Résumé
Protect your entire IIS Web environment from both "insider and outsider" security threats
Safeguard your Web site and all its services with help from this detailed guide. After studying common Web site vulnerabilities--for both Internet and intranets--you'll find out how to plan and implement an effective and complete security framework that will prevent Denial of Service attacks, hacker intrusions, and malicious code breaches including Trojans, viruses, and worms. Learn to properly configure IIS security features and discover the ins and outs of auditing. This definitive guide will help you proactively manage your IIS Web environment to minimize future security risks. Focused, practical, and authoritative, this book shows you everything you need to secure IIS servers using real-life security challenges with proven solutions, security alerts, implementation techniques, and security check lists.
- Resolve physical, environmental, network, and security policy issues and manage responsibilities of multi-level administration
- Identify security vulnerabilities and learn the methods and tools that hackers use so you can better defend against them
- Harden your server by removing unnecessary services, modifying default accounts, setting safe policies, and configuring secure access control
- Set rules for authentication, IP filtering, network address translation, and domain restrictions
- Use VPNs, SSL encryption, and public key cryptography (PKI) effectively
- Monitor Web site activity through system logs and auditing policies to guard against potential attacks
- Ensure safe use of scripts and Active Server Pages
- Secure all IIS services including FTP, SMTP, and NNTP
- Explore how the "privacy factor" affects your IIS security practices
Contents
-
PART I: Exposure and Risk
- Ch. 1: Web Security Threats
- Ch. 2: Site Defacing and Damage
- Ch. 3: Hacking and Cracking Methods
- Ch. 4: Assessing and Auditing the Risks to Your Website
- Ch. 5: Security Strategy and Practice
PART II: Secure Administration
- Ch. 6: Securing Website Access
- Ch. 7: Authorization and Permissions
- Ch. 8: Using Encryption
- Ch. 9: Working with Firewalls
- PART III: Security Is a Constant Process
- Ch. 10: Using FTP Securely
- Ch. 11: Active Security Management
PART IV: Appendices
- Appendix A: Internet Security resources
- Appendix B: Using the Software on the CD
- Appendix C: Glossary of Security Terms
L'auteur - Marty Jost
Security professional and consultant
L'auteur - Michael Cobb
Security professional and consultant
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Mc Graw Hill |
Auteur(s) | Marty Jost, Michael Cobb |
Parution | 14/08/2002 |
Nb. de pages | 468 |
Format | 18,7 x 23 |
Couverture | Broché |
Poids | 995g |
Intérieur | Noir et Blanc |
EAN13 | 9780072224399 |
Avantages Eyrolles.com
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Systèmes d'exploitation Windows Windows NT / 2000
- Informatique Développement d'applications Programmation .NET ASP.NET
- Informatique Développement d'applications Conception et développement web Serveurs web et serveurs d'application Domino
- Informatique Développement d'applications Conception et développement web Serveurs web et serveurs d'application IIS