |a 92  |b IZTAP