"The authors . . . bring wide-ranging experience to this work, moving from theory to hands-on, bit-shoveling practical advice." -Steven M. Bellovin A serious security sourcebook for Web professionals and users. The front door is unlocked and wide open. The alarm's not working and no one's home. All of your valuables, money, and intimate details of your life are just sitting inside, waiting to be taken. No, it's not your house . . . it's your computer. The Web now penetrates every aspect of our lives, from the home PC to the business office. But with each advance in convenience comes a geometric increase in vulnerability to the integrity of data and software as well as to the confidentiality of information. Although the flaws inherent in the Web are real, solutions are available. Let Aviel Rubin, Daniel Geer, and Marcus Ranum give you the answers. Here's a book that's valuable today and indispensable for the future. It includes basic and advanced techniques for client-side and server-side security, browser security, writing secure CGI scripts, firewalls, and secure e-commerce. There's a special appendix that demystifies the complex world of cryptography. And the book comes with access to a dedicated Web site containing up-to-the-minute information on the latest security threats and solutions. So whether you're a Webmaster trying to close the door on sites and applications, or an everyday user hoping to keep your desktop safe, this is your essential source on: * Protecting and securing Web pages, search engines, servers, and browsers * Writing impregnable applets and scripts, and avoiding the dangers inherent in every language * Using (and abusing) firewalls and cryptographic controls * Securing commerce and payment transactions
Documents and excerpts from government publications, and copyrighted documents from private sources provide general users of computers information and insight into computer, Internet, and e-mail security. They cover basic principles,...
Documents and excerpts from government publications, and copyrighted documents from private sources provide general users of computers information and insight into computer, Internet, and e-mail security.
This hacker ethic was publicized and perhaps originated in Steven Levy's Hackers: Heroes of the Computer Revolution (1984). It contains a codification of its principles. The programmer subculture of hackers disassociates from the mass ...
Sivin , J.P. , and E. Bialo , Ethical Use of Information Technologies in Education : Important Issues for America's Schools . ... Smith , M.R. , Commonsense Computer Security : Your Practical Guide to Information Protection . 2nd ed .
The U.S. Intelligence Community Law Sourcebook
Shows how to meet security challenges by presenting security best practices, rules, and customs. This work uses real-world examples, to show how to change your approach to security. It also...
The Internet concept has been a big step along the path towards electronic commerce , information acquisition and ... ( ICB ) to coordinate activities with some European countries centered on packet satellite research , while the Internet ...
The dictionary covers five main areas: authentication; network- level security; firewall design and implementation, and remote management; Internet security policies, risk analysis, integration across platforms, management and auditing, ...
Steven M. Bellovin ( http://stevebellovin.com ) is a Fellow at AT & T Labs Research , where he works on networks , security , and ... ISBN 0-201-63466 - X $ 49.99 US $ 77.99 CANADA A Addison - Wesley Pearson Education 7 85342 " 63466 " 2.
Features: Written by a top expert in information security Gives a clear understanding of wired/wireless mobile internet technologies Presents complete coverage of various cryptographic protocols and specifications needed for 3GPP: AES, ...