countdown boutiques-francophones Learn more scflyout Pets All-New Kindle Music Deals Store sports Tools

Vous voulez voir cette page en français ? Cliquez ici.

Have one to sell? Sell yours here
Tell the Publisher!
I'd like to read this book on Kindle

Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.

Apache Security [Paperback]

Ivan Ristic
5.0 out of 5 stars  See all reviews (1 customer review)

Available from these sellers.


‹  Return to Product Overview

Table of Contents

  • Dedication
  • Preface
  • Chapter 1: Apache Security Principles
  • Chapter 2: Installation and Configuration
  • Chapter 3: PHP
  • Chapter 4: SSL and TLS
  • Chapter 5: Denial of Service Attacks
  • Chapter 6: Sharing Servers
  • Chapter 7: Access Control
  • Chapter 8: Logging and Monitoring
  • Chapter 9: Infrastructure
  • Chapter 10: Web Application Security
  • Chapter 11: Web Security Assessment
  • Chapter 12: Web Intrusion Detection
  • Appendix A: Tools
  • Colophon
|Dedication;
Preface;
Audience;
Scope;
Contents of This Book;
Online Companion;
Conventions Used in This Book;
Using Code Examples;
We'd Like to Hear from You;
Safari Enabled;
Acknowledgments;
Chapter 1: Apache Security Principles;
1.1 Security Definitions;
1.2 Web Application Architecture Blueprints;
Chapter 2: Installation and Configuration;
2.1 Installation;
2.2 Configuration and Hardening;
2.3 Changing Web Server Identity;
2.4 Putting Apache in Jail;
Chapter 3: PHP;
3.1 Installation;
3.2 Configuration;
3.3 Advanced PHP Hardening;
Chapter 4: SSL and TLS;
4.1 Cryptography;
4.2 SSL;
4.3 OpenSSL;
4.4 Apache and SSL;
4.5 Setting Up a Certificate Authority;
4.6 Performance Considerations;
Chapter 5: Denial of Service Attacks;
5.1 Network Attacks;
5.2 Self-Inflicted Attacks;
5.3 Traffic Spikes;
5.4 Attacks on Apache;
5.5 Local Attacks;
5.6 Traffic-Shaping Modules;
5.7 DoS Defense Strategy;
Chapter 6: Sharing Servers;
6.1 Sharing Problems;
6.2 Distributing Configuration Data;
6.3 Securing Dynamic Requests;
6.4 Working with Large Numbers of Users;
Chapter 7: Access Control;
7.1 Overview;
7.2 Authentication Methods;
7.3 Access Control in Apache;
7.4 Single Sign-on;
Chapter 8: Logging and Monitoring;
8.1 Apache Logging Facilities;
8.2 Log Manipulation;
8.3 Remote Logging;
8.4 Logging Strategies;
8.5 Log Analysis;
8.6 Monitoring;
Chapter 9: Infrastructure;
9.1 Application Isolation Strategies;
9.2 Host Security;
9.3 Network Security;
9.4 Using a Reverse Proxy;
9.5 Network Design;
Chapter 10: Web Application Security;
10.1 Session Management Attacks;
10.2 Attacks on Clients;
10.3 Application Logic Flaws;
10.4 Information Disclosure;
10.5 File Disclosure;
10.6 Injection Flaws;
10.7 Buffer Overflows;
10.8 Evasion Techniques;
10.9 Web Application Security Resources;
Chapter 11: Web Security Assessment;
11.1 Black-Box Testing;
11.2 White-Box Testing;
11.3 Gray-Box Testing;
Chapter 12: Web Intrusion Detection;
12.1 Evolution of Web Intrusion Detection;
12.2 Using mod_security;
Appendix A: Tools;
A.1 Learning Environments;
A.2 Information-Gathering Tools;
A.3 Network-Level Tools;
A.4 Web Security Scanners;
A.5 Web Application Security Tools;
A.6 HTTP Programming Libraries;
Colophon;

‹  Return to Product Overview