Hack proofing XML:
The only way to stop a hacker is to think like one! The World Wide Web Consortium's Extensible Markup Language (XML) is quickly becoming the new standard for data formatting and Internet development. XML is expected to be as important to the future of the Web as HTML has been to the foundation...
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Rockland, Mass. London
Syngress Media International Thomson
© 2002
|
Schlagworte: | |
Online-Zugang: | FLA01 URL des Erstveröffentlichers |
Zusammenfassung: | The only way to stop a hacker is to think like one! The World Wide Web Consortium's Extensible Markup Language (XML) is quickly becoming the new standard for data formatting and Internet development. XML is expected to be as important to the future of the Web as HTML has been to the foundation of the Web, and has proven itself to be the most common tool for all data manipulation and data transmission. Hack Proofing XML provides readers with hands-on instruction for how to secure the Web transmission and access of their XML data. This book will also introduce database administrators, web developers and web masters to ways they can use XML to secure other applications and processes. The first book to incorporate standards from both the Security Services Markup Language (S2ML) and the Organization for the Advancement of Structured Information Standards (OASIS) in one comprehensive book Covers the four primary security objectives: Confidentiality, Integrity, Authentication and Non-repudiation Not only shows readers how to secure their XML data, but describes how to provide enhanced security for a broader range of applications and processes |
Beschreibung: | Includes index |
Beschreibung: | 1 online resource (xxii, 377 pages) illustrations |
ISBN: | 9781931836500 1931836507 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046124545 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 190827s2002 |||| o||u| ||||||eng d | ||
020 | |a 9781931836500 |9 978-1-931836-50-0 | ||
020 | |a 1931836507 |9 1-931836-50-7 | ||
035 | |a (ZDB-33-ESD)ocn162598827 | ||
035 | |a (OCoLC)162598827 | ||
035 | |a (DE-599)BVBBV046124545 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 22 | |
245 | 1 | 0 | |a Hack proofing XML |c 'ken'@ftu [and others] |
264 | 1 | |a Rockland, Mass. |a London |b Syngress Media |b International Thomson |c © 2002 | |
300 | |a 1 online resource (xxii, 377 pages) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
520 | |a The only way to stop a hacker is to think like one! The World Wide Web Consortium's Extensible Markup Language (XML) is quickly becoming the new standard for data formatting and Internet development. XML is expected to be as important to the future of the Web as HTML has been to the foundation of the Web, and has proven itself to be the most common tool for all data manipulation and data transmission. Hack Proofing XML provides readers with hands-on instruction for how to secure the Web transmission and access of their XML data. This book will also introduce database administrators, web developers and web masters to ways they can use XML to secure other applications and processes. The first book to incorporate standards from both the Security Services Markup Language (S2ML) and the Organization for the Advancement of Structured Information Standards (OASIS) in one comprehensive book Covers the four primary security objectives: Confidentiality, Integrity, Authentication and Non-repudiation Not only shows readers how to secure their XML data, but describes how to provide enhanced security for a broader range of applications and processes | ||
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a XML (Document markup language) |2 fast | |
650 | 4 | |a XML (Document markup language) | |
650 | 4 | |a Computer security | |
700 | 0 | |a 'Ken'@ftu |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781931836500 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031504999 | ||
966 | e | |u http://www.sciencedirect.com/science/book/9781931836500 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180442684850176 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV046124545 |
collection | ZDB-33-ESD |
ctrlnum | (ZDB-33-ESD)ocn162598827 (OCoLC)162598827 (DE-599)BVBBV046124545 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02504nmm a2200385zc 4500</leader><controlfield tag="001">BV046124545</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2002 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781931836500</subfield><subfield code="9">978-1-931836-50-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1931836507</subfield><subfield code="9">1-931836-50-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocn162598827</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)162598827</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046124545</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Hack proofing XML</subfield><subfield code="c">'ken'@ftu [and others]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, Mass.</subfield><subfield code="a">London</subfield><subfield code="b">Syngress Media</subfield><subfield code="b">International Thomson</subfield><subfield code="c">© 2002</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxii, 377 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The only way to stop a hacker is to think like one! The World Wide Web Consortium's Extensible Markup Language (XML) is quickly becoming the new standard for data formatting and Internet development. XML is expected to be as important to the future of the Web as HTML has been to the foundation of the Web, and has proven itself to be the most common tool for all data manipulation and data transmission. Hack Proofing XML provides readers with hands-on instruction for how to secure the Web transmission and access of their XML data. This book will also introduce database administrators, web developers and web masters to ways they can use XML to secure other applications and processes. The first book to incorporate standards from both the Security Services Markup Language (S2ML) and the Organization for the Advancement of Structured Information Standards (OASIS) in one comprehensive book Covers the four primary security objectives: Confidentiality, Integrity, Authentication and Non-repudiation Not only shows readers how to secure their XML data, but describes how to provide enhanced security for a broader range of applications and processes</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">XML (Document markup language)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">XML (Document markup language)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">'Ken'@ftu</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781931836500</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031504999</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781931836500</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046124545 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:35:50Z |
institution | BVB |
isbn | 9781931836500 1931836507 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031504999 |
oclc_num | 162598827 |
open_access_boolean | |
physical | 1 online resource (xxii, 377 pages) illustrations |
psigel | ZDB-33-ESD ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2002 |
publishDateSearch | 2002 |
publishDateSort | 2002 |
publisher | Syngress Media International Thomson |
record_format | marc |
spelling | Hack proofing XML 'ken'@ftu [and others] Rockland, Mass. London Syngress Media International Thomson © 2002 1 online resource (xxii, 377 pages) illustrations txt rdacontent c rdamedia cr rdacarrier Includes index The only way to stop a hacker is to think like one! The World Wide Web Consortium's Extensible Markup Language (XML) is quickly becoming the new standard for data formatting and Internet development. XML is expected to be as important to the future of the Web as HTML has been to the foundation of the Web, and has proven itself to be the most common tool for all data manipulation and data transmission. Hack Proofing XML provides readers with hands-on instruction for how to secure the Web transmission and access of their XML data. This book will also introduce database administrators, web developers and web masters to ways they can use XML to secure other applications and processes. The first book to incorporate standards from both the Security Services Markup Language (S2ML) and the Organization for the Advancement of Structured Information Standards (OASIS) in one comprehensive book Covers the four primary security objectives: Confidentiality, Integrity, Authentication and Non-repudiation Not only shows readers how to secure their XML data, but describes how to provide enhanced security for a broader range of applications and processes Computer security fast XML (Document markup language) fast XML (Document markup language) Computer security 'Ken'@ftu Sonstige oth http://www.sciencedirect.com/science/book/9781931836500 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Hack proofing XML Computer security fast XML (Document markup language) fast XML (Document markup language) Computer security |
title | Hack proofing XML |
title_auth | Hack proofing XML |
title_exact_search | Hack proofing XML |
title_full | Hack proofing XML 'ken'@ftu [and others] |
title_fullStr | Hack proofing XML 'ken'@ftu [and others] |
title_full_unstemmed | Hack proofing XML 'ken'@ftu [and others] |
title_short | Hack proofing XML |
title_sort | hack proofing xml |
topic | Computer security fast XML (Document markup language) fast XML (Document markup language) Computer security |
topic_facet | Computer security XML (Document markup language) |
url | http://www.sciencedirect.com/science/book/9781931836500 |
work_keys_str_mv | AT kenftu hackproofingxml |