Cargando…

WordPress 3 ultimate security : protect your WordPress site and its network /

This is a comprehensive essential guide to WordPress security written in a light style, which converts learning a really serious topic to an enjoyable read. It is packed with copy-paste solutions to security to suit all levels of security know-how. Just as WordPress is used by a broad spectrum of we...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Connelly, Olly
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Pub., 2011.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBSCO_ocn742346683
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 110725s2011 enka of 001 0 eng d
040 |a N$T  |b eng  |e pn  |c N$T  |d E7B  |d OCLCQ  |d DEBSZ  |d OCLCQ  |d NLGGC  |d YDXCP  |d IDEBK  |d OCLCQ  |d CNNOR  |d OCLCQ  |d U3W  |d OCLCF  |d JBG  |d OCLCQ  |d VTS  |d OCLCQ  |d OCLCO  |d UKMGB  |d STF  |d M8D  |d UKAHL  |d HS0  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
015 |a GBB747537  |2 bnb 
016 7 |a 018011882  |2 Uk 
019 |a 767809314  |a 816874511  |a 823130601 
020 |a 9781849512114  |q (electronic bk.) 
020 |a 1849512116  |q (electronic bk.) 
020 |a 9781849512107 
020 |a 1849512108 
020 |a 1283349248 
020 |a 9781283349246 
029 1 |a AU@  |b 000055169052 
029 1 |a DEBSZ  |b 372699987 
029 1 |a DEBSZ  |b 472552570 
029 1 |a UKMGB  |b 018011882 
035 |a (OCoLC)742346683  |z (OCoLC)767809314  |z (OCoLC)816874511  |z (OCoLC)823130601 
037 |a 9781849512114  |b Packt Publishing Pvt. Ltd 
050 4 |a TK5105.8885.W66  |b C66 2011eb 
072 7 |a COM  |x 087000  |2 bisacsh 
072 7 |a COM  |x 060150  |2 bisacsh 
072 7 |a COM  |x 034000  |2 bisacsh 
072 7 |a COM  |x 060130  |2 bisacsh 
082 0 4 |a 006.78  |2 23 
049 |a UAMI 
100 1 |a Connelly, Olly. 
245 1 0 |a WordPress 3 ultimate security :  |b protect your WordPress site and its network /  |c Olly Connelly. 
246 3 |a WordPress Three ultimate security 
260 |a Birmingham :  |b Packt Pub.,  |c 2011. 
300 |a 1 online resource (1 electronic resource (375 pages)) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a This is a comprehensive essential guide to WordPress security written in a light style, which converts learning a really serious topic to an enjoyable read. It is packed with copy-paste solutions to security to suit all levels of security know-how. Just as WordPress is used by a broad spectrum of website owners, with varying degrees of security know-how, so WordPress 3 Ultimate Security is written to be understood by security novices and web professionals alike. From site and server owners and administrators to members of their contributing team, this essential A to Z reference takes a complex and, let's face it, frankly dull subject and makes it accessible, encouraging, and sometimes even fun. Even if you are a total newbie to security, you can transform an insecure site into an iron-clad fortress, safeguarding your site users, your content and, sooner or later, your stress level. 
505 0 |a Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: So What's the Risk?; Calculated risk; An overview of our risk; Meet the hackers; White hat; Black hat; Botnets; Cybercriminals; Hacktivists; Scrapers; Script kiddies; Spammers; Misfits; Grey hat; Hackers and crackers; Physically hacked off; Social engineering; Phone calls; Walk-ins; Enticing URLs; Phishing; Social networking (and so on); Protecting against social engineering; Weighing up Windows, Linux, and Mac OS X; The deny-by-default permission model 
505 8 |a The open source advantageSystem security summary; Malwares dissected; Blended threats; Crimeware; Data loggers; At loggerheads with the loggers; Hoax virus; Rootkits; Spyware; Trojan horses; Viruses; Worms; Zero day; World wide worry; Old browser (and other app) versions; Unencrypted traffic; Dodgy sites, social engineering, and phish food; Infected public PCs; Sniffing out problems with wireless; Wireless hotspots; Evil twins; Ground zero; Overall risk to the site and server; Physical server vulnerabilities; Open ports with vulnerable services; Access and authentication issues 
505 8 |a Buffer overflow attacksIntercepting data with man-in-the-middle attacks; Cracking authentication with password attacks; The many dangers of cross-site scripting (XSS); Assorted threats with cross-site request forgery (CSRF); Accessible round-up; Lazy site and server administration; Vulnerable versions; Redundant files; Privilege escalation and jailbreak opportunities; Unchecked information leak; Content theft, SEO pillaging, and spam defacement; Scraping and media hotlinking; Damn spam, rants, and heart attacks; Summary; Chapter 2: Hack or Be Hacked; Introducing the hacker's methodology 
505 8 |a ReconnaissanceScanning; Gain access; Secure access; Cover tracks; Ethical hacking vs. doing time; The reconnaissance phase; What to look for; How to look for it; Google hacking; More on Google hacking; Scouting-assistive applications; Hacking Google hacking with SiteDigger; WHOIS whacking; Demystifying DNS; Resolving a web address; Domain name security; The scanning phase; Mapping out the network; Nmap: the Network Mapper; Secondary scanners; Scanning for server vulnerabilities; Nessus; OpenVAS; GFI Languard; Qualys; NeXpose and Metasploit; Scanning for web vulnerabilities; Wikto; Paros Proxy 
505 8 |a HackerTargetAlternative tools; Hack packs; Summary; Chapter 3: Securing the Local Box; Breaking Windows: considering alternatives; Windows security services; Security or Action Center; Windows Firewall; Windows Update; Internet Options; Windows Defender; User Account Control; Configuring UAC in Vista; Configuring UAC in Windows 7; Disabling UAC at the registry (Vista and 7); UAC problems with Vista Home and Premium; Proactive about anti-malware; The reactionary old guard: detection; Regular antivirus scanners; The proactive new guard: prevention; The almost perfect anti-malware solution 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
630 0 0 |a WordPress (Electronic resource)  |v Handbooks, manuals, etc. 
630 0 7 |a WordPress (Electronic resource)  |2 fast 
650 0 |a Blogs  |x Security measures. 
650 6 |a Blogues  |x Sécurité  |x Mesures. 
650 7 |a COMPUTERS  |x Digital Media  |x General.  |2 bisacsh 
650 7 |a COMPUTERS  |x Web  |x User Generated Content.  |2 bisacsh 
650 7 |a COMPUTERS  |x Interactive & Multimedia.  |2 bisacsh 
650 7 |a COMPUTERS  |x Web  |x Site Design.  |2 bisacsh 
655 7 |a manuals (instructional materials)  |2 aat 
655 7 |a handbooks.  |2 aat 
655 7 |a Handbooks and manuals  |2 fast 
655 7 |a Handbooks and manuals.  |2 lcgft 
655 7 |a Guides et manuels.  |2 rvmgf 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=373128  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH26943706 
938 |a ebrary  |b EBRY  |n ebr10481033 
938 |a EBSCOhost  |b EBSC  |n 373128 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n 334924 
938 |a YBP Library Services  |b YANK  |n 6964876 
994 |a 92  |b IZTAP