Loading...

Internet security : how to defend against attackers on the web/

"Internet Security: How to Defend Against Attackers on the Web, Second Edition provides a comprehensive explanation of the evolutionary changes that have occurred in computing, communications, and social networking and discusses how to secure systems against all the risks, threats, and vulnerab...

Full description

Bibliographic Details
Main Author: Harwood, Mike
Format: Printed Book
Published: Burlington: Jones & Barlett Learning, 2015.
Edition:2nd ed.
Series:Jones & bartlett learning, information systems security & assurance series
Subjects:
Online Access:https://books.google.co.in/books?id=sYdMCgAAQBAJ&pg=PR2&dq=Internet+security+how+to+defend+against+attackers+on+the+web&hl=en&sa=X&ved=0ahUKEwist8nUyr_WAhVMLo8KHV-HD6gQ6AEIKDAA#v=onepage&q=Internet%20security%20how%20to%20defend%20against%20attackers%20on%20the%20web&f=false
LEADER 02578cam a22002657i 4500
999 |c 122117  |d 122117 
020 |a 9781284090550 (pbk. : alk. paper) 
082 0 0 |a 302.302 85  |b Q51 
100 1 |a Harwood, Mike.  |9 62343 
240 1 0 |a Security strategies in web applications and social networking. 
245 1 0 |a Internet security :  |b how to defend against attackers on the web/  |c Mike Harwood. 
250 |a 2nd ed. 
260 |a Burlington:  |b Jones & Barlett Learning,  |c 2015. 
300 |a xvii, 438 p. ; 
490 0 |a Jones & bartlett learning, information systems security & assurance series 
504 |a Includes bibliographical references (pages 415-422) and index. 
505 0 |a From mainframe to client-server to world wide web -- Security considerations for smb's -- Security considerations for home and personal online use -- Securing mobile communications -- Mitigating risk when connecting to the internet -- Mitigating web site risks, threats, and vulnerabilities -- Introducing the web application security consortium (WASC) -- Securing web applications -- Mitigating web application vulnerabilities -- Maintaining pci dss compliance for e-commerce web sites -- Testing and quality assurance for production web sites -- Performing a web site vulnerability and security assessment -- Securing end-point device communications -- Securing personal and business communications -- Web application security organizations, education, training, and certification. 
520 |a "Internet Security: How to Defend Against Attackers on the Web, Second Edition provides a comprehensive explanation of the evolutionary changes that have occurred in computing, communications, and social networking and discusses how to secure systems against all the risks, threats, and vulnerabilities associated with Web-enabled applications accessible via the internet"-- 
650 0 |a Online social networks-Security measures.  |9 62344 
650 0 |a Application software-Security measures.  |9 62345 
650 0 |a Internet-Security measures.  |9 3577 
650 0 |a World Wide Web-Security measures.  |9 41293 
856 |u https://books.google.co.in/books?id=sYdMCgAAQBAJ&pg=PR2&dq=Internet+security+how+to+defend+against+attackers+on+the+web&hl=en&sa=X&ved=0ahUKEwist8nUyr_WAhVMLo8KHV-HD6gQ6AEIKDAA#v=onepage&q=Internet%20security%20how%20to%20defend%20against%20attackers%20on%20the%20web&f=false 
942 |c BK 
952 |0 0  |1 0  |4 0  |6 302_302000000000000_85_Q51  |7 0  |9 118869  |a MGUL  |b MGUL  |c GEN  |d 2017-03-07  |e Calicut Book Distributors Bill No.010814 dated 15.02.2017  |g 4224.00  |l 0  |o 302.302 85 Q51  |p 56767  |r 2017-03-07  |y BK