Security technologies for the World Wide Web / Rolf Oppliger.
Material type:
TextSeries: Artech House computer security seriesPublication details: Boston, MA : Artech House, ©2000.Description: 1 online resource (xxi, 419 pages) : illustrationsContent type: - text
- computer
- online resource
- 0585337659
- 9780585337654
- 1580530451
- 9781580530453
- 005.8 21
- QA76.9.A25 O68 1999eb
- 54.65
- digitized 2010 HathiTrust Digital Library committed to preserve
| Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds | |
|---|---|---|---|---|---|---|---|---|
eBook
|
e-Library | EBSCO Computers | Available |
"Artech House computing library."
Includes bibliographical references and index.
Internet -- WWW -- Vulnerabilities, threats, and countermeasures -- Generic security model -- Security policy -- Host security -- Network security -- Organizational security -- Legal security -- HTTP Security -- HTTP -- User authentication, authorization, and access control -- Basic authentication -- Digest access authentication -- Certificate-based authentication -- Sever configuration -- Configuring HTTP basic authentication -- Configuring HTTP digest access authentication -- Proxy Servers and Firewalls -- Static packet filtering -- Dynamic packet filtering or stateful inspection -- Circuit-level gateways -- Application-level gateways -- Firewall configurations -- Dual-homed firewall -- Screened host firewall -- Screened subnet firewall -- Network address translation -- Configuring the browser -- Cryptographic Techniques -- Cryptographic hash functions -- Secret key cryptography -- DES -- Triple-DES -- IDEA -- SAFER -- Blowfish -- CAST-128 -- RC2, RC4, RC5, and RC6 -- AES -- Public key cryptography -- RSA -- Diffie-Hellman -- ElGamal -- DSS -- ECC -- Digital envelopes -- Protection of cryptographic keys -- Generation of pseudorandom bit sequences -- Legal issues -- Patent claims -- Regulations -- Electronic and digital signature legislation -- Internet Security Protocols -- Network access layer security protocols -- Layer 2 Forwarding Protocol -- Point-to-Point Tunneling Protocol -- Layer 2 Tunneling Protocol -- Virtual private networking -- Internet layer security protocols -- IP security architecture.
Use copy Restrictions unspecified star MiAaHDL
Electronic reproduction. [S.l.] : HathiTrust Digital Library, 2010. MiAaHDL
Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. MiAaHDL
http://purl.oclc.org/DLF/benchrepro0212
digitized 2010 HathiTrust Digital Library committed to preserve pda MiAaHDL
Print version record.
"This hands-on book gives you a comprehensive analysis of current trends in WWW security, plus an evaluation of existing technologies, such as anonymity services and security products. It helps you guarantee that electronic commerce applications on your website are executed with the utmost security and protection. What's more, it helps you understand content protection and the benefits and drawbacks of censorship on the web."--BOOK JACKET. "Geared toward proactive Internet security professionals, this handy resource helps you comprehend existing security technologies, evaluate and choose those that best suit your needs, understand corresponding software and hardware, and more."--Jacket.