Amazon cover image
Image from Amazon.com

Security technologies for the World Wide Web / Rolf Oppliger.

By: Material type: TextTextSeries: Artech House computer security seriesPublication details: Boston, MA : Artech House, ©2000.Description: 1 online resource (xxi, 419 pages) : illustrationsContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 0585337659
  • 9780585337654
  • 1580530451
  • 9781580530453
Subject(s): Genre/Form: Additional physical formats: Print version:: Security technologies for the World Wide Web.DDC classification:
  • 005.8 21
LOC classification:
  • QA76.9.A25 O68 1999eb
Other classification:
  • 54.65
Online resources:
Contents:
Internet -- WWW -- Vulnerabilities, threats, and countermeasures -- Generic security model -- Security policy -- Host security -- Network security -- Organizational security -- Legal security -- HTTP Security -- HTTP -- User authentication, authorization, and access control -- Basic authentication -- Digest access authentication -- Certificate-based authentication -- Sever configuration -- Configuring HTTP basic authentication -- Configuring HTTP digest access authentication -- Proxy Servers and Firewalls -- Static packet filtering -- Dynamic packet filtering or stateful inspection -- Circuit-level gateways -- Application-level gateways -- Firewall configurations -- Dual-homed firewall -- Screened host firewall -- Screened subnet firewall -- Network address translation -- Configuring the browser -- Cryptographic Techniques -- Cryptographic hash functions -- Secret key cryptography -- DES -- Triple-DES -- IDEA -- SAFER -- Blowfish -- CAST-128 -- RC2, RC4, RC5, and RC6 -- AES -- Public key cryptography -- RSA -- Diffie-Hellman -- ElGamal -- DSS -- ECC -- Digital envelopes -- Protection of cryptographic keys -- Generation of pseudorandom bit sequences -- Legal issues -- Patent claims -- Regulations -- Electronic and digital signature legislation -- Internet Security Protocols -- Network access layer security protocols -- Layer 2 Forwarding Protocol -- Point-to-Point Tunneling Protocol -- Layer 2 Tunneling Protocol -- Virtual private networking -- Internet layer security protocols -- IP security architecture.
Action note:
  • digitized 2010 HathiTrust Digital Library committed to preserve
Review: "This hands-on book gives you a comprehensive analysis of current trends in WWW security, plus an evaluation of existing technologies, such as anonymity services and security products. It helps you guarantee that electronic commerce applications on your website are executed with the utmost security and protection. What's more, it helps you understand content protection and the benefits and drawbacks of censorship on the web."--BOOK JACKET. "Geared toward proactive Internet security professionals, this handy resource helps you comprehend existing security technologies, evaluate and choose those that best suit your needs, understand corresponding software and hardware, and more."--Jacket.
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library EBSCO Computers Available
Total holds: 0

"Artech House computing library."

Includes bibliographical references and index.

Internet -- WWW -- Vulnerabilities, threats, and countermeasures -- Generic security model -- Security policy -- Host security -- Network security -- Organizational security -- Legal security -- HTTP Security -- HTTP -- User authentication, authorization, and access control -- Basic authentication -- Digest access authentication -- Certificate-based authentication -- Sever configuration -- Configuring HTTP basic authentication -- Configuring HTTP digest access authentication -- Proxy Servers and Firewalls -- Static packet filtering -- Dynamic packet filtering or stateful inspection -- Circuit-level gateways -- Application-level gateways -- Firewall configurations -- Dual-homed firewall -- Screened host firewall -- Screened subnet firewall -- Network address translation -- Configuring the browser -- Cryptographic Techniques -- Cryptographic hash functions -- Secret key cryptography -- DES -- Triple-DES -- IDEA -- SAFER -- Blowfish -- CAST-128 -- RC2, RC4, RC5, and RC6 -- AES -- Public key cryptography -- RSA -- Diffie-Hellman -- ElGamal -- DSS -- ECC -- Digital envelopes -- Protection of cryptographic keys -- Generation of pseudorandom bit sequences -- Legal issues -- Patent claims -- Regulations -- Electronic and digital signature legislation -- Internet Security Protocols -- Network access layer security protocols -- Layer 2 Forwarding Protocol -- Point-to-Point Tunneling Protocol -- Layer 2 Tunneling Protocol -- Virtual private networking -- Internet layer security protocols -- IP security architecture.

Use copy Restrictions unspecified star MiAaHDL

Electronic reproduction. [S.l.] : HathiTrust Digital Library, 2010. MiAaHDL

Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. MiAaHDL

http://purl.oclc.org/DLF/benchrepro0212

digitized 2010 HathiTrust Digital Library committed to preserve pda MiAaHDL

Print version record.

"This hands-on book gives you a comprehensive analysis of current trends in WWW security, plus an evaluation of existing technologies, such as anonymity services and security products. It helps you guarantee that electronic commerce applications on your website are executed with the utmost security and protection. What's more, it helps you understand content protection and the benefits and drawbacks of censorship on the web."--BOOK JACKET. "Geared toward proactive Internet security professionals, this handy resource helps you comprehend existing security technologies, evaluate and choose those that best suit your needs, understand corresponding software and hardware, and more."--Jacket.

Powered by Koha