Inicio > > Redes y comunicaciones informáticas > Seguridad de redes > ModSecurity Handbook, Second Edition
ModSecurity Handbook, Second Edition

ModSecurity Handbook, Second Edition

ModSecurity Handbook, Second Edition

Christian Folini / Ivan Ristic

57,44 €
IVA incluido
Disponible
Editorial:
Feisty Duck
Año de edición:
2017
Materia
Seguridad de redes
ISBN:
9781907117077
57,44 €
IVA incluido
Disponible

Selecciona una librería:

  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

ModSecurity Handbook is the definitive guide to ModSecurity, the popular open source web application firewall. Written by Christian Folini and ModSecurity’s original developer, Ivan Ristic, this book will teach you how to monitor activity on your web sites and protect them from attack.Situated between your web sites and the world, web application firewalls provide an additional security layer, monitoring everything that comes in and everything that goes out in real time. They enable you to perform many advanced activities, such as access control, virtual patching, HTTP traffic logging, continuous passive security assessment, and web application hardening. Web application firewalls can be very effective in preventing application security attacks, such as SQL injection, cross-site scripting, remote file inclusion, and others that plague most web sites today.ModSecurity Handbook covers the following topics, which will help anyone with a web site to run: Installation and configuration of ModSecurity Detailed guide to writing rules IP address, session, and user tracking Session management hardening Whitelisting, blacklisting, and IP reputation management Anomaly scoring and advanced blocking strategies Integration with other Apache modules Working with predefined rule sets Virtual patching and content injection Performance considerations Writing rules in Lua and extending ModSecurity in C Detailed coverage of ModSecurity’s numerous directives, variables, transformations, and operators The book is suitable for all reader levels: It takes newcomers by the hand to turn them into seasoned users, while seasoned users will learn advanced techniques from the top experts on the subject and find hidden clues to master the rule language. An updated ModSecurity Reference Manual is included in the second part of the book. ABOUT THE AUTHORS Dr. Christian Folini is a twelve-year veteran of ModSecurity. He is a renowned speaker, teacher, and system engineer who has specialized in securing high-profile web servers. Christian is one of the leaders of the OWASP ModSecurity Core Rule Set project, a key member of the ModSecurity community, program chair of the Swiss Cyber Storm conference, and vice president of Swiss Cyber Experts (a public-private partnership). Ivan Ristic is a security researcher, engineer, and author, known especially for his contributions to the web application firewall field and development of ModSecurity, an open source web application firewall, and for his SSL/TLS and PKI research, tools and guides published on the SSL Labs web site. His latest project, Hardenize, is a security posture analysis service that makes security fun again. He is the author of three books, Apache Security, ModSecurity Handbook, and Bulletproof SSL and TLS. 3

Artículos relacionados

  • Security Engineering for Cloud Computing
    Applying software engineering to Cloud computing is a primary aspect to obtain a systematic approach to the development, operation and maintenance of software. As a result, there is a need to examine and propose security solutions for cloud computing in order to improve the quality and security of all services, applications, and tools based on cloud computing. Security Engineer...
  • Theory and Practice of Cryptography Solutions for Secure Information Systems
    Elci
    Information Systems (IS) are a nearly omnipresent aspect of the modern world, playing crucial roles in the fields of science and engineering, business and law, art and culture, politics and government, and many others. As such, identity theft and unauthorized access to these systems are serious concerns. Theory and Practice of Cryptography Solutions for Secure Information Syste...
  • Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications
    Rawat
    While security is of vital importance to ensure the integrity of communications in wireless and mobile networks, most businesses which rely on these networks expect a high level of security and privacy to ensure the integrity and confidentiality of communications among terminals, networks, applications, and services. Security, Privacy, Trust, and Resource Management in Mobile a...
  • Principles, Methodologies, and Service-Oriented Approaches for Cloud Computing
    Innovations in cloud and service-oriented architectures continue to attract attention by offering interesting opportunities for research in scientific communities. Although advancements such as computational power, storage, networking, and infrastructure have aided in making major progress in the implementation and realization of cloud-based systems, there are still significant...
  • Security Breaches and Threat Prevention in the Internet of Things
    As the applications of the Internet of Things continue to progress, so do the security concerns for this technology. The study of threat prevention in the Internet of Things is necessary, as security breaches in this field can ruin industries and lives. Security Breaches and Threat Prevention in the Internet of Things provides a comprehensive examination of the latest strategie...
  • Multidisciplinary Perspectives in Cryptology and Information Security
    Al Maliky
    With the prevalence of digital information, IT professionals have encountered new challenges regarding data security. In an effort to address these challenges and offer solutions for securing digital information, new research on cryptology methods is essential. Multidisciplinary Perspectives in Cryptology and Information Security considers an array of multidisciplinary applicat...