Amazon cover image
Image from Amazon.com

Hack proofing your e-commerce site : the only way to stop a hacker is to think like one].

Contributor(s): Material type: TextTextPublication details: Rockland, MA : Syngress, ©2001.Description: 1 online resource (xxvi, 661 pages) : illustrationsContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 1931836329
  • 9781931836326
  • 9781928994275
  • 192899427X
Subject(s): Additional physical formats: Print version:: Hack proofing your e-commerce site.DDC classification:
  • 658.4/78 21
LOC classification:
  • QA76.9.A25 H334 2001eb
Online resources:
Contents:
192899427x.pdf; 192899427x.pdf; Cover; Table of Contents; Foreword; Chapter 1 Applying Security Principles to Your E-Business; Chapter 2 DDoS Attacks: Intent, Tools, and Defense; Chapter 3 Secure Web Site Design; Chapter 4 Designing and Implementing Security Policies; Chapter 5 Implementing a Secure E-Commerce Web Site; Chapter 6 Securing Financial Transactions; Chapter 7 Hacking Your Own Site; Chapter 8 Disaster Recovery Planning: The Best Defense; Chapter 9 Handling Large Volumes of Network Traffic; Chapter 10 Incident Response, Forensics, and the Law.
Summary: From the authors of the bestselling Hack Proofing Your Network! Yahoo!, E-Bay, Amazon. Three of the most popular, well-established, and lavishly funded Web sites in existence, yet hackers managed to penetrate their security systems and cripple these and many other Web giants for almost 24 hours. E-Commerce giants, previously thought to be impenetrable are now being exposed as incredibly vulnerable. This book will give e-commerce architects and engineers insight into the tools and techniques used by hackers to compromise their sites. The security of e-commerce sites is even more imperative than non-commerce sites, because the site has the added responsibility of maintaining the security of their customer's personal and financial information. Hack Proofing Your E-Commerce Site will provide computer architects and engineers all of the information they need to design and implement security measures. * Heightened media awareness of malicious attacks against "secure" sites guarantees a wide audience * Uses forensics-based analysis to give the reader insight to the mind of a hacker. This understanding is crucial for security professionals to defend against attacks
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library EBSCO Computers Available
Total holds: 0

Includes index.

Print version record.

From the authors of the bestselling Hack Proofing Your Network! Yahoo!, E-Bay, Amazon. Three of the most popular, well-established, and lavishly funded Web sites in existence, yet hackers managed to penetrate their security systems and cripple these and many other Web giants for almost 24 hours. E-Commerce giants, previously thought to be impenetrable are now being exposed as incredibly vulnerable. This book will give e-commerce architects and engineers insight into the tools and techniques used by hackers to compromise their sites. The security of e-commerce sites is even more imperative than non-commerce sites, because the site has the added responsibility of maintaining the security of their customer's personal and financial information. Hack Proofing Your E-Commerce Site will provide computer architects and engineers all of the information they need to design and implement security measures. * Heightened media awareness of malicious attacks against "secure" sites guarantees a wide audience * Uses forensics-based analysis to give the reader insight to the mind of a hacker. This understanding is crucial for security professionals to defend against attacks

192899427x.pdf; 192899427x.pdf; Cover; Table of Contents; Foreword; Chapter 1 Applying Security Principles to Your E-Business; Chapter 2 DDoS Attacks: Intent, Tools, and Defense; Chapter 3 Secure Web Site Design; Chapter 4 Designing and Implementing Security Policies; Chapter 5 Implementing a Secure E-Commerce Web Site; Chapter 6 Securing Financial Transactions; Chapter 7 Hacking Your Own Site; Chapter 8 Disaster Recovery Planning: The Best Defense; Chapter 9 Handling Large Volumes of Network Traffic; Chapter 10 Incident Response, Forensics, and the Law.

Added to collection customer.56279.3

Powered by Koha