Index
[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
IDEA (International Data Encryption Algorithm) identity verification
[See public-key infrastructure] information disclosure security issues directory indexes listings HTML source code not volunteering principle information leaks, preventing information-gathering tools Httprint Netcraft Sam Spade SiteDigger SSLDigger TechnicalInfo infrastructure application isolation modules from servers virtual servers book recommendations host security
[See host security] network design
[See network design] network security
[See network security] injection attacks SQL database feature problems example query statements resources for UNION construct integrity security goal International Data Encryption Algorithm (IDEA) intrusion containment, chroot (jail) intrusion detection Apache backdoors detecting common attacks command execution and file disclosure content management system problems database database-specific patterns XSS evolution of HIDSs NIDS features anti-evasion techniques input validation enforcement negative versus positive models protocol anomaly response monitoring (information leak detection) rule-based versus anomaly-based state management firewall deployment guidelines configuration starting point, reasonable steps host-based HTTP traffic and log-based mod_security firewall module
[See mod_security firewall module] network real-time systems for 2nd Prelude tool Snort tool value of
|