Vous voulez voir cette page en français ? Cliquez ici.

Have one to sell? Sell yours here
Tell the Publisher!
I'd like to read this book on Kindle

Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.

Apache Security [Paperback]

Ivan Ristic
5.0 out of 5 stars  See all reviews (1 customer review)

Available from these sellers.


‹  Return to Product Overview

Table of Contents

Dedication; Preface; Audience; Scope; Contents of This Book; Online Companion; Conventions Used in This Book; Using Code Examples; We'd Like to Hear from You; Safari Enabled; Acknowledgments; Chapter 1: Apache Security Principles; 1.1 Security Definitions; 1.2 Web Application Architecture Blueprints; Chapter 2: Installation and Configuration; 2.1 Installation; 2.2 Configuration and Hardening; 2.3 Changing Web Server Identity; 2.4 Putting Apache in Jail; Chapter 3: PHP; 3.1 Installation; 3.2 Configuration; 3.3 Advanced PHP Hardening; Chapter 4: SSL and TLS; 4.1 Cryptography; 4.2 SSL; 4.3 OpenSSL; 4.4 Apache and SSL; 4.5 Setting Up a Certificate Authority; 4.6 Performance Considerations; Chapter 5: Denial of Service Attacks; 5.1 Network Attacks; 5.2 Self-Inflicted Attacks; 5.3 Traffic Spikes; 5.4 Attacks on Apache; 5.5 Local Attacks; 5.6 Traffic-Shaping Modules; 5.7 DoS Defense Strategy; Chapter 6: Sharing Servers; 6.1 Sharing Problems; 6.2 Distributing Configuration Data; 6.3 Securing Dynamic Requests; 6.4 Working with Large Numbers of Users; Chapter 7: Access Control; 7.1 Overview; 7.2 Authentication Methods; 7.3 Access Control in Apache; 7.4 Single Sign-on; Chapter 8: Logging and Monitoring; 8.1 Apache Logging Facilities; 8.2 Log Manipulation; 8.3 Remote Logging; 8.4 Logging Strategies; 8.5 Log Analysis; 8.6 Monitoring; Chapter 9: Infrastructure; 9.1 Application Isolation Strategies; 9.2 Host Security; 9.3 Network Security; 9.4 Using a Reverse Proxy; 9.5 Network Design; Chapter 10: Web Application Security; 10.1 Session Management Attacks; 10.2 Attacks on Clients; 10.3 Application Logic Flaws; 10.4 Information Disclosure; 10.5 File Disclosure; 10.6 Injection Flaws; 10.7 Buffer Overflows; 10.8 Evasion Techniques; 10.9 Web Application Security Resources; Chapter 11: Web Security Assessment; 11.1 Black-Box Testing; 11.2 White-Box Testing; 11.3 Gray-Box Testing; Chapter 12: Web Intrusion Detection; 12.1 Evolution of Web Intrusion Detection; 12.2 Using mod_security; Appendix A: Tools; A.1 Learning Environments; A.2 Information-Gathering Tools; A.3 Network-Level Tools; A.4 Web Security Scanners; A.5 Web Application Security Tools; A.6 HTTP Programming Libraries; Colophon;

‹  Return to Product Overview