CMS security handbook [[electronic resource] ] : the comprehensive guide for WordPress, Joomla!, Drupal, and Plone / / Tom Canavan |
Autore | Canavan Tom |
Edizione | [1st edition] |
Pubbl/distr/stampa | Indianapolis, Ind., : Wiley Pub., c2011 |
Descrizione fisica | 1 online resource (434 p.) |
Disciplina | 005.8 |
Soggetto topico |
Computer networks - Security measures
Data protection Web sites - Security measures |
Soggetto genere / forma | Electronic books. |
ISBN |
1-283-39776-5
9786613397768 1-118-09174-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
CMS Security Handbook; Contents; Introduction; Chapter 1 Introduction to CMS Security and Operations; Target Acquired; Operational Considerations; Educating Your Employees and End Users; Raising Security Awareness; Training on Information Security Policies; Providing a Standard Protocol for Threat Reporting; Ensuring E-mail Security; Applying Patches and Updates; Being Aware and Staying Safe; Looking at Your Site Through the Eyes of a Hacker; Steps to Gaining Access to Your Site; Researching; Googling Away; Using Google Hacking Tools (Dorks); Footprinting; Using NMAP for Nefarious Means
Using TracerouteFinding Subdomains; Enumeration; Attacking and Owning the Site; Wiping Out Their Tracks; Examples of Threats; Social Engineering; Calling into Your Office; Sending in a Trusted Friend; Using USB Keys; Indiscriminate Browsing or Instant Messaging; External Media; Vendors or External Clients/Customers as the Threat; Reviewing Your Perimeter; Using Virus Protection; Banning Passwords on Desks; Enforcing a Password Complexity and Change Policy; Policing Open Wireless; Tools for Wireless Detection; How Will You Respond to an Incident?; Does Your Plan Exist?; Is the Plan Up to Date? Where Are Your Backup Tapes, Disks, and USBs?Summary; Chapter 2 Choosing the Right Hosting Company; Types of Hosting Available; Shared Hosting; Virtual Private Server (VPS); Dedicated Server; Cloud Hosting; Security of Data in a Cloud; Selecting the Right Hosting Option; Budget Considerations; Determining the Appropriate Server Size; Case 1: Light Website Traffic (Shared Hosting); Case 2: Medium Website Traffic (VPS); Case 3: Heavy Website Traffic; Using Backups; What to Look for in Web Host Security; Physical Security; Glass Windows; Flooding; Signs; People Dumpster Diving and Social EngineeringBreach Response; Terrorists; Access to Equipment; Water Detection; Fire Suppression; Emergency Procedures; Disaster Recovery and Business Continuity; Cyber Security; Firewalls and Intrusion Detection; Log File Auditing; Spam, Virus Scanning, and Prevention; Patching for Weaknesses; VoIP; Web Servers; Environmental Support; Network Redundancy; Electrical Service; Technical Support; Emergency Planning for the Host; Location of the Host's Data Center; Processes; Backups; Offsite Procedures; Accepting Credit Cards on Your Website; Understanding PCI PCI TerminologyBecoming PCI Certified; Installing an SSL Certificate; Testing by ASV; Choosing a Shopping Cart; Storing Data Securely; PCI Vulnerability Management Plan; Avoiding Common ASV Testing Pitfalls; After Certification; Domain Name System Servers; Understanding DNS; Threats to DNS; DNS (Name Server) Failure; Zone Transfers; Lack of Patching DNS Servers; DNS Poisoning; Hosting Your Own Website Server; Getting Ready; Making Your Shopping List; Choosing an Operating System; Ensuring Security; Patching; Summary; Chapter 3 Preventing Problems Before They Start Choosing an Appropriate CMS for Your Needs |
Record Nr. | UNINA-9910464850703321 |
Canavan Tom | ||
Indianapolis, Ind., : Wiley Pub., c2011 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
CMS security handbook [[electronic resource] ] : the comprehensive guide for WordPress, Joomla!, Drupal, and Plone / / Tom Canavan |
Autore | Canavan Tom |
Edizione | [1st edition] |
Pubbl/distr/stampa | Indianapolis, Ind., : Wiley Pub., c2011 |
Descrizione fisica | 1 online resource (434 p.) |
Disciplina | 005.8 |
Soggetto topico |
Computer networks - Security measures
Data protection Web sites - Security measures |
ISBN |
1-283-39776-5
9786613397768 1-118-09174-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
CMS Security Handbook; Contents; Introduction; Chapter 1 Introduction to CMS Security and Operations; Target Acquired; Operational Considerations; Educating Your Employees and End Users; Raising Security Awareness; Training on Information Security Policies; Providing a Standard Protocol for Threat Reporting; Ensuring E-mail Security; Applying Patches and Updates; Being Aware and Staying Safe; Looking at Your Site Through the Eyes of a Hacker; Steps to Gaining Access to Your Site; Researching; Googling Away; Using Google Hacking Tools (Dorks); Footprinting; Using NMAP for Nefarious Means
Using TracerouteFinding Subdomains; Enumeration; Attacking and Owning the Site; Wiping Out Their Tracks; Examples of Threats; Social Engineering; Calling into Your Office; Sending in a Trusted Friend; Using USB Keys; Indiscriminate Browsing or Instant Messaging; External Media; Vendors or External Clients/Customers as the Threat; Reviewing Your Perimeter; Using Virus Protection; Banning Passwords on Desks; Enforcing a Password Complexity and Change Policy; Policing Open Wireless; Tools for Wireless Detection; How Will You Respond to an Incident?; Does Your Plan Exist?; Is the Plan Up to Date? Where Are Your Backup Tapes, Disks, and USBs?Summary; Chapter 2 Choosing the Right Hosting Company; Types of Hosting Available; Shared Hosting; Virtual Private Server (VPS); Dedicated Server; Cloud Hosting; Security of Data in a Cloud; Selecting the Right Hosting Option; Budget Considerations; Determining the Appropriate Server Size; Case 1: Light Website Traffic (Shared Hosting); Case 2: Medium Website Traffic (VPS); Case 3: Heavy Website Traffic; Using Backups; What to Look for in Web Host Security; Physical Security; Glass Windows; Flooding; Signs; People Dumpster Diving and Social EngineeringBreach Response; Terrorists; Access to Equipment; Water Detection; Fire Suppression; Emergency Procedures; Disaster Recovery and Business Continuity; Cyber Security; Firewalls and Intrusion Detection; Log File Auditing; Spam, Virus Scanning, and Prevention; Patching for Weaknesses; VoIP; Web Servers; Environmental Support; Network Redundancy; Electrical Service; Technical Support; Emergency Planning for the Host; Location of the Host's Data Center; Processes; Backups; Offsite Procedures; Accepting Credit Cards on Your Website; Understanding PCI PCI TerminologyBecoming PCI Certified; Installing an SSL Certificate; Testing by ASV; Choosing a Shopping Cart; Storing Data Securely; PCI Vulnerability Management Plan; Avoiding Common ASV Testing Pitfalls; After Certification; Domain Name System Servers; Understanding DNS; Threats to DNS; DNS (Name Server) Failure; Zone Transfers; Lack of Patching DNS Servers; DNS Poisoning; Hosting Your Own Website Server; Getting Ready; Making Your Shopping List; Choosing an Operating System; Ensuring Security; Patching; Summary; Chapter 3 Preventing Problems Before They Start Choosing an Appropriate CMS for Your Needs |
Record Nr. | UNINA-9910789334203321 |
Canavan Tom | ||
Indianapolis, Ind., : Wiley Pub., c2011 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
CMS security handbook : the comprehensive guide for WordPress, Joomla!, Drupal, and Plone / / Tom Canavan |
Autore | Canavan Tom |
Edizione | [1st edition] |
Pubbl/distr/stampa | Indianapolis, Ind., : Wiley Pub., c2011 |
Descrizione fisica | 1 online resource (434 p.) |
Disciplina | 005.8 |
Soggetto topico |
Computer networks - Security measures
Data protection Web sites - Security measures |
ISBN |
1-283-39776-5
9786613397768 1-118-09174-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
CMS Security Handbook; Contents; Introduction; Chapter 1 Introduction to CMS Security and Operations; Target Acquired; Operational Considerations; Educating Your Employees and End Users; Raising Security Awareness; Training on Information Security Policies; Providing a Standard Protocol for Threat Reporting; Ensuring E-mail Security; Applying Patches and Updates; Being Aware and Staying Safe; Looking at Your Site Through the Eyes of a Hacker; Steps to Gaining Access to Your Site; Researching; Googling Away; Using Google Hacking Tools (Dorks); Footprinting; Using NMAP for Nefarious Means
Using TracerouteFinding Subdomains; Enumeration; Attacking and Owning the Site; Wiping Out Their Tracks; Examples of Threats; Social Engineering; Calling into Your Office; Sending in a Trusted Friend; Using USB Keys; Indiscriminate Browsing or Instant Messaging; External Media; Vendors or External Clients/Customers as the Threat; Reviewing Your Perimeter; Using Virus Protection; Banning Passwords on Desks; Enforcing a Password Complexity and Change Policy; Policing Open Wireless; Tools for Wireless Detection; How Will You Respond to an Incident?; Does Your Plan Exist?; Is the Plan Up to Date? Where Are Your Backup Tapes, Disks, and USBs?Summary; Chapter 2 Choosing the Right Hosting Company; Types of Hosting Available; Shared Hosting; Virtual Private Server (VPS); Dedicated Server; Cloud Hosting; Security of Data in a Cloud; Selecting the Right Hosting Option; Budget Considerations; Determining the Appropriate Server Size; Case 1: Light Website Traffic (Shared Hosting); Case 2: Medium Website Traffic (VPS); Case 3: Heavy Website Traffic; Using Backups; What to Look for in Web Host Security; Physical Security; Glass Windows; Flooding; Signs; People Dumpster Diving and Social EngineeringBreach Response; Terrorists; Access to Equipment; Water Detection; Fire Suppression; Emergency Procedures; Disaster Recovery and Business Continuity; Cyber Security; Firewalls and Intrusion Detection; Log File Auditing; Spam, Virus Scanning, and Prevention; Patching for Weaknesses; VoIP; Web Servers; Environmental Support; Network Redundancy; Electrical Service; Technical Support; Emergency Planning for the Host; Location of the Host's Data Center; Processes; Backups; Offsite Procedures; Accepting Credit Cards on Your Website; Understanding PCI PCI TerminologyBecoming PCI Certified; Installing an SSL Certificate; Testing by ASV; Choosing a Shopping Cart; Storing Data Securely; PCI Vulnerability Management Plan; Avoiding Common ASV Testing Pitfalls; After Certification; Domain Name System Servers; Understanding DNS; Threats to DNS; DNS (Name Server) Failure; Zone Transfers; Lack of Patching DNS Servers; DNS Poisoning; Hosting Your Own Website Server; Getting Ready; Making Your Shopping List; Choosing an Operating System; Ensuring Security; Patching; Summary; Chapter 3 Preventing Problems Before They Start Choosing an Appropriate CMS for Your Needs |
Altri titoli varianti |
Comprehensive guide for WordPress, Joomla!, Drupal, and Plone
Content management systems security handbook |
Record Nr. | UNINA-9910824782203321 |
Canavan Tom | ||
Indianapolis, Ind., : Wiley Pub., c2011 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Joomla! 1.5 cookbook [[electronic resource] ] : over 60 quick and direct recipes to help you overcome common Joomla! queries / / Tom Canavan |
Autore | Canavan Tom |
Pubbl/distr/stampa | Birmingham, U.K., : Packt Pub., 2010 |
Descrizione fisica | 1 online resource (340 p.) |
Disciplina |
006.7
006.786 |
Soggetto topico | Web sites - Design |
Soggetto genere / forma | Electronic books. |
ISBN |
1-282-89692-X
9786612896927 1-84951-237-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Copyright; Credits; About the Author; About the Reviewer; Table of Contents; Preface; Chapter 1: Installing Joomla!; Introduction; Preparing to install; Setting up your database on a cPanel® host; Setting up your database on a; GoDaddy.Com® server; Installation of Joomla! 1.5; Ensuring permissions are correct; Chapter 2: Working with phpMyAdmin; Introduction; Exporting a MySQL database using; phpMyAdmin; Importing a MySQL database using; phpMyAdmin; Working with your database using; phpMyAdmin; Removing a table from your database; Removing content from a table; Chapter 3: Templates
IntroductionInstalling the template using the; administrator tool; Replacing the default administrator; template; Manual installation of a template; Using more than one template on your site; Determining your templates' module; positions; Replacing a logo in a template; Chapter 4: Editing Content and Menus; Introduction; Installing a new editor; Setting up sections; Setting up categories; Article creation; Adding new menus; Setting up a blog on your Joomla! site; Adding an extension menu; Chapter 5: Managing Links, Users, and Media; Introduction; Managing users; Setting up a site contact Working with mediaManaging the login and user experience; Web Link manager; Changing lost super admin password; Chapter 6: Managing Modules and Components; Introduction; Installing and managing components; Creating menu items for components; Installing, creating, and managing modules; Chapter 7: Managing Articles Using the K2 Content Construction Kit; Introduction; Installation and introduction of K2; Working with items AKA articles; Working with comments; Summary; Chapter 8: Installing Third-party Extensions; Introduction; Installing and using eXtplorer; Using and configuring content uploader extensionjomCalendar; Using and configuring CompojoomComment; Summary; Chapter 9: Troubleshooting; Introduction; Developing a 'troubleshooting mentality'; Summary; Chapter 10: Securing your Joomla! Site; Introduction; Setting permissions for your site; Patching; Using .htaccess and php.ini; Denying specific IP addresses; Summary; Chapter 11: Joomla! 1.6; Introduction; Joomla! 1.6 ACL; Working with new category manager; Extensions; Appendix; Usernames, passwords and database; reference sheet; Turning the legacy mode on or off; Changing the favorite icon Setting up a site in a subfolderQuestions to ask a prospective host; Checking and updating your server software; Index |
Record Nr. | UNINA-9910459098503321 |
Canavan Tom | ||
Birmingham, U.K., : Packt Pub., 2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Joomla! 1.5 cookbook [[electronic resource] ] : over 60 quick and direct recipes to help you overcome common Joomla! queries / / Tom Canavan |
Autore | Canavan Tom |
Pubbl/distr/stampa | Birmingham, U.K., : Packt Pub., 2010 |
Descrizione fisica | 1 online resource (340 p.) |
Disciplina |
006.7
006.786 |
Soggetto topico | Web sites - Design |
ISBN |
1-282-89692-X
9786612896927 1-84951-237-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Copyright; Credits; About the Author; About the Reviewer; Table of Contents; Preface; Chapter 1: Installing Joomla!; Introduction; Preparing to install; Setting up your database on a cPanel® host; Setting up your database on a; GoDaddy.Com® server; Installation of Joomla! 1.5; Ensuring permissions are correct; Chapter 2: Working with phpMyAdmin; Introduction; Exporting a MySQL database using; phpMyAdmin; Importing a MySQL database using; phpMyAdmin; Working with your database using; phpMyAdmin; Removing a table from your database; Removing content from a table; Chapter 3: Templates
IntroductionInstalling the template using the; administrator tool; Replacing the default administrator; template; Manual installation of a template; Using more than one template on your site; Determining your templates' module; positions; Replacing a logo in a template; Chapter 4: Editing Content and Menus; Introduction; Installing a new editor; Setting up sections; Setting up categories; Article creation; Adding new menus; Setting up a blog on your Joomla! site; Adding an extension menu; Chapter 5: Managing Links, Users, and Media; Introduction; Managing users; Setting up a site contact Working with mediaManaging the login and user experience; Web Link manager; Changing lost super admin password; Chapter 6: Managing Modules and Components; Introduction; Installing and managing components; Creating menu items for components; Installing, creating, and managing modules; Chapter 7: Managing Articles Using the K2 Content Construction Kit; Introduction; Installation and introduction of K2; Working with items AKA articles; Working with comments; Summary; Chapter 8: Installing Third-party Extensions; Introduction; Installing and using eXtplorer; Using and configuring content uploader extensionjomCalendar; Using and configuring CompojoomComment; Summary; Chapter 9: Troubleshooting; Introduction; Developing a 'troubleshooting mentality'; Summary; Chapter 10: Securing your Joomla! Site; Introduction; Setting permissions for your site; Patching; Using .htaccess and php.ini; Denying specific IP addresses; Summary; Chapter 11: Joomla! 1.6; Introduction; Joomla! 1.6 ACL; Working with new category manager; Extensions; Appendix; Usernames, passwords and database; reference sheet; Turning the legacy mode on or off; Changing the favorite icon Setting up a site in a subfolderQuestions to ask a prospective host; Checking and updating your server software; Index |
Record Nr. | UNINA-9910785482603321 |
Canavan Tom | ||
Birmingham, U.K., : Packt Pub., 2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Joomla! 1.5 cookbook : over 60 quick and direct recipes to help you overcome common Joomla! queries / / Tom Canavan |
Autore | Canavan Tom |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Birmingham, U.K., : Packt Pub., 2010 |
Descrizione fisica | 1 online resource (340 p.) |
Disciplina |
006.7
006.786 |
Soggetto topico | Web sites - Design |
ISBN |
1-282-89692-X
9786612896927 1-84951-237-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Copyright; Credits; About the Author; About the Reviewer; Table of Contents; Preface; Chapter 1: Installing Joomla!; Introduction; Preparing to install; Setting up your database on a cPanel® host; Setting up your database on a; GoDaddy.Com® server; Installation of Joomla! 1.5; Ensuring permissions are correct; Chapter 2: Working with phpMyAdmin; Introduction; Exporting a MySQL database using; phpMyAdmin; Importing a MySQL database using; phpMyAdmin; Working with your database using; phpMyAdmin; Removing a table from your database; Removing content from a table; Chapter 3: Templates
IntroductionInstalling the template using the; administrator tool; Replacing the default administrator; template; Manual installation of a template; Using more than one template on your site; Determining your templates' module; positions; Replacing a logo in a template; Chapter 4: Editing Content and Menus; Introduction; Installing a new editor; Setting up sections; Setting up categories; Article creation; Adding new menus; Setting up a blog on your Joomla! site; Adding an extension menu; Chapter 5: Managing Links, Users, and Media; Introduction; Managing users; Setting up a site contact Working with mediaManaging the login and user experience; Web Link manager; Changing lost super admin password; Chapter 6: Managing Modules and Components; Introduction; Installing and managing components; Creating menu items for components; Installing, creating, and managing modules; Chapter 7: Managing Articles Using the K2 Content Construction Kit; Introduction; Installation and introduction of K2; Working with items AKA articles; Working with comments; Summary; Chapter 8: Installing Third-party Extensions; Introduction; Installing and using eXtplorer; Using and configuring content uploader extensionjomCalendar; Using and configuring CompojoomComment; Summary; Chapter 9: Troubleshooting; Introduction; Developing a 'troubleshooting mentality'; Summary; Chapter 10: Securing your Joomla! Site; Introduction; Setting permissions for your site; Patching; Using .htaccess and php.ini; Denying specific IP addresses; Summary; Chapter 11: Joomla! 1.6; Introduction; Joomla! 1.6 ACL; Working with new category manager; Extensions; Appendix; Usernames, passwords and database; reference sheet; Turning the legacy mode on or off; Changing the favorite icon Setting up a site in a subfolderQuestions to ask a prospective host; Checking and updating your server software; Index |
Record Nr. | UNINA-9910821996303321 |
Canavan Tom | ||
Birmingham, U.K., : Packt Pub., 2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Joomla! web security [[electronic resource] ] : secure your Joomla! website from common security threats with this easy-to-use guide / / Tom Canavan |
Autore | Canavan Tom |
Pubbl/distr/stampa | Birmingham, U.K., : Packt Pub., c2008 |
Descrizione fisica | 1 online resource (264 p.) |
Disciplina | 005.8 |
Collana | From technologies to solutions |
Soggetto topico |
Web sites - Security measures
Computer networks - Security measures Web sites - Authoring programs Web site development |
Soggetto genere / forma | Electronic books. |
ISBN |
1-281-85616-9
9786611856168 1-84719-489-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Table of Contents; Preface; Chapter 1: Let's Get Started; Introduction; Common Terminology; Hosting-Selection and Unique Needs; What Is a Host?; Choosing a Host; Questions to Ask a Prospective Host; Facilities; Things to Ask Your Host about Facility Security; Environmental Questions about the Facility; Site Monitoring and Protection; Patching and Security; Shared Hosting; Dedicated Hosting; Architecting for a Successful Site; What Is the Purpose of Your Site?; Eleven Steps to Successful Site Architecture; Downloading Joomla!; Settings; .htaccess; Permissions; User Management
Common Trip UpsFailure to Check Vulnerability List First; Register Globals, Again; Permissions; Poor Documentation; Got Backups?; Setting Up Security Metrics; Summary; Chapter 2: Test and Development; Welcome to the Laboratory!; Test and Development Environment; What Does This Have to Do with Security?; The Evil Hamster Wheel of Upgrades; Determine the Need for Upgrade; Developing Your Test Plan; Essential Parameters for a Successful Test; Using Your Test and Development Site for Disaster Planning; Updating Your Disaster Recovery Documentation Make DR Testing a Part of Your Upgrade/Rollout CycleCrafting Good Documentation; Using a Software Development Management System; Tour of Lighthouse from Artifact Software; Reporting; Using the Ravenswood Joomla! Server; Roll-out; Summary; Chapter 3: Tools; Introduction; Tools, Tools, and More Tools; HISA; Installation Check; Web-Server Environment; Required Settings for Joomla!; Recommended Settings; Joomla Tools Suite with Services; How's Our Health?; NMAP-Network Mapping Tool from insecure.org; Wireshark; Metasploit-The Penetration Testers Tool Set; Nessus Vulnerability Scanner Why You Need NessusSummary; Chapter 4: Vulnerabilities; Introduction; Importance of Patching is Paramount; What is a Vulnerability?; Memory Corruption Vulnerabilities; SQL Injections; Command Injection Attacks; Attack Example; Why do Vulnerabilities Exist?; What Can be Done to Prevent Vulnerabilities?; Developers; Poor Testing and Planning; Forbidden; Improper Variable Sanitization and Dangerous Inputs; Not Testing in a Broad Enough Environment; Testing for Various Versions of SQL; Interactions with Other Third-Party Extensions; End Users; Social Engineering; Poor Patching and Updating SummaryChapter 5: Anatomy of Attacks; Introduction; SQL Injections; Testing for SQL Injections; A Few Methods to Prevent SQL Injections; And According to PHP.NET; Remote File Includes; The Most Basic Attempt; What Can We Do to Stop This?; Preventing RFI Attacks; Summary; Chapter 6: How the Bad Guys Do It; Laws on the Books; Acquiring Target; Sizing up the Target; Vulnerability Tools; Nessus; Nikto: An Open-Source Vulnerability Scanner; Acunetix; NMAP; Wireshark; Ping Sweep; Firewalk; Angry IP Scanner; Digital Graffiti versus Real Attacks; Finding Targets to Attack; What Do I Do Then? Countermeasures |
Record Nr. | UNINA-9910454558203321 |
Canavan Tom | ||
Birmingham, U.K., : Packt Pub., c2008 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Joomla! web security [[electronic resource] ] : secure your Joomla! website from common security threats with this easy-to-use guide / / Tom Canavan |
Autore | Canavan Tom |
Pubbl/distr/stampa | Birmingham, U.K., : Packt Pub., c2008 |
Descrizione fisica | 1 online resource (264 p.) |
Disciplina | 005.8 |
Collana | From technologies to solutions |
Soggetto topico |
Web sites - Security measures
Computer networks - Security measures Web sites - Authoring programs Web site development |
ISBN |
1-281-85616-9
9786611856168 1-84719-489-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Table of Contents; Preface; Chapter 1: Let's Get Started; Introduction; Common Terminology; Hosting-Selection and Unique Needs; What Is a Host?; Choosing a Host; Questions to Ask a Prospective Host; Facilities; Things to Ask Your Host about Facility Security; Environmental Questions about the Facility; Site Monitoring and Protection; Patching and Security; Shared Hosting; Dedicated Hosting; Architecting for a Successful Site; What Is the Purpose of Your Site?; Eleven Steps to Successful Site Architecture; Downloading Joomla!; Settings; .htaccess; Permissions; User Management
Common Trip UpsFailure to Check Vulnerability List First; Register Globals, Again; Permissions; Poor Documentation; Got Backups?; Setting Up Security Metrics; Summary; Chapter 2: Test and Development; Welcome to the Laboratory!; Test and Development Environment; What Does This Have to Do with Security?; The Evil Hamster Wheel of Upgrades; Determine the Need for Upgrade; Developing Your Test Plan; Essential Parameters for a Successful Test; Using Your Test and Development Site for Disaster Planning; Updating Your Disaster Recovery Documentation Make DR Testing a Part of Your Upgrade/Rollout CycleCrafting Good Documentation; Using a Software Development Management System; Tour of Lighthouse from Artifact Software; Reporting; Using the Ravenswood Joomla! Server; Roll-out; Summary; Chapter 3: Tools; Introduction; Tools, Tools, and More Tools; HISA; Installation Check; Web-Server Environment; Required Settings for Joomla!; Recommended Settings; Joomla Tools Suite with Services; How's Our Health?; NMAP-Network Mapping Tool from insecure.org; Wireshark; Metasploit-The Penetration Testers Tool Set; Nessus Vulnerability Scanner Why You Need NessusSummary; Chapter 4: Vulnerabilities; Introduction; Importance of Patching is Paramount; What is a Vulnerability?; Memory Corruption Vulnerabilities; SQL Injections; Command Injection Attacks; Attack Example; Why do Vulnerabilities Exist?; What Can be Done to Prevent Vulnerabilities?; Developers; Poor Testing and Planning; Forbidden; Improper Variable Sanitization and Dangerous Inputs; Not Testing in a Broad Enough Environment; Testing for Various Versions of SQL; Interactions with Other Third-Party Extensions; End Users; Social Engineering; Poor Patching and Updating SummaryChapter 5: Anatomy of Attacks; Introduction; SQL Injections; Testing for SQL Injections; A Few Methods to Prevent SQL Injections; And According to PHP.NET; Remote File Includes; The Most Basic Attempt; What Can We Do to Stop This?; Preventing RFI Attacks; Summary; Chapter 6: How the Bad Guys Do It; Laws on the Books; Acquiring Target; Sizing up the Target; Vulnerability Tools; Nessus; Nikto: An Open-Source Vulnerability Scanner; Acunetix; NMAP; Wireshark; Ping Sweep; Firewalk; Angry IP Scanner; Digital Graffiti versus Real Attacks; Finding Targets to Attack; What Do I Do Then? Countermeasures |
Record Nr. | UNINA-9910777901703321 |
Canavan Tom | ||
Birmingham, U.K., : Packt Pub., c2008 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Joomla! web security : secure your Joomla! website from common security threats with this easy-to-use guide / / Tom Canavan |
Autore | Canavan Tom |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Birmingham, U.K., : Packt Pub., c2008 |
Descrizione fisica | 1 online resource (264 p.) |
Disciplina | 005.8 |
Collana | From technologies to solutions |
Soggetto topico |
Web sites - Security measures
Computer networks - Security measures Web sites - Authoring programs Web site development |
ISBN |
1-281-85616-9
9786611856168 1-84719-489-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Table of Contents; Preface; Chapter 1: Let's Get Started; Introduction; Common Terminology; Hosting-Selection and Unique Needs; What Is a Host?; Choosing a Host; Questions to Ask a Prospective Host; Facilities; Things to Ask Your Host about Facility Security; Environmental Questions about the Facility; Site Monitoring and Protection; Patching and Security; Shared Hosting; Dedicated Hosting; Architecting for a Successful Site; What Is the Purpose of Your Site?; Eleven Steps to Successful Site Architecture; Downloading Joomla!; Settings; .htaccess; Permissions; User Management
Common Trip UpsFailure to Check Vulnerability List First; Register Globals, Again; Permissions; Poor Documentation; Got Backups?; Setting Up Security Metrics; Summary; Chapter 2: Test and Development; Welcome to the Laboratory!; Test and Development Environment; What Does This Have to Do with Security?; The Evil Hamster Wheel of Upgrades; Determine the Need for Upgrade; Developing Your Test Plan; Essential Parameters for a Successful Test; Using Your Test and Development Site for Disaster Planning; Updating Your Disaster Recovery Documentation Make DR Testing a Part of Your Upgrade/Rollout CycleCrafting Good Documentation; Using a Software Development Management System; Tour of Lighthouse from Artifact Software; Reporting; Using the Ravenswood Joomla! Server; Roll-out; Summary; Chapter 3: Tools; Introduction; Tools, Tools, and More Tools; HISA; Installation Check; Web-Server Environment; Required Settings for Joomla!; Recommended Settings; Joomla Tools Suite with Services; How's Our Health?; NMAP-Network Mapping Tool from insecure.org; Wireshark; Metasploit-The Penetration Testers Tool Set; Nessus Vulnerability Scanner Why You Need NessusSummary; Chapter 4: Vulnerabilities; Introduction; Importance of Patching is Paramount; What is a Vulnerability?; Memory Corruption Vulnerabilities; SQL Injections; Command Injection Attacks; Attack Example; Why do Vulnerabilities Exist?; What Can be Done to Prevent Vulnerabilities?; Developers; Poor Testing and Planning; Forbidden; Improper Variable Sanitization and Dangerous Inputs; Not Testing in a Broad Enough Environment; Testing for Various Versions of SQL; Interactions with Other Third-Party Extensions; End Users; Social Engineering; Poor Patching and Updating SummaryChapter 5: Anatomy of Attacks; Introduction; SQL Injections; Testing for SQL Injections; A Few Methods to Prevent SQL Injections; And According to PHP.NET; Remote File Includes; The Most Basic Attempt; What Can We Do to Stop This?; Preventing RFI Attacks; Summary; Chapter 6: How the Bad Guys Do It; Laws on the Books; Acquiring Target; Sizing up the Target; Vulnerability Tools; Nessus; Nikto: An Open-Source Vulnerability Scanner; Acunetix; NMAP; Wireshark; Ping Sweep; Firewalk; Angry IP Scanner; Digital Graffiti versus Real Attacks; Finding Targets to Attack; What Do I Do Then? Countermeasures |
Record Nr. | UNINA-9910813826203321 |
Canavan Tom | ||
Birmingham, U.K., : Packt Pub., c2008 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|