Internet security : how to defend against attackers on the web/ Mike Harwood.
Series: Jones & bartlett learning, information systems security & assurance seriesPublication details: Burlington: Jones & Barlett Learning, 2015.Edition: 2nd edDescription: xvii, 438 pISBN:- 9781284090550 (pbk. : alk. paper)
- Security strategies in web applications and social networking.
- 302.302 85 Q51
Item type | Current library | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|
Books | Mahatma Gandhi University Library General Stacks | 302.302 85 Q51 (Browse shelf(Opens below)) | Available | 56767 |
Browsing Mahatma Gandhi University Library shelves, Shelving location: General Stacks Close shelf browser (Hides shelf browser)
302.302 85 Q2 Social network analysis : | 302.302 85 Q21 Managing social media in libraries: | 302.302 85 Q5 Culture and economy in the age of social media / | 302.302 85 Q51 Internet security : | 302.302 85 Q6 Multilayer social networks / | 302.307 2 Q4 Mixed methods social networks research: | 302.340 727 Q5 Twitter: |
Includes bibliographical references (pages 415-422) and index.
From mainframe to client-server to world wide web -- Security considerations for smb's -- Security considerations for home and personal online use -- Securing mobile communications -- Mitigating risk when connecting to the internet -- Mitigating web site risks, threats, and vulnerabilities -- Introducing the web application security consortium (WASC) -- Securing web applications -- Mitigating web application vulnerabilities -- Maintaining pci dss compliance for e-commerce web sites -- Testing and quality assurance for production web sites -- Performing a web site vulnerability and security assessment -- Securing end-point device communications -- Securing personal and business communications -- Web application security organizations, education, training, and certification.
"Internet Security: How to Defend Against Attackers on the Web, Second Edition provides a comprehensive explanation of the evolutionary changes that have occurred in computing, communications, and social networking and discusses how to secure systems against all the risks, threats, and vulnerabilities associated with Web-enabled applications accessible via the internet"--
There are no comments on this title.