Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Burney, Sonia  (1)
  • Safari Tech Books Online
  • Sebastopol, CA : O'Reilly Media  (2)
  • Indianapolis, IN : Sams Pub.
  • Computer networks ; Security measures  (2)
Datasource
Material
Language
Years
  • 1
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Keywords: Computer networks ; Security measures ; System analysis ; System design ; Electronic books ; Electronic books ; local
    Abstract: Security and performance are regarded as separate issues requiring very different solutions. But now that malicious hackers have discovered new and better ways to affect both aspects of a website, you need solutions that can plug security holes while enhancing frontend performance. How is that possible? With this report, you'll explore browser-based solutions that can beef up security and enhance end-user performance in one stroke. Attacks that target both security and performance often involve third party content such as fonts, images, and stylesheets. Authors Sabrina Burney and Sonia Burney examine several techniques for dealing with these issues in the browser, including HSTS, iframe , and prefetch . You'll also dive into service workers, browser-based scripts that provide many security and performance options. • Eliminate man-in-the-middle attacks and HTTP redirects with HTTP Strict-Transport-Security (HSTS)• Improve and secure frontend user experience with iframe and Content-Security-Policy • Deliver prioritized resources faster with prefetch and preload header options• Obfuscate third party content to improve frontend delivery and security• Help third party analytics tools go "unnoticed" by using Service Workers• Use Service Workers to allow only third party content that meets your criteria• Leverage other Service Worker applications, including input validation and geo content control Sonia Burney , a Solutions Architect at Akamai Technologies, creates solutions to challenging problems in web experience, including new algorithms designed to improve the frontend experience at the browser. Sabrina Burney is a Security Solutions Architect for software development and web security at Akamai Technologies. Her current focus is on addressing vulnerabilities and concerns around third party content.
    Note: Description based on online resource; title from title page (Safari, viewed December 4, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly Media | Boston, MA :Safari,
    Language: English
    Pages: xiii, 270 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Computers ; Access control ; Electronic books ; local
    Abstract: If you are a network administrator, you're under a lot of pressure to ensure that mission-critical systems are completely safe from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders. Designing a reliable way to detect intruders before they get in is an essential--but often overwhelming--challenge. Snort, the defacto open source standard of intrusion detection tools, is capable of performing real-time traffic analysis and packet logging on IP network. It can perform protocol analysis, content searching, and matching. Snort can save countless headaches; the new Snort Cookbook will save countless hours of sifting through dubious online advice or wordy tutorials in order to leverage the full power of SNORT.Each recipe in the popular and practical problem-solution-discussion O'Reilly cookbook format contains a clear and thorough description of the problem, a concise but complete discussion of a solution, and real-world examples that illustrate that solution. The Snort Cookbook covers important issues that sys admins and security pros will us everyday, such as: installation optimization logging alerting rules and signatures detecting viruses countermeasures detecting common attacks administration honeypots log analysis But the Snort Cookbook offers far more than quick cut-and-paste solutions to frustrating security issues. Those who learn best in the trenches--and don't have the hours to spare to pore over tutorials or troll online for best-practice snippets of advice--will find that the solutions offered in this ultimate Snort sourcebook not only solve immediate problems quickly, but also showcase the best tips and tricks they need to master be security gurus--and still have a life.
    Note: "Solutions and examples for Snort administrators"--Cover. - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...