Internet security : how to defend against attackers on the web / Mike Harwood.
Material type: TextSeries: Jones & bartlett learning, information systems security & assurance seriesPublisher: Burlington, MA : Jones & Bartlett Learning, [2016]Edition: 2nd editionDescription: xvii, 438 pages ; 24 cmContent type: text Media type: unmediated Carrier type: volumeISBN: 9781284090550 (pbk. : alk. paper)Uniform titles: Security strategies in Web applications and social networking. Subject(s): Online social networks -- Security measures | Application software -- Security measures | Internet -- Security measures | World Wide Web -- Security measuresDDC classification: 302.30285 LOC classification: HM742 | .H38 2016Item type | Current library | Home library | Shelving location | Class number | Status | Date due | Barcode | Item reservations | |
---|---|---|---|---|---|---|---|---|---|
Book | Paul Hamlyn Library | Paul Hamlyn Library | Floor 1 | 302.30285 HAR (Browse shelf(Opens below)) | Available | 06589901 |
Includes bibliographical references (pages 415-422) and index.
From mainframe to client-server to world wide web Security considerations for smb's Security considerations for home and personal online use Securing mobile communications Mitigating risk when connecting to the internet Mitigating web site risks, threats, and vulnerabilities Introducing the web application security consortium (WASC) Securing web applications Mitigating web application vulnerabilities Maintaining pci dss compliance for e-commerce web sites Testing and quality assurance for production web sites Performing a web site vulnerability and security assessment Securing end-point device communications Securing personal and business communications Web application security organizations, education, training, and certification.
"Internet Security: How to Defend Against Attackers on the Web, Second Edition provides a comprehensive explanation of the evolutionary changes that have occurred in computing, communications, and social networking and discusses how to secure systems against all the risks, threats, and vulnerabilities associated with Web-enabled applications accessible via the internet"-- Provided by publisher.
There are no comments on this title.