LEADER 05246nam 2200781Ia 450 001 9910954890203321 005 20200520144314.0 010 $a9786611856168 010 $a9781281856166 010 $a1281856169 010 $a9781847194893 010 $a1847194893 035 $a(CKB)1000000000779096 035 $a(EBL)978105 035 $a(OCoLC)317850624 035 $a(SSID)ssj0000332231 035 $a(PQKBManifestationID)11233446 035 $a(PQKBTitleCode)TC0000332231 035 $a(PQKBWorkID)10331090 035 $a(PQKB)11131994 035 $a(Au-PeEL)EBL978105 035 $a(CaPaEBR)ebr10448387 035 $a(CaONFJC)MIL185616 035 $a(PPN)228044235 035 $a(FR-PaCSA)88852151 035 $a(MiAaPQ)EBC978105 035 $a(FRCYB88852151)88852151 035 $a(EXLCZ)991000000000779096 100 $a20090827d2008 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aJoomla! web security $esecure your Joomla! website from common security threats with this easy-to-use guide /$fTom Canavan 205 $a1st ed. 210 $aBirmingham, U.K. $cPackt Pub.$dc2008 215 $a1 online resource (264 p.) 225 1 $aFrom technologies to solutions 300 $aDescription based upon print version of record. 311 08$a9781847194886 311 08$a1847194885 320 $aIncludes bibliographical references and index. 327 $aCover; Table of Contents; Preface; Chapter 1: Let's Get Started; Introduction; Common Terminology; Hosting-Selection and Unique Needs; What Is a Host?; Choosing a Host; Questions to Ask a Prospective Host; Facilities; Things to Ask Your Host about Facility Security; Environmental Questions about the Facility; Site Monitoring and Protection; Patching and Security; Shared Hosting; Dedicated Hosting; Architecting for a Successful Site; What Is the Purpose of Your Site?; Eleven Steps to Successful Site Architecture; Downloading Joomla!; Settings; .htaccess; Permissions; User Management 327 $aCommon Trip UpsFailure to Check Vulnerability List First; Register Globals, Again; Permissions; Poor Documentation; Got Backups?; Setting Up Security Metrics; Summary; Chapter 2: Test and Development; Welcome to the Laboratory!; Test and Development Environment; What Does This Have to Do with Security?; The Evil Hamster Wheel of Upgrades; Determine the Need for Upgrade; Developing Your Test Plan; Essential Parameters for a Successful Test; Using Your Test and Development Site for Disaster Planning; Updating Your Disaster Recovery Documentation 327 $aMake DR Testing a Part of Your Upgrade/Rollout CycleCrafting Good Documentation; Using a Software Development Management System; Tour of Lighthouse from Artifact Software; Reporting; Using the Ravenswood Joomla! Server; Roll-out; Summary; Chapter 3: Tools; Introduction; Tools, Tools, and More Tools; HISA; Installation Check; Web-Server Environment; Required Settings for Joomla!; Recommended Settings; Joomla Tools Suite with Services; How's Our Health?; NMAP-Network Mapping Tool from insecure.org; Wireshark; Metasploit-The Penetration Testers Tool Set; Nessus Vulnerability Scanner 327 $aWhy You Need NessusSummary; Chapter 4: Vulnerabilities; Introduction; Importance of Patching is Paramount; What is a Vulnerability?; Memory Corruption Vulnerabilities; SQL Injections; Command Injection Attacks; Attack Example; Why do Vulnerabilities Exist?; What Can be Done to Prevent Vulnerabilities?; Developers; Poor Testing and Planning; Forbidden; Improper Variable Sanitization and Dangerous Inputs; Not Testing in a Broad Enough Environment; Testing for Various Versions of SQL; Interactions with Other Third-Party Extensions; End Users; Social Engineering; Poor Patching and Updating 327 $aSummaryChapter 5: Anatomy of Attacks; Introduction; SQL Injections; Testing for SQL Injections; A Few Methods to Prevent SQL Injections; And According to PHP.NET; Remote File Includes; The Most Basic Attempt; What Can We Do to Stop This?; Preventing RFI Attacks; Summary; Chapter 6: How the Bad Guys Do It; Laws on the Books; Acquiring Target; Sizing up the Target; Vulnerability Tools; Nessus; Nikto: An Open-Source Vulnerability Scanner; Acunetix; NMAP; Wireshark; Ping Sweep; Firewalk; Angry IP Scanner; Digital Graffiti versus Real Attacks; Finding Targets to Attack; What Do I Do Then? 327 $aCountermeasures 330 $aSecure your Joomla! website from common security threats with this easy-to-use guide 410 0$aFrom technologies to solutions. 606 $aWeb sites$xSecurity measures 606 $aComputer networks$xSecurity measures 606 $aWeb sites$xAuthoring programs 606 $aWeb site development 615 0$aWeb sites$xSecurity measures. 615 0$aComputer networks$xSecurity measures. 615 0$aWeb sites$xAuthoring programs. 615 0$aWeb site development. 676 $a005.8 700 $aCanavan$b Tom$01795703 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910954890203321 996 $aJoomla! web security$94340750 997 $aUNINA