LEADER 04879nam 2200661 a 450 001 9910789334203321 005 20200520144314.0 010 $a1-283-39776-5 010 $a9786613397768 010 $a1-118-09174-4 035 $a(CKB)3400000000022000 035 $a(EBL)706893 035 $a(OCoLC)739838968 035 $a(SSID)ssj0000551084 035 $a(PQKBManifestationID)12253016 035 $a(PQKBTitleCode)TC0000551084 035 $a(PQKBWorkID)10524468 035 $a(PQKB)10185166 035 $a(Au-PeEL)EBL706893 035 $a(CaPaEBR)ebr10514017 035 $a(CaONFJC)MIL339776 035 $a(CaSebORM)9780470916216 035 $a(MiAaPQ)EBC706893 035 $a(EXLCZ)993400000000022000 100 $a20110210d2011 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aCMS security handbook$b[electronic resource] $ethe comprehensive guide for WordPress, Joomla!, Drupal, and Plone /$fTom Canavan 205 $a1st edition 210 $aIndianapolis, Ind. $cWiley Pub.$dc2011 215 $a1 online resource (434 p.) 300 $aIncludes index. 311 $a0-470-91621-4 327 $aCMS Security Handbook; Contents; Introduction; Chapter 1 Introduction to CMS Security and Operations; Target Acquired; Operational Considerations; Educating Your Employees and End Users; Raising Security Awareness; Training on Information Security Policies; Providing a Standard Protocol for Threat Reporting; Ensuring E-mail Security; Applying Patches and Updates; Being Aware and Staying Safe; Looking at Your Site Through the Eyes of a Hacker; Steps to Gaining Access to Your Site; Researching; Googling Away; Using Google Hacking Tools (Dorks); Footprinting; Using NMAP for Nefarious Means 327 $aUsing TracerouteFinding Subdomains; Enumeration; Attacking and Owning the Site; Wiping Out Their Tracks; Examples of Threats; Social Engineering; Calling into Your Office; Sending in a Trusted Friend; Using USB Keys; Indiscriminate Browsing or Instant Messaging; External Media; Vendors or External Clients/Customers as the Threat; Reviewing Your Perimeter; Using Virus Protection; Banning Passwords on Desks; Enforcing a Password Complexity and Change Policy; Policing Open Wireless; Tools for Wireless Detection; How Will You Respond to an Incident?; Does Your Plan Exist?; Is the Plan Up to Date? 327 $aWhere Are Your Backup Tapes, Disks, and USBs?Summary; Chapter 2 Choosing the Right Hosting Company; Types of Hosting Available; Shared Hosting; Virtual Private Server (VPS); Dedicated Server; Cloud Hosting; Security of Data in a Cloud; Selecting the Right Hosting Option; Budget Considerations; Determining the Appropriate Server Size; Case 1: Light Website Traffic (Shared Hosting); Case 2: Medium Website Traffic (VPS); Case 3: Heavy Website Traffic; Using Backups; What to Look for in Web Host Security; Physical Security; Glass Windows; Flooding; Signs; People 327 $aDumpster Diving and Social EngineeringBreach Response; Terrorists; Access to Equipment; Water Detection; Fire Suppression; Emergency Procedures; Disaster Recovery and Business Continuity; Cyber Security; Firewalls and Intrusion Detection; Log File Auditing; Spam, Virus Scanning, and Prevention; Patching for Weaknesses; VoIP; Web Servers; Environmental Support; Network Redundancy; Electrical Service; Technical Support; Emergency Planning for the Host; Location of the Host's Data Center; Processes; Backups; Offsite Procedures; Accepting Credit Cards on Your Website; Understanding PCI 327 $aPCI TerminologyBecoming PCI Certified; Installing an SSL Certificate; Testing by ASV; Choosing a Shopping Cart; Storing Data Securely; PCI Vulnerability Management Plan; Avoiding Common ASV Testing Pitfalls; After Certification; Domain Name System Servers; Understanding DNS; Threats to DNS; DNS (Name Server) Failure; Zone Transfers; Lack of Patching DNS Servers; DNS Poisoning; Hosting Your Own Website Server; Getting Ready; Making Your Shopping List; Choosing an Operating System; Ensuring Security; Patching; Summary; Chapter 3 Preventing Problems Before They Start 327 $aChoosing an Appropriate CMS for Your Needs 330 $aProvides information on maintaining security for websites built on open source Content Management Systems. 606 $aComputer networks$xSecurity measures 606 $aData protection 606 $aWeb sites$xSecurity measures 615 0$aComputer networks$xSecurity measures. 615 0$aData protection. 615 0$aWeb sites$xSecurity measures. 676 $a005.8 700 $aCanavan$b Tom$01552590 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910789334203321 996 $aCMS security handbook$93867602 997 $aUNINA