Hack Proofing XML
The only way to stop a hacker is to think like one!
The World Wide Web Consortium's Extensible Markup Language (XML) is quickly becoming the new standard for data formatting and Internet development. XML is expected to be as important to the future of the Web as HTML has been to the foundation of the Web, and has proven itself to be the most common tool for all data manipulation and data transmission.
Hack Proofing XML provides readers with hands-on instruction for how to secure the Web transmission and access of their XML data. This book will also introduce database administrators, web developers and web masters to ways they can use XML to secure other applications and processes.
The first book to incorporate standards from both the Security Services Markup Language (S2ML) and the Organization for the Advancement of Structured Information Standards (OASIS) in one comprehensive book
Covers the four primary security objectives: Confidentiality, Integrity, Authentication and Non-repudiation
Not only shows readers how to secure their XML data, but describes how to provide enhanced security for a broader range of applications and processes
What people are saying - Write a review
We haven't found any reviews in the usual places.
Chapter 3 Reviewing the Fundamentals of XML
The Validation Gateway
Chapter 5 XML Digital Signatures
Chapter 6 Encryption in XML
Chapter 7 RoleBased Access Control
access control algorithm allow application application layer gateway assembly attribute authentication called canonicalization chapter cipher-text Code Access Security code group complexType concept create database decrypt default defined DigestMethod DTDs element encryption Envelope example execution exploit code FileIOPermission firewall Frequently Asked Questions granted Hack hackers hash implementation information leakage input Internet KeyInfo method Microsoft NET Framework node nonrepudiation object operating system optional password perform permission set Plain-Text Attacks private key privileges protected resources public key RBAC Reference remote request role Role-Based Role-Based Access Control script kiddie security holes security policy security problems security server SELinux shown in Figure signed SignedInfo specific stack walk standard string structure style sheet Transforms UIPermission Unicode vendor verify vulnerability XML digital signature XML document XML Encryption XML schema XML signatures XPath xsl:template XSLT
Page 40 - Interesting ports on parabola.cipherpunks.com (192.168.1.2) : (The 1533 ports scanned but not shown below are in state: closed) Port State Service...
Page v - Marie Chieng, Lucy Chong, Leslie Lim, Audrey Gan, and Joseph Chan of Transquest Publishers for the enthusiasm with which they receive our books. Kwon Sung June at Acorn Publishing for his support. Ethan Atkin at Cranbury International for his help in expanding the Syngress program.
Page v - Jon Mayes, John Mesjak, Peg O'Donnell, Sandra Patterson, Betty Redmond, Roy Remer, Ron Shapiro, Patricia Kelly, Andrea Tetrick, Jennifer Pascal, Doug Reil, David Dahl,Janis Carpenter, and Susan Fryer of Publishers Group West for sharing their incredible marketing experience and expertise.
Page i - With more than 1,500,000 copies of our MCSE, MCSD, CompTIA, and Cisco study guides in print, we continue to look for ways we can better serve the information needs of our readers. One way we do that is by listening. Readers like yourself have been telling us they want an Internet-based service that would extend and enhance the value of our books. Based on reader feedback and our own strategic plan, we have created a Web site that we hope will exceed your expectations. Solutions@syngress.com is an...