Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Item TypeItem Type
-
SubjectSubject
-
YearFrom:-To:
-
More FiltersMore FiltersSourceLanguage
Done
Filters
Reset
145
result(s) for
"Web site development -- Security measures"
Sort by:
Hacking web apps : detecting and preventing web application security problems
by
Shema, Mike
in
Application software
,
Application software -- Security measures
,
Computer crimes
2012
How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike let you in on the anatomy of these attacks, but he also tells you how to get rid of these worms, trojans, and botnets and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include: . SQL Injection . Cross Site Scripting . Logic Attacks . Server Misconfigurations . Predictable Pages . Web of Distrust . Breaking Authentication Schemes . HTML5 Security Breaches . Attacks on Mobile Apps Even if you don't develop web sites or write HTML, Hacking Web Apps can still help you learn how sites are attacked-as well as the best way to defend against these attacks. Plus, Hacking Web Apps gives you detailed steps to make the web browser - sometimes your last line of defense - more secure.
More and more data, from finances to photos, is moving into web applications. How much can you trust that data to be accessible from a web browser anywhere and safe at the same time? Some of the most damaging hacks to a web site can be executed with nothing more than a web browser and a little knowledge of HTML. Learn about the most common threats and how to stop them, including HTML Injection, XSS, Cross Site Request Forgery, SQL Injection, Breaking Authentication Schemes, Logic Attacks, Web of Distrust, Browser Hacks and many more.
Web application defender's cookbook
2012,2013
Defending your web applications against hackers and attackers The top-selling book Web Application Hacker's Handbook showed how attackers and hackers identify and attack vulnerable live web applications. This new Web Application Defender's Cookbook is the perfect counterpoint to that book: it shows you how to defend. Authored by a highly credentialed defensive security expert, this new book details defensive security methods and can be used as courseware for training network security personnel, web server administrators, and security consultants. Each \"recipe\" shows you a way to detect and defend against malicious behavior and provides working code examples for the ModSecurity web application firewall module. Topics include identifying vulnerabilities, setting hacker traps, defending different access points, enforcing application flows, and much more. Provides practical tactics for detecting web attacks and malicious behavior and defending against them Written by a preeminent authority on web application firewall technology and web application defense tactics Offers a series of \"recipes\" that include working code examples for the open-source ModSecurity web application firewall module Find the tools, techniques, and expert information you need to detect and respond to web application attacks with Web Application Defender's Cookbook: Battling Hackers and Protecting Users.
How to Attack and Defend Your Website
2014,2015
How to Attack and Defend Your Website is a concise introduction to web security that includes hands-on web hacking tutorials.The book has three primary objectives: to help readers develop a deep understanding of what is happening behind the scenes in a web application, with a focus on the HTTP protocol and other underlying web technologies; to.
Joomla! web security
by
Canavan, Tom
in
Web Development
2008
This book will give you a strong, hands-on approach to security. It starts out with the most basic of considerations such as choosing the right hosting sites then moves quickly into securing the Joomla! site and servers. This is a security handbook for Joomla! sites. It is an easy-to-use guide that will take you step by step into the world of secured websites. This book is a must-read for anyone seriously using Joomla! for any kind of business, ranging from small retailers to larger businesses. With this book they will be able to secure their sites, understand the attackers, and more, without the drudging task of looking up in forums, only to be flamed, or not even find the answers. Prior knowledge of Joomla! is expected but no prior knowledge of securing websites is needed for this book. The reader will gain a moderate to strong level of knowledge on strengthening their sites against hackers.
Joomla! Web Security
2008
In Detail
Joomla! is one of the most powerful open-source content management systems used to build websites and other powerful online applications. While Joomla! itself is inherently safe, misconfigurations, vulnerable components, poorly configured hosts, and weak passwords can all contribute to the downfall of your site. So, you need to know how to secure your website from security threats.
Today every website needs to take security into consideration. Using the knowledge here, your Joomla! site can be ahead of the security threats so prevalent today.
This book will take you all the way from the most basic steps of preparation to the nuts and bolts of actual protection. It is packed full of relevant and real-world topics such as security tools, configuration suggestions, setting up your test and development environment, reading and interpreting log files, and techniques used by bad hackers on the Internet. In addition to this you will learn how to respond to a site emergency should one occur and how to collect the evidence needed to pursue law enforcement action. This book covers Joomla! 1.0.x as well as 1.5.x.
The book provides a concise overview of all the parts needed to construct a defence-in-depth strategy for your Joomla! site. At the end of the book you will have a solid security foundation to take your Joomla! website to a higher level of security than the basic site setup.
Are you concerned about the security of your Joomla! website and you don't know what to do? - read this easy-to-use practical guide and learn how to implement strong security measures.
Book Reviews
Slashdot: \"There is a ton of good information here and I recommend the book.\"
Mylro.org: \"Technical books can be sometimes boring, especially when they talk about things you already know. This is not the case with Joomla! Web Security. I enjoyed Tom Canavan's detached writing style and I learned some interesting things that I applied to all my Joomla! websites. What I especially liked was the fact that the book discusses not only the Joomla! part of a website but also the server side and gives some nice hosting tips. If you're a junior or intermediate Joomla! user I would highly recommend it.\"
JoomlaNYC: \"This is \"a must\" read book for all people that care about the security of a website. The book offers an excellent primer on basic web-security. It is written for the person who has not yet mastered the skills needed to properly secure a website.\"
Approach
This book will give you a strong, hands-on approach to security. It starts out with the most basic of considerations such as choosing the right hosting sites then moves quickly into securing the Joomla! site and servers. This is a security handbook for Joomla! sites. It is an easy-to-use guide that will take you step by step into the world of secured websites.
Who this book is for
This book is a must-read for anyone seriously using Joomla! for any kind of business, ranging from small retailers to larger businesses. With this book they will be able to secure their sites, understand the attackers, and more, without the drudging task of looking up in forums, only to be flamed, or not even find the answers.
Prior knowledge of Joomla! is expected but no prior knowledge of securing websites is needed for this book. The reader will gain a moderate to strong level of knowledge on strengthening their sites against hackers.
The Ethics of Online Retailing: A Scale Development and Validation from the Consumers' Perspective
2007
While e-commerce has witnessed extensive growth in recent years, so has consumers' concerns regarding ethical issues surrounding online shopping. The vast majority of earlier research on this area is conceptual in nature, and limited in scope by focusing on consumers' privacy issues. This study develops a reliable and valid scale to measure consumers' perceptions regarding the ethics of online retailers (CPEOR). Findings indicate that the four factors of the scale - security, privacy, non-deception and fulfillment/reliability - are strongly predictive of online consumers' satisfaction and trust. The results offer important implications for e-retailers and are likely to stimulate further research in the area of e-ethics from the consumers' perspective.
Journal Article
Teaching Web Security using Portable Virtual Labs
2012
We have developed a tool called Secure WEb dEvelopment Teaching (SWEET) to introduce security concepts and practices for web application development. This tool provides introductory tutorials, teaching modules utilizing virtualized hands-on exercises, and project ideas in web application security. In addition, the tool provides pre-configured virtual computer for laboratory exercises. This paper described the design of the tool and the resources it offers to instructors. We also discussed a hands-on course module on cryptography.
Journal Article
CORS essentials
2017
Share code and assets across domains in Web applications with CORS About This Book • A step-by-step guide but at a high level/fast pace. Not all steps are covered as a basic knowledge is assumed • Provides a basic overview of the concepts but the focus is on providing the practical skills required to develop applications • Focuses on providing practical examples Who This Book Is For Web developers have been limited by the Same Origin Policy and often wish they could spread their application across different domains. You know JavaScript and AJAX, and have run up against the Same Domain Policy, which is limiting your applications. What You Will Learn • Why you need CORS: Bending the Same Origin Policy and basic CORS implementation, headers and XMLHttpRequest • Creating proxies for CORS: Sometimes the header is not enough • Security: vulnerabilities and how to secure your CORS application • CORS implementations in Content Management systems • Learn about CORS in Windows applications • Take CORS on the Cloud • Apply CORS in Node.js • Best practices for CORS In Detail This book explains how to use CORS, including specific implementations for platforms such as Drupal, WordPress, IIS Server, ASP.NET, JBoss, Windows Azure, and Salesforce, as well as how to use CORS in the Cloud on Amazon AWS, YouTube, Mulesoft, and others. It examines limitations, security risks, and alternatives to CORS. It explores the W3C Specification and major developer documentation sources about CORS. It attempts to predict what kinds of extension to the CORS specification, or completely new techniques, will come in the future to address the limitations of CORS Web developers will learn how to share code and assets across domains with CORS. They will learn a variety of techniques that are rather similar in their method and syntax. The book is organized by similar types of framework and application, so it can be used as a reference. Developers will learn about special cases, such as when a proxy is necessary. And they will learn about some alternative techniques that achieve similar goals, and when they may be preferable to using CORS Style and approach A step-by-step guide filled with real-world applications
Japanese health and safety information for overseas visitors: protocol for a randomized controlled trial
2021
Background
Before the COVID-19 pandemic occurred in January 2020, the number of overseas visitors to Japan had increased threefold over the last decade. To minimize the risk of health problems, visitors should be able to access information on the health care systems of the places they visit. Most short-term overseas visitors are young adults. Although they are not very likely to get sick from noncommunicable diseases, they are at high risk for injury and often experience stomach ailments, fever, or nausea when travelling. The objective of this study is to evaluate culturally and linguistically appropriate health information on preventive health behaviours and the health care system in Japan. We will examine the level of satisfaction of overseas visitors to Japan with health care-related educational materials using a five-minute digital game named
Sa-Chan Japan.
Methods
Our study is a randomized controlled trial (RCT). We will assess both satisfaction and motivation before, during, and after the interventions and examine the changes over time. The intervention group will comprise overseas visitors who will view and answer questions in an animation named
Sa-Chan Japan
. The control group will comprise overseas visitors who will watch an English digital animation named
Mari Info Japan
. We will recruit 1002 participants through the
Macromill
Internet portal. We will contact overseas visitors who have either visited or wish to visit Japan from the United Kingdom, United States, and Australia. The participants will fill out a self-administered questionnaire online in the first quarter of 2021. We will determine the participants’ levels of satisfaction with the CSQ-8 (8-item Client Satisfaction Questionnaire). We will analyse the median score of the overseas visitors with both the Wilcoxon rank-sum and the Wilcoxon signed-rank tests. Our protocol of randomized controlled trials follows the SPIRIT guidelines.
Discussion
Our research will utilize unique digital education strategies in a game that promotes health and safety among overseas visitors to Japan. We believe the results of this study will be useful in overcoming the current challenges regarding pretravel health requirements for overseas visitors worldwide.
Trial registration
Version 1 of this trial was registered in the UMIN-CTR (University Hospital Medical Information Network Center Clinical Trials Registry), and the trial registration data are available on
UMIN000042483
, November 17, 2020.
Journal Article