Author: Ivan Ristic
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 440
Book Description
"The complete guide to securing your Apache web server"--Cover.
Apache Security
Author: Ivan Ristic
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 440
Book Description
"The complete guide to securing your Apache web server"--Cover.
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 440
Book Description
"The complete guide to securing your Apache web server"--Cover.
Apache
Author: Ben Laurie
Publisher: "O'Reilly Media, Inc."
ISBN: 0596002033
Category : Computers
Languages : en
Pages : 591
Book Description
Describes the history of the Web server platform and covers downloading and compiling, configuring and running the program on UNIX, writing specialized modules, and establishing security routines.
Publisher: "O'Reilly Media, Inc."
ISBN: 0596002033
Category : Computers
Languages : en
Pages : 591
Book Description
Describes the history of the Web server platform and covers downloading and compiling, configuring and running the program on UNIX, writing specialized modules, and establishing security routines.
Preventing Web Attacks with Apache
Author: Ryan C. Barnett
Publisher: Pearson Education
ISBN: 0132702282
Category : Computers
Languages : en
Pages : 579
Book Description
The only end-to-end guide to securing Apache Web servers and Web applications Apache can be hacked. As companies have improved perimeter security, hackers have increasingly focused on attacking Apache Web servers and Web applications. Firewalls and SSL won’t protect you: you must systematically harden your Web application environment. Preventing Web Attacks with Apache brings together all the information you’ll need to do that: step-by-step guidance, hands-on examples, and tested configuration files. Building on his groundbreaking SANS presentations on Apache security, Ryan C. Barnett reveals why your Web servers represent such a compelling target, how significant exploits are performed, and how they can be defended against. Exploits discussed include: buffer overflows, denial of service, attacks on vulnerable scripts and programs, credential sniffing and spoofing, client parameter manipulation, brute force attacks, web defacements, and more. Barnett introduces the Center for Internet Security Apache Benchmarks, a set of best-practice Apache security configuration actions and settings he helped to create. He addresses issues related to IT processes and your underlying OS; Apache downloading, installation, and configuration; application hardening; monitoring, and more. He also presents a chapter-length case study using actual Web attack logs and data captured “in the wild.” For every sysadmin, Web professional, and security specialist responsible for Apache or Web application security.
Publisher: Pearson Education
ISBN: 0132702282
Category : Computers
Languages : en
Pages : 579
Book Description
The only end-to-end guide to securing Apache Web servers and Web applications Apache can be hacked. As companies have improved perimeter security, hackers have increasingly focused on attacking Apache Web servers and Web applications. Firewalls and SSL won’t protect you: you must systematically harden your Web application environment. Preventing Web Attacks with Apache brings together all the information you’ll need to do that: step-by-step guidance, hands-on examples, and tested configuration files. Building on his groundbreaking SANS presentations on Apache security, Ryan C. Barnett reveals why your Web servers represent such a compelling target, how significant exploits are performed, and how they can be defended against. Exploits discussed include: buffer overflows, denial of service, attacks on vulnerable scripts and programs, credential sniffing and spoofing, client parameter manipulation, brute force attacks, web defacements, and more. Barnett introduces the Center for Internet Security Apache Benchmarks, a set of best-practice Apache security configuration actions and settings he helped to create. He addresses issues related to IT processes and your underlying OS; Apache downloading, installation, and configuration; application hardening; monitoring, and more. He also presents a chapter-length case study using actual Web attack logs and data captured “in the wild.” For every sysadmin, Web professional, and security specialist responsible for Apache or Web application security.
Hadoop Security
Author: Ben Spivey
Publisher: "O'Reilly Media, Inc."
ISBN: 1491901349
Category : Computers
Languages : en
Pages : 336
Book Description
As more corporations turn to Hadoop to store and process their most valuable data, the risk of a potential breach of those systems increases exponentially. This practical book not only shows Hadoop administrators and security architects how to protect Hadoop data from unauthorized access, it also shows how to limit the ability of an attacker to corrupt or modify data in the event of a security breach. Authors Ben Spivey and Joey Echeverria provide in-depth information about the security features available in Hadoop, and organize them according to common computer security concepts. You’ll also get real-world examples that demonstrate how you can apply these concepts to your use cases. Understand the challenges of securing distributed systems, particularly Hadoop Use best practices for preparing Hadoop cluster hardware as securely as possible Get an overview of the Kerberos network authentication protocol Delve into authorization and accounting principles as they apply to Hadoop Learn how to use mechanisms to protect data in a Hadoop cluster, both in transit and at rest Integrate Hadoop data ingest into enterprise-wide security architecture Ensure that security architecture reaches all the way to end-user access
Publisher: "O'Reilly Media, Inc."
ISBN: 1491901349
Category : Computers
Languages : en
Pages : 336
Book Description
As more corporations turn to Hadoop to store and process their most valuable data, the risk of a potential breach of those systems increases exponentially. This practical book not only shows Hadoop administrators and security architects how to protect Hadoop data from unauthorized access, it also shows how to limit the ability of an attacker to corrupt or modify data in the event of a security breach. Authors Ben Spivey and Joey Echeverria provide in-depth information about the security features available in Hadoop, and organize them according to common computer security concepts. You’ll also get real-world examples that demonstrate how you can apply these concepts to your use cases. Understand the challenges of securing distributed systems, particularly Hadoop Use best practices for preparing Hadoop cluster hardware as securely as possible Get an overview of the Kerberos network authentication protocol Delve into authorization and accounting principles as they apply to Hadoop Learn how to use mechanisms to protect data in a Hadoop cluster, both in transit and at rest Integrate Hadoop data ingest into enterprise-wide security architecture Ensure that security architecture reaches all the way to end-user access
Apache Server for Windows Little Black Book
Author: Greg Holden
Publisher: Coriolis Group Books
ISBN: 9781576103913
Category : Computers
Languages : en
Pages : 386
Book Description
Readers will find hundreds of immediate solutions for turning Apache into a powerhouse Web server. Key topics include setting up a virtual Web site, mastering security, creating optimized CGI scripts, tuning and customizing Apache servers, using the Apache Module API, setting up Apache as a proxy server, and setting up commerce sites.
Publisher: Coriolis Group Books
ISBN: 9781576103913
Category : Computers
Languages : en
Pages : 386
Book Description
Readers will find hundreds of immediate solutions for turning Apache into a powerhouse Web server. Key topics include setting up a virtual Web site, mastering security, creating optimized CGI scripts, tuning and customizing Apache servers, using the Apache Module API, setting up Apache as a proxy server, and setting up commerce sites.
Hardening Apache
Author: Tony Mobily
Publisher: Apress
ISBN: 1430206756
Category : Computers
Languages : en
Pages : 284
Book Description
* Thorough coverage of Apache security * Accessible for both junior and senior level system administrators * This will be most up-to-date book on Apache Foreword and tech review by Ken Coar; one of the most respected people in the industry
Publisher: Apress
ISBN: 1430206756
Category : Computers
Languages : en
Pages : 284
Book Description
* Thorough coverage of Apache security * Accessible for both junior and senior level system administrators * This will be most up-to-date book on Apache Foreword and tech review by Ken Coar; one of the most respected people in the industry
Linux Server Security
Author: Michael D. Bauer
Publisher: "O'Reilly Media, Inc."
ISBN: 0596006705
Category : Computers
Languages : en
Pages : 545
Book Description
A concise but comprehensive guide to providing the best possible security for a server, with examples and background to help you understand the issues involved. For each of the tasks or services covered, this book lays out the reasons for security, the risks and needs involved, the background to understand the solutions, and step by step guidelines for doing the job.
Publisher: "O'Reilly Media, Inc."
ISBN: 0596006705
Category : Computers
Languages : en
Pages : 545
Book Description
A concise but comprehensive guide to providing the best possible security for a server, with examples and background to help you understand the issues involved. For each of the tasks or services covered, this book lays out the reasons for security, the risks and needs involved, the background to understand the solutions, and step by step guidelines for doing the job.
Surviving Security
Author: Amanda Andress
Publisher: CRC Press
ISBN: 1135491623
Category : Business & Economics
Languages : en
Pages : 397
Book Description
Previous information security references do not address the gulf between general security awareness and the specific technical steps that need to be taken to protect information assets. Surviving Security: How to Integrate People, Process, and Technology, Second Edition fills this void by explaining security through a holistic approach that conside
Publisher: CRC Press
ISBN: 1135491623
Category : Business & Economics
Languages : en
Pages : 397
Book Description
Previous information security references do not address the gulf between general security awareness and the specific technical steps that need to be taken to protect information assets. Surviving Security: How to Integrate People, Process, and Technology, Second Edition fills this void by explaining security through a holistic approach that conside
Apache Server Unleashed
Author: Rich Bowen
Publisher: Sams Publishing
ISBN: 9780672318085
Category : Computers
Languages : en
Pages : 0
Book Description
Apache Server Unleashed is designed for both the Apache Web developer and system administrator. Apache Server Unleashed teaches you how to extend the base server through CGI scripts and modules, with extensive advanced coverage on modules. This book teaches the system administrator how to fine-tune the server for specific traffic use. Some topics include how to start, stop and restart the server in order to update, retune, and address any general or disaster recovery issues. Learn underlying architecture of Apache Server, specifically security and authentication, as well as newer topics such as running Apache on Windows NT.
Publisher: Sams Publishing
ISBN: 9780672318085
Category : Computers
Languages : en
Pages : 0
Book Description
Apache Server Unleashed is designed for both the Apache Web developer and system administrator. Apache Server Unleashed teaches you how to extend the base server through CGI scripts and modules, with extensive advanced coverage on modules. This book teaches the system administrator how to fine-tune the server for specific traffic use. Some topics include how to start, stop and restart the server in order to update, retune, and address any general or disaster recovery issues. Learn underlying architecture of Apache Server, specifically security and authentication, as well as newer topics such as running Apache on Windows NT.
Network Security JumpStart
Author: Matthew Strebe
Publisher: John Wiley & Sons
ISBN: 0782152090
Category : Computers
Languages : en
Pages : 383
Book Description
Build Your Network Security Career on a Solid Foundation Whether you're setting out to earn a security certification or just want to know more about the security issues faced by all network administrators, Network Security JumpStart is the place to begin. Inside, a networking expert demystifies every aspect of the growing security imperative, giving you a firm footing from which you can realize your goals and develop a better understanding of computer and network security. Coverage Includes: Understanding security principles Understanding hacking Using encryption and authentication Managing security Securing Internet connections Using Virtual Private Networks Securing remote and home users Implementing virus protection Creating fault tolerance Securing Windows servers Securing UNIX servers Securing public web servers Securing public e-mail servers Detecting intrusion
Publisher: John Wiley & Sons
ISBN: 0782152090
Category : Computers
Languages : en
Pages : 383
Book Description
Build Your Network Security Career on a Solid Foundation Whether you're setting out to earn a security certification or just want to know more about the security issues faced by all network administrators, Network Security JumpStart is the place to begin. Inside, a networking expert demystifies every aspect of the growing security imperative, giving you a firm footing from which you can realize your goals and develop a better understanding of computer and network security. Coverage Includes: Understanding security principles Understanding hacking Using encryption and authentication Managing security Securing Internet connections Using Virtual Private Networks Securing remote and home users Implementing virus protection Creating fault tolerance Securing Windows servers Securing UNIX servers Securing public web servers Securing public e-mail servers Detecting intrusion