Hack Proofing Your E-commerce Web Site: The Only Way to Stop a Hacker is to Think Like One

Front Cover
Elsevier, May 15, 2001 - Computers - 528 pages
From the authors of the bestselling Hack Proofing Your Network!
Yahoo!, E-Bay, Amazon. Three of the most popular, well-established, and lavishly funded Web sites in existence, yet hackers managed to penetrate their security systems and cripple these and many other Web giants for almost 24 hours. E-Commerce giants, previously thought to be impenetrable are now being exposed as incredibly vulnerable. This book will give e-commerce architects and engineers insight into the tools and techniques used by hackers to compromise their sites. The security of e-commerce sites is even more imperative than non-commerce sites, because the site has the added responsibility of maintaining the security of their customer's personal and financial information.

Hack Proofing Your E-Commerce Site will provide computer architects and engineers all of the information they need to design and implement security measures.
* Heightened media awareness of malicious attacks against "secure" sites guarantees a wide audience
* Uses forensics-based analysis to give the reader insight to the mind of a hacker. This understanding is crucial for security professionals to defend against attacks
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Solutions FastTrack
1
s Ensure the availability
23
Your Questions About
43
Minimizing Risk
57
Damage Defense The Attacks of February 2000
63
a DoS is by altering
69
devices should undergo
75
StacheldrahtA BarbedWire Offensive
81
designed to be broken
394
way Naturally the Mapping Out a Web Server
407
into a honeypot and he Hiring a Penetration Testing Team
414
monitoring In fact a Frequently Asked Questions
423
Disaster Recovery
425
as much information
429
How does ecommerce
472
Understand Load Introduction
475

Know What You May the Internet
99
Complete Coverage
105
Each hidden tag can be Frequently Asked Questions
111
used with forms on your
119
input value of 100 00 Comparing Web Servers Security Features
127
input typehidden Using the SET Protocol
133
s Importing credit card
137
HTML editing program a The Basics of Secure Site Design
143
to 1 00 This would allow
149
Server and Internet
168
s Data import analysis
172
reduced amount
186
Guidelines for Java JavaScript and Active X
189
Programming Secure Scripts
196
Outsource the Design of My Site?
202
Designing and Implementing
219
Implementing
261
How do I know if I
311
Securing Financial Transactions
313
Tools Traps Security Chapter 7 Hacking Your Own Site
381
Your Threat Level with
387
some can enhance it by Determining Switch Load
483
balancer itself may have How Do I Manage My Bandwidth Needs?
493
network which might be Introduction to Load Balancing
499
choosing The Pros and Cons of Load Balancing
505
Incident Response
515
Maintain a Chain
529
Appendix A Cisco Solutions
553
Appendix B Hack Proofing Your
583
Implementing ECommerce Web Site
600
Index
625
436
626
219
629
252
630
447
632
230
635
553
636
231
641
276
642
563
647
Edit
654
Copyright

Common terms and phrases

Popular passages

Page v - Anderson of Global Knowledge, for their generous access to the IT industry's best courses, instructors, and training facilities. Ralph Troupe, Rhonda St. John, and the team at Callisma for their invaluable insight into the challenges of designing, deploying, and supporting world-class enterprise networks. Karen Cross, Lance Tilford, Meaghan Cunningham, Kim Wylie, Harry Kirchner, Kevin Votel, Kent Anderson, and FridaYara of Publishers Group West for sharing their incredible marketing experience and...
Page v - Publishers for the enthusiasm with which they receive our books. Kwon Sung June at Acorn Publishing for his support. Jackie Gross, Gayle Voycey, Alexia Penny, Anik Robitaille, Craig Siddall, Darlene Morrow...
Page ix - As part of an information technology team that provides support to a user base of over 800 civilian and uniform users, his theory is that when the users carry guns, you tend to be more motivated in solving their problems. Michael also owns KnightWare...

Bibliographic information