Cargando…

Security technologies for the World Wide Web /

"This hands-on book gives you a comprehensive analysis of current trends in WWW security, plus an evaluation of existing technologies, such as anonymity services and security products. It helps you guarantee that electronic commerce applications on your website are executed with the utmost secu...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Oppliger, Rolf
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Boston, MA : Artech House, ©2000.
Colección:Artech House computer security series.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Internet
  • WWW
  • Vulnerabilities, threats, and countermeasures
  • Generic security model
  • Security policy
  • Host security
  • Network security
  • Organizational security
  • Legal security
  • HTTP Security
  • HTTP
  • User authentication, authorization, and access control
  • Basic authentication
  • Digest access authentication
  • Certificate-based authentication
  • Sever configuration
  • Configuring HTTP basic authentication
  • Configuring HTTP digest access authentication
  • Proxy Servers and Firewalls
  • Static packet filtering
  • Dynamic packet filtering or stateful inspection
  • Circuit-level gateways
  • Application-level gateways
  • Firewall configurations
  • Dual-homed firewall
  • Screened host firewall
  • Screened subnet firewall
  • Network address translation
  • Configuring the browser
  • Cryptographic Techniques
  • Cryptographic hash functions
  • Secret key cryptography
  • DES
  • Triple-DES
  • IDEA
  • SAFER
  • Blowfish
  • CAST-128
  • RC2, RC4, RC5, and RC6
  • AES
  • Public key cryptography
  • RSA
  • Diffie-Hellman
  • ElGamal
  • DSS
  • ECC
  • Digital envelopes
  • Protection of cryptographic keys
  • Generation of pseudorandom bit sequences
  • Legal issues
  • Patent claims
  • Regulations
  • Electronic and digital signature legislation
  • Internet Security Protocols
  • Network access layer security protocols
  • Layer 2 Forwarding Protocol
  • Point-to-Point Tunneling Protocol
  • Layer 2 Tunneling Protocol
  • Virtual private networking
  • Internet layer security protocols
  • IP security architecture.