Hack Proofing Your E-commerce Web Site: The Only Way to Stop a Hacker is to Think Like One
From the authors of the bestselling Hack Proofing Your Network!
Yahoo!, E-Bay, Amazon. Three of the most popular, well-established, and lavishly funded Web sites in existence, yet hackers managed to penetrate their security systems and cripple these and many other Web giants for almost 24 hours. E-Commerce giants, previously thought to be impenetrable are now being exposed as incredibly vulnerable. This book will give e-commerce architects and engineers insight into the tools and techniques used by hackers to compromise their sites. The security of e-commerce sites is even more imperative than non-commerce sites, because the site has the added responsibility of maintaining the security of their customer's personal and financial information.
Hack Proofing Your E-Commerce Site will provide computer architects and engineers all of the information they need to design and implement security measures.
* Heightened media awareness of malicious attacks against "secure" sites guarantees a wide audience
* Uses forensics-based analysis to give the reader insight to the mind of a hacker. This understanding is crucial for security professionals to defend against attacks
What people are saying - Write a review
We haven't found any reviews in the usual places.
designed to be broken
way Naturally the Mapping Out a Web Server
into a honeypot and he Hiring a Penetration Testing Team
monitoring In fact a Frequently Asked Questions
as much information
How does ecommerce
Understand Load Introduction
Know What You May the Internet
Each hidden tag can be Frequently Asked Questions
used with forms on your
input value of 100 00 Comparing Web Servers Security Features
input typehidden Using the SET Protocol
s Importing credit card
HTML editing program a The Basics of Secure Site Design
to 1 00 This would allow
Server and Internet
s Data import analysis
Programming Secure Scripts
Outsource the Design of My Site?
Designing and Implementing
How do I know if I
Securing Financial Transactions
Tools Traps Security Chapter 7 Hacking Your Own Site
Your Threat Level with
some can enhance it by Determining Switch Load
balancer itself may have How Do I Manage My Bandwidth Needs?
network which might be Introduction to Load Balancing
choosing The Pros and Cons of Load Balancing
Maintain a Chain
Appendix A Cisco Solutions
Appendix B Hack Proofing Your
Implementing ECommerce Web Site
administrator allow Apache applets application authentication backup bandwidth basic browser certificate chapter client command components compromised configuration connection create credit card daemon damage database DDoS attacks DDoS tools default devices documents e-commerce encrypted ensure example filtering firewall hacker hacking hosts ICMP Echo Reply implementation ingress filtering installed Internet Internet Information Services IP address Linux load balancer machine master method monitoring NetWare nmap operating system option packets password patches perform port problems protect protocol proxy require response risk routers scan scripts security policy server site’s Smurf attack solutions source address Specifies spoofed Stacheldraht SYN flood target TFN2K tion traffic trinoo UNIX users vendors vulnerabilities Windows NT Wizard Zombie Zombie Zapper
Page v - Anderson of Global Knowledge, for their generous access to the IT industry's best courses, instructors, and training facilities. Ralph Troupe, Rhonda St. John, and the team at Callisma for their invaluable insight into the challenges of designing, deploying, and supporting world-class enterprise networks. Karen Cross, Lance Tilford, Meaghan Cunningham, Kim Wylie, Harry Kirchner, Kevin Votel, Kent Anderson, and FridaYara of Publishers Group West for sharing their incredible marketing experience and...