top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
CMS security handbook [[electronic resource] ] : the comprehensive guide for WordPress, Joomla!, Drupal, and Plone / / Tom Canavan
CMS security handbook [[electronic resource] ] : the comprehensive guide for WordPress, Joomla!, Drupal, and Plone / / Tom Canavan
Autore Canavan Tom
Edizione [1st edition]
Pubbl/distr/stampa Indianapolis, Ind., : Wiley Pub., c2011
Descrizione fisica 1 online resource (434 p.)
Disciplina 005.8
Soggetto topico Computer networks - Security measures
Data protection
Web sites - Security measures
Soggetto genere / forma Electronic books.
ISBN 1-283-39776-5
9786613397768
1-118-09174-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto CMS Security Handbook; Contents; Introduction; Chapter 1 Introduction to CMS Security and Operations; Target Acquired; Operational Considerations; Educating Your Employees and End Users; Raising Security Awareness; Training on Information Security Policies; Providing a Standard Protocol for Threat Reporting; Ensuring E-mail Security; Applying Patches and Updates; Being Aware and Staying Safe; Looking at Your Site Through the Eyes of a Hacker; Steps to Gaining Access to Your Site; Researching; Googling Away; Using Google Hacking Tools (Dorks); Footprinting; Using NMAP for Nefarious Means
Using TracerouteFinding Subdomains; Enumeration; Attacking and Owning the Site; Wiping Out Their Tracks; Examples of Threats; Social Engineering; Calling into Your Office; Sending in a Trusted Friend; Using USB Keys; Indiscriminate Browsing or Instant Messaging; External Media; Vendors or External Clients/Customers as the Threat; Reviewing Your Perimeter; Using Virus Protection; Banning Passwords on Desks; Enforcing a Password Complexity and Change Policy; Policing Open Wireless; Tools for Wireless Detection; How Will You Respond to an Incident?; Does Your Plan Exist?; Is the Plan Up to Date?
Where Are Your Backup Tapes, Disks, and USBs?Summary; Chapter 2 Choosing the Right Hosting Company; Types of Hosting Available; Shared Hosting; Virtual Private Server (VPS); Dedicated Server; Cloud Hosting; Security of Data in a Cloud; Selecting the Right Hosting Option; Budget Considerations; Determining the Appropriate Server Size; Case 1: Light Website Traffic (Shared Hosting); Case 2: Medium Website Traffic (VPS); Case 3: Heavy Website Traffic; Using Backups; What to Look for in Web Host Security; Physical Security; Glass Windows; Flooding; Signs; People
Dumpster Diving and Social EngineeringBreach Response; Terrorists; Access to Equipment; Water Detection; Fire Suppression; Emergency Procedures; Disaster Recovery and Business Continuity; Cyber Security; Firewalls and Intrusion Detection; Log File Auditing; Spam, Virus Scanning, and Prevention; Patching for Weaknesses; VoIP; Web Servers; Environmental Support; Network Redundancy; Electrical Service; Technical Support; Emergency Planning for the Host; Location of the Host's Data Center; Processes; Backups; Offsite Procedures; Accepting Credit Cards on Your Website; Understanding PCI
PCI TerminologyBecoming PCI Certified; Installing an SSL Certificate; Testing by ASV; Choosing a Shopping Cart; Storing Data Securely; PCI Vulnerability Management Plan; Avoiding Common ASV Testing Pitfalls; After Certification; Domain Name System Servers; Understanding DNS; Threats to DNS; DNS (Name Server) Failure; Zone Transfers; Lack of Patching DNS Servers; DNS Poisoning; Hosting Your Own Website Server; Getting Ready; Making Your Shopping List; Choosing an Operating System; Ensuring Security; Patching; Summary; Chapter 3 Preventing Problems Before They Start
Choosing an Appropriate CMS for Your Needs
Record Nr. UNINA-9910464850703321
Canavan Tom  
Indianapolis, Ind., : Wiley Pub., c2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
CMS security handbook [[electronic resource] ] : the comprehensive guide for WordPress, Joomla!, Drupal, and Plone / / Tom Canavan
CMS security handbook [[electronic resource] ] : the comprehensive guide for WordPress, Joomla!, Drupal, and Plone / / Tom Canavan
Autore Canavan Tom
Edizione [1st edition]
Pubbl/distr/stampa Indianapolis, Ind., : Wiley Pub., c2011
Descrizione fisica 1 online resource (434 p.)
Disciplina 005.8
Soggetto topico Computer networks - Security measures
Data protection
Web sites - Security measures
ISBN 1-283-39776-5
9786613397768
1-118-09174-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto CMS Security Handbook; Contents; Introduction; Chapter 1 Introduction to CMS Security and Operations; Target Acquired; Operational Considerations; Educating Your Employees and End Users; Raising Security Awareness; Training on Information Security Policies; Providing a Standard Protocol for Threat Reporting; Ensuring E-mail Security; Applying Patches and Updates; Being Aware and Staying Safe; Looking at Your Site Through the Eyes of a Hacker; Steps to Gaining Access to Your Site; Researching; Googling Away; Using Google Hacking Tools (Dorks); Footprinting; Using NMAP for Nefarious Means
Using TracerouteFinding Subdomains; Enumeration; Attacking and Owning the Site; Wiping Out Their Tracks; Examples of Threats; Social Engineering; Calling into Your Office; Sending in a Trusted Friend; Using USB Keys; Indiscriminate Browsing or Instant Messaging; External Media; Vendors or External Clients/Customers as the Threat; Reviewing Your Perimeter; Using Virus Protection; Banning Passwords on Desks; Enforcing a Password Complexity and Change Policy; Policing Open Wireless; Tools for Wireless Detection; How Will You Respond to an Incident?; Does Your Plan Exist?; Is the Plan Up to Date?
Where Are Your Backup Tapes, Disks, and USBs?Summary; Chapter 2 Choosing the Right Hosting Company; Types of Hosting Available; Shared Hosting; Virtual Private Server (VPS); Dedicated Server; Cloud Hosting; Security of Data in a Cloud; Selecting the Right Hosting Option; Budget Considerations; Determining the Appropriate Server Size; Case 1: Light Website Traffic (Shared Hosting); Case 2: Medium Website Traffic (VPS); Case 3: Heavy Website Traffic; Using Backups; What to Look for in Web Host Security; Physical Security; Glass Windows; Flooding; Signs; People
Dumpster Diving and Social EngineeringBreach Response; Terrorists; Access to Equipment; Water Detection; Fire Suppression; Emergency Procedures; Disaster Recovery and Business Continuity; Cyber Security; Firewalls and Intrusion Detection; Log File Auditing; Spam, Virus Scanning, and Prevention; Patching for Weaknesses; VoIP; Web Servers; Environmental Support; Network Redundancy; Electrical Service; Technical Support; Emergency Planning for the Host; Location of the Host's Data Center; Processes; Backups; Offsite Procedures; Accepting Credit Cards on Your Website; Understanding PCI
PCI TerminologyBecoming PCI Certified; Installing an SSL Certificate; Testing by ASV; Choosing a Shopping Cart; Storing Data Securely; PCI Vulnerability Management Plan; Avoiding Common ASV Testing Pitfalls; After Certification; Domain Name System Servers; Understanding DNS; Threats to DNS; DNS (Name Server) Failure; Zone Transfers; Lack of Patching DNS Servers; DNS Poisoning; Hosting Your Own Website Server; Getting Ready; Making Your Shopping List; Choosing an Operating System; Ensuring Security; Patching; Summary; Chapter 3 Preventing Problems Before They Start
Choosing an Appropriate CMS for Your Needs
Record Nr. UNINA-9910789334203321
Canavan Tom  
Indianapolis, Ind., : Wiley Pub., c2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
CMS security handbook [[electronic resource] ] : the comprehensive guide for WordPress, Joomla!, Drupal, and Plone / / Tom Canavan
CMS security handbook [[electronic resource] ] : the comprehensive guide for WordPress, Joomla!, Drupal, and Plone / / Tom Canavan
Autore Canavan Tom
Edizione [1st edition]
Pubbl/distr/stampa Indianapolis, Ind., : Wiley Pub., c2011
Descrizione fisica 1 online resource (434 p.)
Disciplina 005.8
Soggetto topico Computer networks - Security measures
Data protection
Web sites - Security measures
ISBN 1-283-39776-5
9786613397768
1-118-09174-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto CMS Security Handbook; Contents; Introduction; Chapter 1 Introduction to CMS Security and Operations; Target Acquired; Operational Considerations; Educating Your Employees and End Users; Raising Security Awareness; Training on Information Security Policies; Providing a Standard Protocol for Threat Reporting; Ensuring E-mail Security; Applying Patches and Updates; Being Aware and Staying Safe; Looking at Your Site Through the Eyes of a Hacker; Steps to Gaining Access to Your Site; Researching; Googling Away; Using Google Hacking Tools (Dorks); Footprinting; Using NMAP for Nefarious Means
Using TracerouteFinding Subdomains; Enumeration; Attacking and Owning the Site; Wiping Out Their Tracks; Examples of Threats; Social Engineering; Calling into Your Office; Sending in a Trusted Friend; Using USB Keys; Indiscriminate Browsing or Instant Messaging; External Media; Vendors or External Clients/Customers as the Threat; Reviewing Your Perimeter; Using Virus Protection; Banning Passwords on Desks; Enforcing a Password Complexity and Change Policy; Policing Open Wireless; Tools for Wireless Detection; How Will You Respond to an Incident?; Does Your Plan Exist?; Is the Plan Up to Date?
Where Are Your Backup Tapes, Disks, and USBs?Summary; Chapter 2 Choosing the Right Hosting Company; Types of Hosting Available; Shared Hosting; Virtual Private Server (VPS); Dedicated Server; Cloud Hosting; Security of Data in a Cloud; Selecting the Right Hosting Option; Budget Considerations; Determining the Appropriate Server Size; Case 1: Light Website Traffic (Shared Hosting); Case 2: Medium Website Traffic (VPS); Case 3: Heavy Website Traffic; Using Backups; What to Look for in Web Host Security; Physical Security; Glass Windows; Flooding; Signs; People
Dumpster Diving and Social EngineeringBreach Response; Terrorists; Access to Equipment; Water Detection; Fire Suppression; Emergency Procedures; Disaster Recovery and Business Continuity; Cyber Security; Firewalls and Intrusion Detection; Log File Auditing; Spam, Virus Scanning, and Prevention; Patching for Weaknesses; VoIP; Web Servers; Environmental Support; Network Redundancy; Electrical Service; Technical Support; Emergency Planning for the Host; Location of the Host's Data Center; Processes; Backups; Offsite Procedures; Accepting Credit Cards on Your Website; Understanding PCI
PCI TerminologyBecoming PCI Certified; Installing an SSL Certificate; Testing by ASV; Choosing a Shopping Cart; Storing Data Securely; PCI Vulnerability Management Plan; Avoiding Common ASV Testing Pitfalls; After Certification; Domain Name System Servers; Understanding DNS; Threats to DNS; DNS (Name Server) Failure; Zone Transfers; Lack of Patching DNS Servers; DNS Poisoning; Hosting Your Own Website Server; Getting Ready; Making Your Shopping List; Choosing an Operating System; Ensuring Security; Patching; Summary; Chapter 3 Preventing Problems Before They Start
Choosing an Appropriate CMS for Your Needs
Record Nr. UNINA-9910824782203321
Canavan Tom  
Indianapolis, Ind., : Wiley Pub., c2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Joomla! 1.5 cookbook [[electronic resource] ] : over 60 quick and direct recipes to help you overcome common Joomla! queries / / Tom Canavan
Joomla! 1.5 cookbook [[electronic resource] ] : over 60 quick and direct recipes to help you overcome common Joomla! queries / / Tom Canavan
Autore Canavan Tom
Pubbl/distr/stampa Birmingham, U.K., : Packt Pub., 2010
Descrizione fisica 1 online resource (340 p.)
Disciplina 006.7
006.786
Soggetto topico Web sites - Design
Soggetto genere / forma Electronic books.
ISBN 1-282-89692-X
9786612896927
1-84951-237-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Copyright; Credits; About the Author; About the Reviewer; Table of Contents; Preface; Chapter 1: Installing Joomla!; Introduction; Preparing to install; Setting up your database on a cPanel® host; Setting up your database on a; GoDaddy.Com® server; Installation of Joomla! 1.5; Ensuring permissions are correct; Chapter 2: Working with phpMyAdmin; Introduction; Exporting a MySQL database using; phpMyAdmin; Importing a MySQL database using; phpMyAdmin; Working with your database using; phpMyAdmin; Removing a table from your database; Removing content from a table; Chapter 3: Templates
IntroductionInstalling the template using the; administrator tool; Replacing the default administrator; template; Manual installation of a template; Using more than one template on your site; Determining your templates' module; positions; Replacing a logo in a template; Chapter 4: Editing Content and Menus; Introduction; Installing a new editor; Setting up sections; Setting up categories; Article creation; Adding new menus; Setting up a blog on your Joomla! site; Adding an extension menu; Chapter 5: Managing Links, Users, and Media; Introduction; Managing users; Setting up a site contact
Working with mediaManaging the login and user experience; Web Link manager; Changing lost super admin password; Chapter 6: Managing Modules and Components; Introduction; Installing and managing components; Creating menu items for components; Installing, creating, and managing modules; Chapter 7: Managing Articles Using the K2 Content Construction Kit; Introduction; Installation and introduction of K2; Working with items AKA articles; Working with comments; Summary; Chapter 8: Installing Third-party Extensions; Introduction; Installing and using eXtplorer; Using and configuring content
uploader extensionjomCalendar; Using and configuring CompojoomComment; Summary; Chapter 9: Troubleshooting; Introduction; Developing a 'troubleshooting mentality'; Summary; Chapter 10: Securing your Joomla! Site; Introduction; Setting permissions for your site; Patching; Using .htaccess and php.ini; Denying specific IP addresses; Summary; Chapter 11: Joomla! 1.6; Introduction; Joomla! 1.6 ACL; Working with new category manager; Extensions; Appendix; Usernames, passwords and database; reference sheet; Turning the legacy mode on or off; Changing the favorite icon
Setting up a site in a subfolderQuestions to ask a prospective host; Checking and updating your server software; Index
Record Nr. UNINA-9910459098503321
Canavan Tom  
Birmingham, U.K., : Packt Pub., 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Joomla! 1.5 cookbook [[electronic resource] ] : over 60 quick and direct recipes to help you overcome common Joomla! queries / / Tom Canavan
Joomla! 1.5 cookbook [[electronic resource] ] : over 60 quick and direct recipes to help you overcome common Joomla! queries / / Tom Canavan
Autore Canavan Tom
Pubbl/distr/stampa Birmingham, U.K., : Packt Pub., 2010
Descrizione fisica 1 online resource (340 p.)
Disciplina 006.7
006.786
Soggetto topico Web sites - Design
ISBN 1-282-89692-X
9786612896927
1-84951-237-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Copyright; Credits; About the Author; About the Reviewer; Table of Contents; Preface; Chapter 1: Installing Joomla!; Introduction; Preparing to install; Setting up your database on a cPanel® host; Setting up your database on a; GoDaddy.Com® server; Installation of Joomla! 1.5; Ensuring permissions are correct; Chapter 2: Working with phpMyAdmin; Introduction; Exporting a MySQL database using; phpMyAdmin; Importing a MySQL database using; phpMyAdmin; Working with your database using; phpMyAdmin; Removing a table from your database; Removing content from a table; Chapter 3: Templates
IntroductionInstalling the template using the; administrator tool; Replacing the default administrator; template; Manual installation of a template; Using more than one template on your site; Determining your templates' module; positions; Replacing a logo in a template; Chapter 4: Editing Content and Menus; Introduction; Installing a new editor; Setting up sections; Setting up categories; Article creation; Adding new menus; Setting up a blog on your Joomla! site; Adding an extension menu; Chapter 5: Managing Links, Users, and Media; Introduction; Managing users; Setting up a site contact
Working with mediaManaging the login and user experience; Web Link manager; Changing lost super admin password; Chapter 6: Managing Modules and Components; Introduction; Installing and managing components; Creating menu items for components; Installing, creating, and managing modules; Chapter 7: Managing Articles Using the K2 Content Construction Kit; Introduction; Installation and introduction of K2; Working with items AKA articles; Working with comments; Summary; Chapter 8: Installing Third-party Extensions; Introduction; Installing and using eXtplorer; Using and configuring content
uploader extensionjomCalendar; Using and configuring CompojoomComment; Summary; Chapter 9: Troubleshooting; Introduction; Developing a 'troubleshooting mentality'; Summary; Chapter 10: Securing your Joomla! Site; Introduction; Setting permissions for your site; Patching; Using .htaccess and php.ini; Denying specific IP addresses; Summary; Chapter 11: Joomla! 1.6; Introduction; Joomla! 1.6 ACL; Working with new category manager; Extensions; Appendix; Usernames, passwords and database; reference sheet; Turning the legacy mode on or off; Changing the favorite icon
Setting up a site in a subfolderQuestions to ask a prospective host; Checking and updating your server software; Index
Record Nr. UNINA-9910785482603321
Canavan Tom  
Birmingham, U.K., : Packt Pub., 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Joomla! 1.5 cookbook : over 60 quick and direct recipes to help you overcome common Joomla! queries / / Tom Canavan
Joomla! 1.5 cookbook : over 60 quick and direct recipes to help you overcome common Joomla! queries / / Tom Canavan
Autore Canavan Tom
Edizione [1st ed.]
Pubbl/distr/stampa Birmingham, U.K., : Packt Pub., 2010
Descrizione fisica 1 online resource (340 p.)
Disciplina 006.7
006.786
Soggetto topico Web sites - Design
ISBN 1-282-89692-X
9786612896927
1-84951-237-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Copyright; Credits; About the Author; About the Reviewer; Table of Contents; Preface; Chapter 1: Installing Joomla!; Introduction; Preparing to install; Setting up your database on a cPanel® host; Setting up your database on a; GoDaddy.Com® server; Installation of Joomla! 1.5; Ensuring permissions are correct; Chapter 2: Working with phpMyAdmin; Introduction; Exporting a MySQL database using; phpMyAdmin; Importing a MySQL database using; phpMyAdmin; Working with your database using; phpMyAdmin; Removing a table from your database; Removing content from a table; Chapter 3: Templates
IntroductionInstalling the template using the; administrator tool; Replacing the default administrator; template; Manual installation of a template; Using more than one template on your site; Determining your templates' module; positions; Replacing a logo in a template; Chapter 4: Editing Content and Menus; Introduction; Installing a new editor; Setting up sections; Setting up categories; Article creation; Adding new menus; Setting up a blog on your Joomla! site; Adding an extension menu; Chapter 5: Managing Links, Users, and Media; Introduction; Managing users; Setting up a site contact
Working with mediaManaging the login and user experience; Web Link manager; Changing lost super admin password; Chapter 6: Managing Modules and Components; Introduction; Installing and managing components; Creating menu items for components; Installing, creating, and managing modules; Chapter 7: Managing Articles Using the K2 Content Construction Kit; Introduction; Installation and introduction of K2; Working with items AKA articles; Working with comments; Summary; Chapter 8: Installing Third-party Extensions; Introduction; Installing and using eXtplorer; Using and configuring content
uploader extensionjomCalendar; Using and configuring CompojoomComment; Summary; Chapter 9: Troubleshooting; Introduction; Developing a 'troubleshooting mentality'; Summary; Chapter 10: Securing your Joomla! Site; Introduction; Setting permissions for your site; Patching; Using .htaccess and php.ini; Denying specific IP addresses; Summary; Chapter 11: Joomla! 1.6; Introduction; Joomla! 1.6 ACL; Working with new category manager; Extensions; Appendix; Usernames, passwords and database; reference sheet; Turning the legacy mode on or off; Changing the favorite icon
Setting up a site in a subfolderQuestions to ask a prospective host; Checking and updating your server software; Index
Record Nr. UNINA-9910821996303321
Canavan Tom  
Birmingham, U.K., : Packt Pub., 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Joomla! web security [[electronic resource] ] : secure your Joomla! website from common security threats with this easy-to-use guide / / Tom Canavan
Joomla! web security [[electronic resource] ] : secure your Joomla! website from common security threats with this easy-to-use guide / / Tom Canavan
Autore Canavan Tom
Pubbl/distr/stampa Birmingham, U.K., : Packt Pub., c2008
Descrizione fisica 1 online resource (264 p.)
Disciplina 005.8
Collana From technologies to solutions
Soggetto topico Web sites - Security measures
Computer networks - Security measures
Web sites - Authoring programs
Web site development
Soggetto genere / forma Electronic books.
ISBN 1-281-85616-9
9786611856168
1-84719-489-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Table of Contents; Preface; Chapter 1: Let's Get Started; Introduction; Common Terminology; Hosting-Selection and Unique Needs; What Is a Host?; Choosing a Host; Questions to Ask a Prospective Host; Facilities; Things to Ask Your Host about Facility Security; Environmental Questions about the Facility; Site Monitoring and Protection; Patching and Security; Shared Hosting; Dedicated Hosting; Architecting for a Successful Site; What Is the Purpose of Your Site?; Eleven Steps to Successful Site Architecture; Downloading Joomla!; Settings; .htaccess; Permissions; User Management
Common Trip UpsFailure to Check Vulnerability List First; Register Globals, Again; Permissions; Poor Documentation; Got Backups?; Setting Up Security Metrics; Summary; Chapter 2: Test and Development; Welcome to the Laboratory!; Test and Development Environment; What Does This Have to Do with Security?; The Evil Hamster Wheel of Upgrades; Determine the Need for Upgrade; Developing Your Test Plan; Essential Parameters for a Successful Test; Using Your Test and Development Site for Disaster Planning; Updating Your Disaster Recovery Documentation
Make DR Testing a Part of Your Upgrade/Rollout CycleCrafting Good Documentation; Using a Software Development Management System; Tour of Lighthouse from Artifact Software; Reporting; Using the Ravenswood Joomla! Server; Roll-out; Summary; Chapter 3: Tools; Introduction; Tools, Tools, and More Tools; HISA; Installation Check; Web-Server Environment; Required Settings for Joomla!; Recommended Settings; Joomla Tools Suite with Services; How's Our Health?; NMAP-Network Mapping Tool from insecure.org; Wireshark; Metasploit-The Penetration Testers Tool Set; Nessus Vulnerability Scanner
Why You Need NessusSummary; Chapter 4: Vulnerabilities; Introduction; Importance of Patching is Paramount; What is a Vulnerability?; Memory Corruption Vulnerabilities; SQL Injections; Command Injection Attacks; Attack Example; Why do Vulnerabilities Exist?; What Can be Done to Prevent Vulnerabilities?; Developers; Poor Testing and Planning; Forbidden; Improper Variable Sanitization and Dangerous Inputs; Not Testing in a Broad Enough Environment; Testing for Various Versions of SQL; Interactions with Other Third-Party Extensions; End Users; Social Engineering; Poor Patching and Updating
SummaryChapter 5: Anatomy of Attacks; Introduction; SQL Injections; Testing for SQL Injections; A Few Methods to Prevent SQL Injections; And According to PHP.NET; Remote File Includes; The Most Basic Attempt; What Can We Do to Stop This?; Preventing RFI Attacks; Summary; Chapter 6: How the Bad Guys Do It; Laws on the Books; Acquiring Target; Sizing up the Target; Vulnerability Tools; Nessus; Nikto: An Open-Source Vulnerability Scanner; Acunetix; NMAP; Wireshark; Ping Sweep; Firewalk; Angry IP Scanner; Digital Graffiti versus Real Attacks; Finding Targets to Attack; What Do I Do Then?
Countermeasures
Record Nr. UNINA-9910454558203321
Canavan Tom  
Birmingham, U.K., : Packt Pub., c2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Joomla! web security [[electronic resource] ] : secure your Joomla! website from common security threats with this easy-to-use guide / / Tom Canavan
Joomla! web security [[electronic resource] ] : secure your Joomla! website from common security threats with this easy-to-use guide / / Tom Canavan
Autore Canavan Tom
Pubbl/distr/stampa Birmingham, U.K., : Packt Pub., c2008
Descrizione fisica 1 online resource (264 p.)
Disciplina 005.8
Collana From technologies to solutions
Soggetto topico Web sites - Security measures
Computer networks - Security measures
Web sites - Authoring programs
Web site development
ISBN 1-281-85616-9
9786611856168
1-84719-489-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Table of Contents; Preface; Chapter 1: Let's Get Started; Introduction; Common Terminology; Hosting-Selection and Unique Needs; What Is a Host?; Choosing a Host; Questions to Ask a Prospective Host; Facilities; Things to Ask Your Host about Facility Security; Environmental Questions about the Facility; Site Monitoring and Protection; Patching and Security; Shared Hosting; Dedicated Hosting; Architecting for a Successful Site; What Is the Purpose of Your Site?; Eleven Steps to Successful Site Architecture; Downloading Joomla!; Settings; .htaccess; Permissions; User Management
Common Trip UpsFailure to Check Vulnerability List First; Register Globals, Again; Permissions; Poor Documentation; Got Backups?; Setting Up Security Metrics; Summary; Chapter 2: Test and Development; Welcome to the Laboratory!; Test and Development Environment; What Does This Have to Do with Security?; The Evil Hamster Wheel of Upgrades; Determine the Need for Upgrade; Developing Your Test Plan; Essential Parameters for a Successful Test; Using Your Test and Development Site for Disaster Planning; Updating Your Disaster Recovery Documentation
Make DR Testing a Part of Your Upgrade/Rollout CycleCrafting Good Documentation; Using a Software Development Management System; Tour of Lighthouse from Artifact Software; Reporting; Using the Ravenswood Joomla! Server; Roll-out; Summary; Chapter 3: Tools; Introduction; Tools, Tools, and More Tools; HISA; Installation Check; Web-Server Environment; Required Settings for Joomla!; Recommended Settings; Joomla Tools Suite with Services; How's Our Health?; NMAP-Network Mapping Tool from insecure.org; Wireshark; Metasploit-The Penetration Testers Tool Set; Nessus Vulnerability Scanner
Why You Need NessusSummary; Chapter 4: Vulnerabilities; Introduction; Importance of Patching is Paramount; What is a Vulnerability?; Memory Corruption Vulnerabilities; SQL Injections; Command Injection Attacks; Attack Example; Why do Vulnerabilities Exist?; What Can be Done to Prevent Vulnerabilities?; Developers; Poor Testing and Planning; Forbidden; Improper Variable Sanitization and Dangerous Inputs; Not Testing in a Broad Enough Environment; Testing for Various Versions of SQL; Interactions with Other Third-Party Extensions; End Users; Social Engineering; Poor Patching and Updating
SummaryChapter 5: Anatomy of Attacks; Introduction; SQL Injections; Testing for SQL Injections; A Few Methods to Prevent SQL Injections; And According to PHP.NET; Remote File Includes; The Most Basic Attempt; What Can We Do to Stop This?; Preventing RFI Attacks; Summary; Chapter 6: How the Bad Guys Do It; Laws on the Books; Acquiring Target; Sizing up the Target; Vulnerability Tools; Nessus; Nikto: An Open-Source Vulnerability Scanner; Acunetix; NMAP; Wireshark; Ping Sweep; Firewalk; Angry IP Scanner; Digital Graffiti versus Real Attacks; Finding Targets to Attack; What Do I Do Then?
Countermeasures
Record Nr. UNINA-9910777901703321
Canavan Tom  
Birmingham, U.K., : Packt Pub., c2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Joomla! web security : secure your Joomla! website from common security threats with this easy-to-use guide / / Tom Canavan
Joomla! web security : secure your Joomla! website from common security threats with this easy-to-use guide / / Tom Canavan
Autore Canavan Tom
Edizione [1st ed.]
Pubbl/distr/stampa Birmingham, U.K., : Packt Pub., c2008
Descrizione fisica 1 online resource (264 p.)
Disciplina 005.8
Collana From technologies to solutions
Soggetto topico Web sites - Security measures
Computer networks - Security measures
Web sites - Authoring programs
Web site development
ISBN 1-281-85616-9
9786611856168
1-84719-489-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Table of Contents; Preface; Chapter 1: Let's Get Started; Introduction; Common Terminology; Hosting-Selection and Unique Needs; What Is a Host?; Choosing a Host; Questions to Ask a Prospective Host; Facilities; Things to Ask Your Host about Facility Security; Environmental Questions about the Facility; Site Monitoring and Protection; Patching and Security; Shared Hosting; Dedicated Hosting; Architecting for a Successful Site; What Is the Purpose of Your Site?; Eleven Steps to Successful Site Architecture; Downloading Joomla!; Settings; .htaccess; Permissions; User Management
Common Trip UpsFailure to Check Vulnerability List First; Register Globals, Again; Permissions; Poor Documentation; Got Backups?; Setting Up Security Metrics; Summary; Chapter 2: Test and Development; Welcome to the Laboratory!; Test and Development Environment; What Does This Have to Do with Security?; The Evil Hamster Wheel of Upgrades; Determine the Need for Upgrade; Developing Your Test Plan; Essential Parameters for a Successful Test; Using Your Test and Development Site for Disaster Planning; Updating Your Disaster Recovery Documentation
Make DR Testing a Part of Your Upgrade/Rollout CycleCrafting Good Documentation; Using a Software Development Management System; Tour of Lighthouse from Artifact Software; Reporting; Using the Ravenswood Joomla! Server; Roll-out; Summary; Chapter 3: Tools; Introduction; Tools, Tools, and More Tools; HISA; Installation Check; Web-Server Environment; Required Settings for Joomla!; Recommended Settings; Joomla Tools Suite with Services; How's Our Health?; NMAP-Network Mapping Tool from insecure.org; Wireshark; Metasploit-The Penetration Testers Tool Set; Nessus Vulnerability Scanner
Why You Need NessusSummary; Chapter 4: Vulnerabilities; Introduction; Importance of Patching is Paramount; What is a Vulnerability?; Memory Corruption Vulnerabilities; SQL Injections; Command Injection Attacks; Attack Example; Why do Vulnerabilities Exist?; What Can be Done to Prevent Vulnerabilities?; Developers; Poor Testing and Planning; Forbidden; Improper Variable Sanitization and Dangerous Inputs; Not Testing in a Broad Enough Environment; Testing for Various Versions of SQL; Interactions with Other Third-Party Extensions; End Users; Social Engineering; Poor Patching and Updating
SummaryChapter 5: Anatomy of Attacks; Introduction; SQL Injections; Testing for SQL Injections; A Few Methods to Prevent SQL Injections; And According to PHP.NET; Remote File Includes; The Most Basic Attempt; What Can We Do to Stop This?; Preventing RFI Attacks; Summary; Chapter 6: How the Bad Guys Do It; Laws on the Books; Acquiring Target; Sizing up the Target; Vulnerability Tools; Nessus; Nikto: An Open-Source Vulnerability Scanner; Acunetix; NMAP; Wireshark; Ping Sweep; Firewalk; Angry IP Scanner; Digital Graffiti versus Real Attacks; Finding Targets to Attack; What Do I Do Then?
Countermeasures
Record Nr. UNINA-9910813826203321
Canavan Tom  
Birmingham, U.K., : Packt Pub., c2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui