top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
CMS security handbook [[electronic resource] ] : the comprehensive guide for WordPress, Joomla!, Drupal, and Plone / / Tom Canavan
CMS security handbook [[electronic resource] ] : the comprehensive guide for WordPress, Joomla!, Drupal, and Plone / / Tom Canavan
Autore Canavan Tom
Edizione [1st edition]
Pubbl/distr/stampa Indianapolis, Ind., : Wiley Pub., c2011
Descrizione fisica 1 online resource (434 p.)
Disciplina 005.8
Soggetto topico Computer networks - Security measures
Data protection
Web sites - Security measures
Soggetto genere / forma Electronic books.
ISBN 1-283-39776-5
9786613397768
1-118-09174-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto CMS Security Handbook; Contents; Introduction; Chapter 1 Introduction to CMS Security and Operations; Target Acquired; Operational Considerations; Educating Your Employees and End Users; Raising Security Awareness; Training on Information Security Policies; Providing a Standard Protocol for Threat Reporting; Ensuring E-mail Security; Applying Patches and Updates; Being Aware and Staying Safe; Looking at Your Site Through the Eyes of a Hacker; Steps to Gaining Access to Your Site; Researching; Googling Away; Using Google Hacking Tools (Dorks); Footprinting; Using NMAP for Nefarious Means
Using TracerouteFinding Subdomains; Enumeration; Attacking and Owning the Site; Wiping Out Their Tracks; Examples of Threats; Social Engineering; Calling into Your Office; Sending in a Trusted Friend; Using USB Keys; Indiscriminate Browsing or Instant Messaging; External Media; Vendors or External Clients/Customers as the Threat; Reviewing Your Perimeter; Using Virus Protection; Banning Passwords on Desks; Enforcing a Password Complexity and Change Policy; Policing Open Wireless; Tools for Wireless Detection; How Will You Respond to an Incident?; Does Your Plan Exist?; Is the Plan Up to Date?
Where Are Your Backup Tapes, Disks, and USBs?Summary; Chapter 2 Choosing the Right Hosting Company; Types of Hosting Available; Shared Hosting; Virtual Private Server (VPS); Dedicated Server; Cloud Hosting; Security of Data in a Cloud; Selecting the Right Hosting Option; Budget Considerations; Determining the Appropriate Server Size; Case 1: Light Website Traffic (Shared Hosting); Case 2: Medium Website Traffic (VPS); Case 3: Heavy Website Traffic; Using Backups; What to Look for in Web Host Security; Physical Security; Glass Windows; Flooding; Signs; People
Dumpster Diving and Social EngineeringBreach Response; Terrorists; Access to Equipment; Water Detection; Fire Suppression; Emergency Procedures; Disaster Recovery and Business Continuity; Cyber Security; Firewalls and Intrusion Detection; Log File Auditing; Spam, Virus Scanning, and Prevention; Patching for Weaknesses; VoIP; Web Servers; Environmental Support; Network Redundancy; Electrical Service; Technical Support; Emergency Planning for the Host; Location of the Host's Data Center; Processes; Backups; Offsite Procedures; Accepting Credit Cards on Your Website; Understanding PCI
PCI TerminologyBecoming PCI Certified; Installing an SSL Certificate; Testing by ASV; Choosing a Shopping Cart; Storing Data Securely; PCI Vulnerability Management Plan; Avoiding Common ASV Testing Pitfalls; After Certification; Domain Name System Servers; Understanding DNS; Threats to DNS; DNS (Name Server) Failure; Zone Transfers; Lack of Patching DNS Servers; DNS Poisoning; Hosting Your Own Website Server; Getting Ready; Making Your Shopping List; Choosing an Operating System; Ensuring Security; Patching; Summary; Chapter 3 Preventing Problems Before They Start
Choosing an Appropriate CMS for Your Needs
Record Nr. UNINA-9910464850703321
Canavan Tom  
Indianapolis, Ind., : Wiley Pub., c2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
CMS security handbook [[electronic resource] ] : the comprehensive guide for WordPress, Joomla!, Drupal, and Plone / / Tom Canavan
CMS security handbook [[electronic resource] ] : the comprehensive guide for WordPress, Joomla!, Drupal, and Plone / / Tom Canavan
Autore Canavan Tom
Edizione [1st edition]
Pubbl/distr/stampa Indianapolis, Ind., : Wiley Pub., c2011
Descrizione fisica 1 online resource (434 p.)
Disciplina 005.8
Soggetto topico Computer networks - Security measures
Data protection
Web sites - Security measures
ISBN 1-283-39776-5
9786613397768
1-118-09174-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto CMS Security Handbook; Contents; Introduction; Chapter 1 Introduction to CMS Security and Operations; Target Acquired; Operational Considerations; Educating Your Employees and End Users; Raising Security Awareness; Training on Information Security Policies; Providing a Standard Protocol for Threat Reporting; Ensuring E-mail Security; Applying Patches and Updates; Being Aware and Staying Safe; Looking at Your Site Through the Eyes of a Hacker; Steps to Gaining Access to Your Site; Researching; Googling Away; Using Google Hacking Tools (Dorks); Footprinting; Using NMAP for Nefarious Means
Using TracerouteFinding Subdomains; Enumeration; Attacking and Owning the Site; Wiping Out Their Tracks; Examples of Threats; Social Engineering; Calling into Your Office; Sending in a Trusted Friend; Using USB Keys; Indiscriminate Browsing or Instant Messaging; External Media; Vendors or External Clients/Customers as the Threat; Reviewing Your Perimeter; Using Virus Protection; Banning Passwords on Desks; Enforcing a Password Complexity and Change Policy; Policing Open Wireless; Tools for Wireless Detection; How Will You Respond to an Incident?; Does Your Plan Exist?; Is the Plan Up to Date?
Where Are Your Backup Tapes, Disks, and USBs?Summary; Chapter 2 Choosing the Right Hosting Company; Types of Hosting Available; Shared Hosting; Virtual Private Server (VPS); Dedicated Server; Cloud Hosting; Security of Data in a Cloud; Selecting the Right Hosting Option; Budget Considerations; Determining the Appropriate Server Size; Case 1: Light Website Traffic (Shared Hosting); Case 2: Medium Website Traffic (VPS); Case 3: Heavy Website Traffic; Using Backups; What to Look for in Web Host Security; Physical Security; Glass Windows; Flooding; Signs; People
Dumpster Diving and Social EngineeringBreach Response; Terrorists; Access to Equipment; Water Detection; Fire Suppression; Emergency Procedures; Disaster Recovery and Business Continuity; Cyber Security; Firewalls and Intrusion Detection; Log File Auditing; Spam, Virus Scanning, and Prevention; Patching for Weaknesses; VoIP; Web Servers; Environmental Support; Network Redundancy; Electrical Service; Technical Support; Emergency Planning for the Host; Location of the Host's Data Center; Processes; Backups; Offsite Procedures; Accepting Credit Cards on Your Website; Understanding PCI
PCI TerminologyBecoming PCI Certified; Installing an SSL Certificate; Testing by ASV; Choosing a Shopping Cart; Storing Data Securely; PCI Vulnerability Management Plan; Avoiding Common ASV Testing Pitfalls; After Certification; Domain Name System Servers; Understanding DNS; Threats to DNS; DNS (Name Server) Failure; Zone Transfers; Lack of Patching DNS Servers; DNS Poisoning; Hosting Your Own Website Server; Getting Ready; Making Your Shopping List; Choosing an Operating System; Ensuring Security; Patching; Summary; Chapter 3 Preventing Problems Before They Start
Choosing an Appropriate CMS for Your Needs
Record Nr. UNINA-9910789334203321
Canavan Tom  
Indianapolis, Ind., : Wiley Pub., c2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
CMS security handbook : the comprehensive guide for WordPress, Joomla!, Drupal, and Plone / / Tom Canavan
CMS security handbook : the comprehensive guide for WordPress, Joomla!, Drupal, and Plone / / Tom Canavan
Autore Canavan Tom
Edizione [1st edition]
Pubbl/distr/stampa Indianapolis, Ind., : Wiley Pub., c2011
Descrizione fisica 1 online resource (434 p.)
Disciplina 005.8
Soggetto topico Computer networks - Security measures
Data protection
Web sites - Security measures
ISBN 1-283-39776-5
9786613397768
1-118-09174-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto CMS Security Handbook; Contents; Introduction; Chapter 1 Introduction to CMS Security and Operations; Target Acquired; Operational Considerations; Educating Your Employees and End Users; Raising Security Awareness; Training on Information Security Policies; Providing a Standard Protocol for Threat Reporting; Ensuring E-mail Security; Applying Patches and Updates; Being Aware and Staying Safe; Looking at Your Site Through the Eyes of a Hacker; Steps to Gaining Access to Your Site; Researching; Googling Away; Using Google Hacking Tools (Dorks); Footprinting; Using NMAP for Nefarious Means
Using TracerouteFinding Subdomains; Enumeration; Attacking and Owning the Site; Wiping Out Their Tracks; Examples of Threats; Social Engineering; Calling into Your Office; Sending in a Trusted Friend; Using USB Keys; Indiscriminate Browsing or Instant Messaging; External Media; Vendors or External Clients/Customers as the Threat; Reviewing Your Perimeter; Using Virus Protection; Banning Passwords on Desks; Enforcing a Password Complexity and Change Policy; Policing Open Wireless; Tools for Wireless Detection; How Will You Respond to an Incident?; Does Your Plan Exist?; Is the Plan Up to Date?
Where Are Your Backup Tapes, Disks, and USBs?Summary; Chapter 2 Choosing the Right Hosting Company; Types of Hosting Available; Shared Hosting; Virtual Private Server (VPS); Dedicated Server; Cloud Hosting; Security of Data in a Cloud; Selecting the Right Hosting Option; Budget Considerations; Determining the Appropriate Server Size; Case 1: Light Website Traffic (Shared Hosting); Case 2: Medium Website Traffic (VPS); Case 3: Heavy Website Traffic; Using Backups; What to Look for in Web Host Security; Physical Security; Glass Windows; Flooding; Signs; People
Dumpster Diving and Social EngineeringBreach Response; Terrorists; Access to Equipment; Water Detection; Fire Suppression; Emergency Procedures; Disaster Recovery and Business Continuity; Cyber Security; Firewalls and Intrusion Detection; Log File Auditing; Spam, Virus Scanning, and Prevention; Patching for Weaknesses; VoIP; Web Servers; Environmental Support; Network Redundancy; Electrical Service; Technical Support; Emergency Planning for the Host; Location of the Host's Data Center; Processes; Backups; Offsite Procedures; Accepting Credit Cards on Your Website; Understanding PCI
PCI TerminologyBecoming PCI Certified; Installing an SSL Certificate; Testing by ASV; Choosing a Shopping Cart; Storing Data Securely; PCI Vulnerability Management Plan; Avoiding Common ASV Testing Pitfalls; After Certification; Domain Name System Servers; Understanding DNS; Threats to DNS; DNS (Name Server) Failure; Zone Transfers; Lack of Patching DNS Servers; DNS Poisoning; Hosting Your Own Website Server; Getting Ready; Making Your Shopping List; Choosing an Operating System; Ensuring Security; Patching; Summary; Chapter 3 Preventing Problems Before They Start
Choosing an Appropriate CMS for Your Needs
Altri titoli varianti Comprehensive guide for WordPress, Joomla!, Drupal, and Plone
Content management systems security handbook
Record Nr. UNINA-9910824782203321
Canavan Tom  
Indianapolis, Ind., : Wiley Pub., c2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Joomla! 1.5 cookbook [[electronic resource] ] : over 60 quick and direct recipes to help you overcome common Joomla! queries / / Tom Canavan
Joomla! 1.5 cookbook [[electronic resource] ] : over 60 quick and direct recipes to help you overcome common Joomla! queries / / Tom Canavan
Autore Canavan Tom
Pubbl/distr/stampa Birmingham, U.K., : Packt Pub., 2010
Descrizione fisica 1 online resource (340 p.)
Disciplina 006.7
006.786
Soggetto topico Web sites - Design
Soggetto genere / forma Electronic books.
ISBN 1-282-89692-X
9786612896927
1-84951-237-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Copyright; Credits; About the Author; About the Reviewer; Table of Contents; Preface; Chapter 1: Installing Joomla!; Introduction; Preparing to install; Setting up your database on a cPanel® host; Setting up your database on a; GoDaddy.Com® server; Installation of Joomla! 1.5; Ensuring permissions are correct; Chapter 2: Working with phpMyAdmin; Introduction; Exporting a MySQL database using; phpMyAdmin; Importing a MySQL database using; phpMyAdmin; Working with your database using; phpMyAdmin; Removing a table from your database; Removing content from a table; Chapter 3: Templates
IntroductionInstalling the template using the; administrator tool; Replacing the default administrator; template; Manual installation of a template; Using more than one template on your site; Determining your templates' module; positions; Replacing a logo in a template; Chapter 4: Editing Content and Menus; Introduction; Installing a new editor; Setting up sections; Setting up categories; Article creation; Adding new menus; Setting up a blog on your Joomla! site; Adding an extension menu; Chapter 5: Managing Links, Users, and Media; Introduction; Managing users; Setting up a site contact
Working with mediaManaging the login and user experience; Web Link manager; Changing lost super admin password; Chapter 6: Managing Modules and Components; Introduction; Installing and managing components; Creating menu items for components; Installing, creating, and managing modules; Chapter 7: Managing Articles Using the K2 Content Construction Kit; Introduction; Installation and introduction of K2; Working with items AKA articles; Working with comments; Summary; Chapter 8: Installing Third-party Extensions; Introduction; Installing and using eXtplorer; Using and configuring content
uploader extensionjomCalendar; Using and configuring CompojoomComment; Summary; Chapter 9: Troubleshooting; Introduction; Developing a 'troubleshooting mentality'; Summary; Chapter 10: Securing your Joomla! Site; Introduction; Setting permissions for your site; Patching; Using .htaccess and php.ini; Denying specific IP addresses; Summary; Chapter 11: Joomla! 1.6; Introduction; Joomla! 1.6 ACL; Working with new category manager; Extensions; Appendix; Usernames, passwords and database; reference sheet; Turning the legacy mode on or off; Changing the favorite icon
Setting up a site in a subfolderQuestions to ask a prospective host; Checking and updating your server software; Index
Record Nr. UNINA-9910459098503321
Canavan Tom  
Birmingham, U.K., : Packt Pub., 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Joomla! 1.5 cookbook [[electronic resource] ] : over 60 quick and direct recipes to help you overcome common Joomla! queries / / Tom Canavan
Joomla! 1.5 cookbook [[electronic resource] ] : over 60 quick and direct recipes to help you overcome common Joomla! queries / / Tom Canavan
Autore Canavan Tom
Pubbl/distr/stampa Birmingham, U.K., : Packt Pub., 2010
Descrizione fisica 1 online resource (340 p.)
Disciplina 006.7
006.786
Soggetto topico Web sites - Design
ISBN 1-282-89692-X
9786612896927
1-84951-237-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Copyright; Credits; About the Author; About the Reviewer; Table of Contents; Preface; Chapter 1: Installing Joomla!; Introduction; Preparing to install; Setting up your database on a cPanel® host; Setting up your database on a; GoDaddy.Com® server; Installation of Joomla! 1.5; Ensuring permissions are correct; Chapter 2: Working with phpMyAdmin; Introduction; Exporting a MySQL database using; phpMyAdmin; Importing a MySQL database using; phpMyAdmin; Working with your database using; phpMyAdmin; Removing a table from your database; Removing content from a table; Chapter 3: Templates
IntroductionInstalling the template using the; administrator tool; Replacing the default administrator; template; Manual installation of a template; Using more than one template on your site; Determining your templates' module; positions; Replacing a logo in a template; Chapter 4: Editing Content and Menus; Introduction; Installing a new editor; Setting up sections; Setting up categories; Article creation; Adding new menus; Setting up a blog on your Joomla! site; Adding an extension menu; Chapter 5: Managing Links, Users, and Media; Introduction; Managing users; Setting up a site contact
Working with mediaManaging the login and user experience; Web Link manager; Changing lost super admin password; Chapter 6: Managing Modules and Components; Introduction; Installing and managing components; Creating menu items for components; Installing, creating, and managing modules; Chapter 7: Managing Articles Using the K2 Content Construction Kit; Introduction; Installation and introduction of K2; Working with items AKA articles; Working with comments; Summary; Chapter 8: Installing Third-party Extensions; Introduction; Installing and using eXtplorer; Using and configuring content
uploader extensionjomCalendar; Using and configuring CompojoomComment; Summary; Chapter 9: Troubleshooting; Introduction; Developing a 'troubleshooting mentality'; Summary; Chapter 10: Securing your Joomla! Site; Introduction; Setting permissions for your site; Patching; Using .htaccess and php.ini; Denying specific IP addresses; Summary; Chapter 11: Joomla! 1.6; Introduction; Joomla! 1.6 ACL; Working with new category manager; Extensions; Appendix; Usernames, passwords and database; reference sheet; Turning the legacy mode on or off; Changing the favorite icon
Setting up a site in a subfolderQuestions to ask a prospective host; Checking and updating your server software; Index
Record Nr. UNINA-9910785482603321
Canavan Tom  
Birmingham, U.K., : Packt Pub., 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Joomla! 1.5 cookbook : over 60 quick and direct recipes to help you overcome common Joomla! queries / / Tom Canavan
Joomla! 1.5 cookbook : over 60 quick and direct recipes to help you overcome common Joomla! queries / / Tom Canavan
Autore Canavan Tom
Edizione [1st ed.]
Pubbl/distr/stampa Birmingham, U.K., : Packt Pub., 2010
Descrizione fisica 1 online resource (340 p.)
Disciplina 006.7
006.786
Soggetto topico Web sites - Design
ISBN 1-282-89692-X
9786612896927
1-84951-237-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Copyright; Credits; About the Author; About the Reviewer; Table of Contents; Preface; Chapter 1: Installing Joomla!; Introduction; Preparing to install; Setting up your database on a cPanel® host; Setting up your database on a; GoDaddy.Com® server; Installation of Joomla! 1.5; Ensuring permissions are correct; Chapter 2: Working with phpMyAdmin; Introduction; Exporting a MySQL database using; phpMyAdmin; Importing a MySQL database using; phpMyAdmin; Working with your database using; phpMyAdmin; Removing a table from your database; Removing content from a table; Chapter 3: Templates
IntroductionInstalling the template using the; administrator tool; Replacing the default administrator; template; Manual installation of a template; Using more than one template on your site; Determining your templates' module; positions; Replacing a logo in a template; Chapter 4: Editing Content and Menus; Introduction; Installing a new editor; Setting up sections; Setting up categories; Article creation; Adding new menus; Setting up a blog on your Joomla! site; Adding an extension menu; Chapter 5: Managing Links, Users, and Media; Introduction; Managing users; Setting up a site contact
Working with mediaManaging the login and user experience; Web Link manager; Changing lost super admin password; Chapter 6: Managing Modules and Components; Introduction; Installing and managing components; Creating menu items for components; Installing, creating, and managing modules; Chapter 7: Managing Articles Using the K2 Content Construction Kit; Introduction; Installation and introduction of K2; Working with items AKA articles; Working with comments; Summary; Chapter 8: Installing Third-party Extensions; Introduction; Installing and using eXtplorer; Using and configuring content
uploader extensionjomCalendar; Using and configuring CompojoomComment; Summary; Chapter 9: Troubleshooting; Introduction; Developing a 'troubleshooting mentality'; Summary; Chapter 10: Securing your Joomla! Site; Introduction; Setting permissions for your site; Patching; Using .htaccess and php.ini; Denying specific IP addresses; Summary; Chapter 11: Joomla! 1.6; Introduction; Joomla! 1.6 ACL; Working with new category manager; Extensions; Appendix; Usernames, passwords and database; reference sheet; Turning the legacy mode on or off; Changing the favorite icon
Setting up a site in a subfolderQuestions to ask a prospective host; Checking and updating your server software; Index
Record Nr. UNINA-9910821996303321
Canavan Tom  
Birmingham, U.K., : Packt Pub., 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Joomla! web security [[electronic resource] ] : secure your Joomla! website from common security threats with this easy-to-use guide / / Tom Canavan
Joomla! web security [[electronic resource] ] : secure your Joomla! website from common security threats with this easy-to-use guide / / Tom Canavan
Autore Canavan Tom
Pubbl/distr/stampa Birmingham, U.K., : Packt Pub., c2008
Descrizione fisica 1 online resource (264 p.)
Disciplina 005.8
Collana From technologies to solutions
Soggetto topico Web sites - Security measures
Computer networks - Security measures
Web sites - Authoring programs
Web site development
Soggetto genere / forma Electronic books.
ISBN 1-281-85616-9
9786611856168
1-84719-489-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Table of Contents; Preface; Chapter 1: Let's Get Started; Introduction; Common Terminology; Hosting-Selection and Unique Needs; What Is a Host?; Choosing a Host; Questions to Ask a Prospective Host; Facilities; Things to Ask Your Host about Facility Security; Environmental Questions about the Facility; Site Monitoring and Protection; Patching and Security; Shared Hosting; Dedicated Hosting; Architecting for a Successful Site; What Is the Purpose of Your Site?; Eleven Steps to Successful Site Architecture; Downloading Joomla!; Settings; .htaccess; Permissions; User Management
Common Trip UpsFailure to Check Vulnerability List First; Register Globals, Again; Permissions; Poor Documentation; Got Backups?; Setting Up Security Metrics; Summary; Chapter 2: Test and Development; Welcome to the Laboratory!; Test and Development Environment; What Does This Have to Do with Security?; The Evil Hamster Wheel of Upgrades; Determine the Need for Upgrade; Developing Your Test Plan; Essential Parameters for a Successful Test; Using Your Test and Development Site for Disaster Planning; Updating Your Disaster Recovery Documentation
Make DR Testing a Part of Your Upgrade/Rollout CycleCrafting Good Documentation; Using a Software Development Management System; Tour of Lighthouse from Artifact Software; Reporting; Using the Ravenswood Joomla! Server; Roll-out; Summary; Chapter 3: Tools; Introduction; Tools, Tools, and More Tools; HISA; Installation Check; Web-Server Environment; Required Settings for Joomla!; Recommended Settings; Joomla Tools Suite with Services; How's Our Health?; NMAP-Network Mapping Tool from insecure.org; Wireshark; Metasploit-The Penetration Testers Tool Set; Nessus Vulnerability Scanner
Why You Need NessusSummary; Chapter 4: Vulnerabilities; Introduction; Importance of Patching is Paramount; What is a Vulnerability?; Memory Corruption Vulnerabilities; SQL Injections; Command Injection Attacks; Attack Example; Why do Vulnerabilities Exist?; What Can be Done to Prevent Vulnerabilities?; Developers; Poor Testing and Planning; Forbidden; Improper Variable Sanitization and Dangerous Inputs; Not Testing in a Broad Enough Environment; Testing for Various Versions of SQL; Interactions with Other Third-Party Extensions; End Users; Social Engineering; Poor Patching and Updating
SummaryChapter 5: Anatomy of Attacks; Introduction; SQL Injections; Testing for SQL Injections; A Few Methods to Prevent SQL Injections; And According to PHP.NET; Remote File Includes; The Most Basic Attempt; What Can We Do to Stop This?; Preventing RFI Attacks; Summary; Chapter 6: How the Bad Guys Do It; Laws on the Books; Acquiring Target; Sizing up the Target; Vulnerability Tools; Nessus; Nikto: An Open-Source Vulnerability Scanner; Acunetix; NMAP; Wireshark; Ping Sweep; Firewalk; Angry IP Scanner; Digital Graffiti versus Real Attacks; Finding Targets to Attack; What Do I Do Then?
Countermeasures
Record Nr. UNINA-9910454558203321
Canavan Tom  
Birmingham, U.K., : Packt Pub., c2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Joomla! web security [[electronic resource] ] : secure your Joomla! website from common security threats with this easy-to-use guide / / Tom Canavan
Joomla! web security [[electronic resource] ] : secure your Joomla! website from common security threats with this easy-to-use guide / / Tom Canavan
Autore Canavan Tom
Pubbl/distr/stampa Birmingham, U.K., : Packt Pub., c2008
Descrizione fisica 1 online resource (264 p.)
Disciplina 005.8
Collana From technologies to solutions
Soggetto topico Web sites - Security measures
Computer networks - Security measures
Web sites - Authoring programs
Web site development
ISBN 1-281-85616-9
9786611856168
1-84719-489-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Table of Contents; Preface; Chapter 1: Let's Get Started; Introduction; Common Terminology; Hosting-Selection and Unique Needs; What Is a Host?; Choosing a Host; Questions to Ask a Prospective Host; Facilities; Things to Ask Your Host about Facility Security; Environmental Questions about the Facility; Site Monitoring and Protection; Patching and Security; Shared Hosting; Dedicated Hosting; Architecting for a Successful Site; What Is the Purpose of Your Site?; Eleven Steps to Successful Site Architecture; Downloading Joomla!; Settings; .htaccess; Permissions; User Management
Common Trip UpsFailure to Check Vulnerability List First; Register Globals, Again; Permissions; Poor Documentation; Got Backups?; Setting Up Security Metrics; Summary; Chapter 2: Test and Development; Welcome to the Laboratory!; Test and Development Environment; What Does This Have to Do with Security?; The Evil Hamster Wheel of Upgrades; Determine the Need for Upgrade; Developing Your Test Plan; Essential Parameters for a Successful Test; Using Your Test and Development Site for Disaster Planning; Updating Your Disaster Recovery Documentation
Make DR Testing a Part of Your Upgrade/Rollout CycleCrafting Good Documentation; Using a Software Development Management System; Tour of Lighthouse from Artifact Software; Reporting; Using the Ravenswood Joomla! Server; Roll-out; Summary; Chapter 3: Tools; Introduction; Tools, Tools, and More Tools; HISA; Installation Check; Web-Server Environment; Required Settings for Joomla!; Recommended Settings; Joomla Tools Suite with Services; How's Our Health?; NMAP-Network Mapping Tool from insecure.org; Wireshark; Metasploit-The Penetration Testers Tool Set; Nessus Vulnerability Scanner
Why You Need NessusSummary; Chapter 4: Vulnerabilities; Introduction; Importance of Patching is Paramount; What is a Vulnerability?; Memory Corruption Vulnerabilities; SQL Injections; Command Injection Attacks; Attack Example; Why do Vulnerabilities Exist?; What Can be Done to Prevent Vulnerabilities?; Developers; Poor Testing and Planning; Forbidden; Improper Variable Sanitization and Dangerous Inputs; Not Testing in a Broad Enough Environment; Testing for Various Versions of SQL; Interactions with Other Third-Party Extensions; End Users; Social Engineering; Poor Patching and Updating
SummaryChapter 5: Anatomy of Attacks; Introduction; SQL Injections; Testing for SQL Injections; A Few Methods to Prevent SQL Injections; And According to PHP.NET; Remote File Includes; The Most Basic Attempt; What Can We Do to Stop This?; Preventing RFI Attacks; Summary; Chapter 6: How the Bad Guys Do It; Laws on the Books; Acquiring Target; Sizing up the Target; Vulnerability Tools; Nessus; Nikto: An Open-Source Vulnerability Scanner; Acunetix; NMAP; Wireshark; Ping Sweep; Firewalk; Angry IP Scanner; Digital Graffiti versus Real Attacks; Finding Targets to Attack; What Do I Do Then?
Countermeasures
Record Nr. UNINA-9910777901703321
Canavan Tom  
Birmingham, U.K., : Packt Pub., c2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Joomla! web security : secure your Joomla! website from common security threats with this easy-to-use guide / / Tom Canavan
Joomla! web security : secure your Joomla! website from common security threats with this easy-to-use guide / / Tom Canavan
Autore Canavan Tom
Edizione [1st ed.]
Pubbl/distr/stampa Birmingham, U.K., : Packt Pub., c2008
Descrizione fisica 1 online resource (264 p.)
Disciplina 005.8
Collana From technologies to solutions
Soggetto topico Web sites - Security measures
Computer networks - Security measures
Web sites - Authoring programs
Web site development
ISBN 1-281-85616-9
9786611856168
1-84719-489-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Table of Contents; Preface; Chapter 1: Let's Get Started; Introduction; Common Terminology; Hosting-Selection and Unique Needs; What Is a Host?; Choosing a Host; Questions to Ask a Prospective Host; Facilities; Things to Ask Your Host about Facility Security; Environmental Questions about the Facility; Site Monitoring and Protection; Patching and Security; Shared Hosting; Dedicated Hosting; Architecting for a Successful Site; What Is the Purpose of Your Site?; Eleven Steps to Successful Site Architecture; Downloading Joomla!; Settings; .htaccess; Permissions; User Management
Common Trip UpsFailure to Check Vulnerability List First; Register Globals, Again; Permissions; Poor Documentation; Got Backups?; Setting Up Security Metrics; Summary; Chapter 2: Test and Development; Welcome to the Laboratory!; Test and Development Environment; What Does This Have to Do with Security?; The Evil Hamster Wheel of Upgrades; Determine the Need for Upgrade; Developing Your Test Plan; Essential Parameters for a Successful Test; Using Your Test and Development Site for Disaster Planning; Updating Your Disaster Recovery Documentation
Make DR Testing a Part of Your Upgrade/Rollout CycleCrafting Good Documentation; Using a Software Development Management System; Tour of Lighthouse from Artifact Software; Reporting; Using the Ravenswood Joomla! Server; Roll-out; Summary; Chapter 3: Tools; Introduction; Tools, Tools, and More Tools; HISA; Installation Check; Web-Server Environment; Required Settings for Joomla!; Recommended Settings; Joomla Tools Suite with Services; How's Our Health?; NMAP-Network Mapping Tool from insecure.org; Wireshark; Metasploit-The Penetration Testers Tool Set; Nessus Vulnerability Scanner
Why You Need NessusSummary; Chapter 4: Vulnerabilities; Introduction; Importance of Patching is Paramount; What is a Vulnerability?; Memory Corruption Vulnerabilities; SQL Injections; Command Injection Attacks; Attack Example; Why do Vulnerabilities Exist?; What Can be Done to Prevent Vulnerabilities?; Developers; Poor Testing and Planning; Forbidden; Improper Variable Sanitization and Dangerous Inputs; Not Testing in a Broad Enough Environment; Testing for Various Versions of SQL; Interactions with Other Third-Party Extensions; End Users; Social Engineering; Poor Patching and Updating
SummaryChapter 5: Anatomy of Attacks; Introduction; SQL Injections; Testing for SQL Injections; A Few Methods to Prevent SQL Injections; And According to PHP.NET; Remote File Includes; The Most Basic Attempt; What Can We Do to Stop This?; Preventing RFI Attacks; Summary; Chapter 6: How the Bad Guys Do It; Laws on the Books; Acquiring Target; Sizing up the Target; Vulnerability Tools; Nessus; Nikto: An Open-Source Vulnerability Scanner; Acunetix; NMAP; Wireshark; Ping Sweep; Firewalk; Angry IP Scanner; Digital Graffiti versus Real Attacks; Finding Targets to Attack; What Do I Do Then?
Countermeasures
Record Nr. UNINA-9910813826203321
Canavan Tom  
Birmingham, U.K., : Packt Pub., c2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui