Security technologies for the World Wide Web /:
"This hands-on book gives you a comprehensive analysis of current trends in WWW security, plus an evaluation of existing technologies, such as anonymity services and security products. It helps you guarantee that electronic commerce applications on your website are executed with the utmost secu...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Boston, MA :
Artech House,
©2000.
|
Schriftenreihe: | Artech House computer security series.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "This hands-on book gives you a comprehensive analysis of current trends in WWW security, plus an evaluation of existing technologies, such as anonymity services and security products. It helps you guarantee that electronic commerce applications on your website are executed with the utmost security and protection. What's more, it helps you understand content protection and the benefits and drawbacks of censorship on the web."--BOOK JACKET. "Geared toward proactive Internet security professionals, this handy resource helps you comprehend existing security technologies, evaluate and choose those that best suit your needs, understand corresponding software and hardware, and more."--Jacket |
Beschreibung: | "Artech House computing library." |
Beschreibung: | 1 online resource (xxi, 419 pages) : illustrations |
Format: | Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 0585337659 9780585337654 1580530451 9781580530453 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocm45843371 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 010126s2000 maua ob 001 0 eng d | ||
040 | |a N$T |b eng |e pn |c N$T |d OCL |d OCLCQ |d YDXCP |d OCLCQ |d EXW |d HNW |d OCLCQ |d TUU |d OCLCQ |d ZCU |d OCLCO |d QT5 |d OCLCE |d W2U |d OCLCF |d OCLCQ |d OCLCO |d OCLCQ |d Z5A |d JBG |d OCLCQ |d SAV |d ICD |d QT7 |d OCLCQ |d OCLCA |d LUE |d CEF |d OCLCQ |d INT |d OCLCQ |d LHU |d BRX |d JX9 |d UMK |d VDB |d CHBRC |d UKEHC |d OCLCO |d OCLCQ |d IOY |d OCLCQ |d CAUOI |d D6H |d OCLCQ |d OCLCO | ||
019 | |a 533131029 |a 607360361 |a 607770620 |a 612802996 |a 758976223 |a 961609764 |a 962723277 |a 988817971 |a 1004486126 |a 1004803935 |a 1005044953 |a 1007382942 |a 1008891387 |a 1013736884 |a 1017968341 |a 1021218022 |a 1044055290 |a 1053018918 |a 1055841628 |a 1071925738 |a 1084492983 |a 1087302248 |a 1108904366 |a 1123226998 |a 1127916741 |a 1135426126 |a 1200055615 |a 1320983083 |a 1331422485 | ||
020 | |a 0585337659 |q (electronic bk.) | ||
020 | |a 9780585337654 |q (electronic bk.) | ||
020 | |a 1580530451 |q (alk. paper) | ||
020 | |a 9781580530453 |q (alk. paper) | ||
035 | |a (OCoLC)45843371 |z (OCoLC)533131029 |z (OCoLC)607360361 |z (OCoLC)607770620 |z (OCoLC)612802996 |z (OCoLC)758976223 |z (OCoLC)961609764 |z (OCoLC)962723277 |z (OCoLC)988817971 |z (OCoLC)1004486126 |z (OCoLC)1004803935 |z (OCoLC)1005044953 |z (OCoLC)1007382942 |z (OCoLC)1008891387 |z (OCoLC)1013736884 |z (OCoLC)1017968341 |z (OCoLC)1021218022 |z (OCoLC)1044055290 |z (OCoLC)1053018918 |z (OCoLC)1055841628 |z (OCoLC)1071925738 |z (OCoLC)1084492983 |z (OCoLC)1087302248 |z (OCoLC)1108904366 |z (OCoLC)1123226998 |z (OCoLC)1127916741 |z (OCoLC)1135426126 |z (OCoLC)1200055615 |z (OCoLC)1320983083 |z (OCoLC)1331422485 | ||
042 | |a dlr | ||
050 | 4 | |a QA76.9.A25 |b O68 1999eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 21 | |
084 | |a 54.65 |2 bcl | ||
049 | |a MAIN | ||
100 | 1 | |a Oppliger, Rolf. | |
245 | 1 | 0 | |a Security technologies for the World Wide Web / |c Rolf Oppliger. |
260 | |a Boston, MA : |b Artech House, |c ©2000. | ||
300 | |a 1 online resource (xxi, 419 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file | ||
347 | |b PDF | ||
490 | 1 | |a Artech House computer security series | |
500 | |a "Artech House computing library." | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | 0 | |t Internet -- |t WWW -- |t Vulnerabilities, threats, and countermeasures -- |t Generic security model -- |t Security policy -- |t Host security -- |t Network security -- |t Organizational security -- |t Legal security -- |t HTTP Security -- |t HTTP -- |t User authentication, authorization, and access control -- |t Basic authentication -- |t Digest access authentication -- |t Certificate-based authentication -- |t Sever configuration -- |t Configuring HTTP basic authentication -- |t Configuring HTTP digest access authentication -- |t Proxy Servers and Firewalls -- |t Static packet filtering -- |t Dynamic packet filtering or stateful inspection -- |t Circuit-level gateways -- |t Application-level gateways -- |t Firewall configurations -- |t Dual-homed firewall -- |t Screened host firewall -- |t Screened subnet firewall -- |t Network address translation -- |t Configuring the browser -- |t Cryptographic Techniques -- |t Cryptographic hash functions -- |t Secret key cryptography -- |t DES -- |t Triple-DES -- |t IDEA -- |t SAFER -- |t Blowfish -- |t CAST-128 -- |t RC2, RC4, RC5, and RC6 -- |t AES -- |t Public key cryptography -- |t RSA -- |t Diffie-Hellman -- |t ElGamal -- |t DSS -- |t ECC -- |t Digital envelopes -- |t Protection of cryptographic keys -- |t Generation of pseudorandom bit sequences -- |t Legal issues -- |t Patent claims -- |t Regulations -- |t Electronic and digital signature legislation -- |t Internet Security Protocols -- |t Network access layer security protocols -- |t Layer 2 Forwarding Protocol -- |t Point-to-Point Tunneling Protocol -- |t Layer 2 Tunneling Protocol -- |t Virtual private networking -- |t Internet layer security protocols -- |t IP security architecture. |
506 | |3 Use copy |f Restrictions unspecified |2 star |5 MiAaHDL | ||
533 | |a Electronic reproduction. |b [Place of publication not identified] : |c HathiTrust Digital Library, |d 2010. |5 MiAaHDL | ||
538 | |a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. |u http://purl.oclc.org/DLF/benchrepro0212 |5 MiAaHDL | ||
583 | 1 | |a digitized |c 2010 |h HathiTrust Digital Library |l committed to preserve |2 pda |5 MiAaHDL | |
588 | 0 | |a Print version record. | |
520 | 1 | |a "This hands-on book gives you a comprehensive analysis of current trends in WWW security, plus an evaluation of existing technologies, such as anonymity services and security products. It helps you guarantee that electronic commerce applications on your website are executed with the utmost security and protection. What's more, it helps you understand content protection and the benefits and drawbacks of censorship on the web."--BOOK JACKET. "Geared toward proactive Internet security professionals, this handy resource helps you comprehend existing security technologies, evaluate and choose those that best suit your needs, understand corresponding software and hardware, and more."--Jacket | |
650 | 0 | |a Computer security. | |
650 | 0 | |a World Wide Web |x Security measures. | |
650 | 6 | |a Sécurité informatique. | |
650 | 6 | |a Web |x Sécurité |x Mesures. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a World Wide Web |x Security measures |2 fast | |
650 | 1 | 7 | |a World wide web. |2 gtt |
650 | 1 | 7 | |a Beveiliging. |2 gtt |
776 | 0 | 8 | |i Print version: |a Oppliger, Rolf. |t Security technologies for the World Wide Web. |d Boston, MA : Artech House, ©2000 |z 1580530451 |w (DLC) 99045835 |w (OCoLC)42295827 |
830 | 0 | |a Artech House computer security series. |0 http://id.loc.gov/authorities/names/no00015115 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=42390 |3 Volltext |
936 | |a BATCHLOAD | ||
938 | |a EBSCOhost |b EBSC |n 42390 | ||
938 | |a YBP Library Services |b YANK |n 2323101 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocm45843371 |
---|---|
_version_ | 1816881593257558016 |
adam_text | |
any_adam_object | |
author | Oppliger, Rolf |
author_facet | Oppliger, Rolf |
author_role | |
author_sort | Oppliger, Rolf |
author_variant | r o ro |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 O68 1999eb |
callnumber-search | QA76.9.A25 O68 1999eb |
callnumber-sort | QA 276.9 A25 O68 41999EB |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Internet -- WWW -- Vulnerabilities, threats, and countermeasures -- Generic security model -- Security policy -- Host security -- Network security -- Organizational security -- Legal security -- HTTP Security -- HTTP -- User authentication, authorization, and access control -- Basic authentication -- Digest access authentication -- Certificate-based authentication -- Sever configuration -- Configuring HTTP basic authentication -- Configuring HTTP digest access authentication -- Proxy Servers and Firewalls -- Static packet filtering -- Dynamic packet filtering or stateful inspection -- Circuit-level gateways -- Application-level gateways -- Firewall configurations -- Dual-homed firewall -- Screened host firewall -- Screened subnet firewall -- Network address translation -- Configuring the browser -- Cryptographic Techniques -- Cryptographic hash functions -- Secret key cryptography -- DES -- Triple-DES -- IDEA -- SAFER -- Blowfish -- CAST-128 -- RC2, RC4, RC5, and RC6 -- AES -- Public key cryptography -- RSA -- Diffie-Hellman -- ElGamal -- DSS -- ECC -- Digital envelopes -- Protection of cryptographic keys -- Generation of pseudorandom bit sequences -- Legal issues -- Patent claims -- Regulations -- Electronic and digital signature legislation -- Internet Security Protocols -- Network access layer security protocols -- Layer 2 Forwarding Protocol -- Point-to-Point Tunneling Protocol -- Layer 2 Tunneling Protocol -- Virtual private networking -- Internet layer security protocols -- IP security architecture. |
ctrlnum | (OCoLC)45843371 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06366cam a2200721 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocm45843371 </controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">010126s2000 maua ob 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">OCL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">EXW</subfield><subfield code="d">HNW</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">TUU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">ZCU</subfield><subfield code="d">OCLCO</subfield><subfield code="d">QT5</subfield><subfield code="d">OCLCE</subfield><subfield code="d">W2U</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">Z5A</subfield><subfield code="d">JBG</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">SAV</subfield><subfield code="d">ICD</subfield><subfield code="d">QT7</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCA</subfield><subfield code="d">LUE</subfield><subfield code="d">CEF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">INT</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">LHU</subfield><subfield code="d">BRX</subfield><subfield code="d">JX9</subfield><subfield code="d">UMK</subfield><subfield code="d">VDB</subfield><subfield code="d">CHBRC</subfield><subfield code="d">UKEHC</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">IOY</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">CAUOI</subfield><subfield code="d">D6H</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">533131029</subfield><subfield code="a">607360361</subfield><subfield code="a">607770620</subfield><subfield code="a">612802996</subfield><subfield code="a">758976223</subfield><subfield code="a">961609764</subfield><subfield code="a">962723277</subfield><subfield code="a">988817971</subfield><subfield code="a">1004486126</subfield><subfield code="a">1004803935</subfield><subfield code="a">1005044953</subfield><subfield code="a">1007382942</subfield><subfield code="a">1008891387</subfield><subfield code="a">1013736884</subfield><subfield code="a">1017968341</subfield><subfield code="a">1021218022</subfield><subfield code="a">1044055290</subfield><subfield code="a">1053018918</subfield><subfield code="a">1055841628</subfield><subfield code="a">1071925738</subfield><subfield code="a">1084492983</subfield><subfield code="a">1087302248</subfield><subfield code="a">1108904366</subfield><subfield code="a">1123226998</subfield><subfield code="a">1127916741</subfield><subfield code="a">1135426126</subfield><subfield code="a">1200055615</subfield><subfield code="a">1320983083</subfield><subfield code="a">1331422485</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0585337659</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780585337654</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1580530451</subfield><subfield code="q">(alk. paper)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781580530453</subfield><subfield code="q">(alk. paper)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)45843371</subfield><subfield code="z">(OCoLC)533131029</subfield><subfield code="z">(OCoLC)607360361</subfield><subfield code="z">(OCoLC)607770620</subfield><subfield code="z">(OCoLC)612802996</subfield><subfield code="z">(OCoLC)758976223</subfield><subfield code="z">(OCoLC)961609764</subfield><subfield code="z">(OCoLC)962723277</subfield><subfield code="z">(OCoLC)988817971</subfield><subfield code="z">(OCoLC)1004486126</subfield><subfield code="z">(OCoLC)1004803935</subfield><subfield code="z">(OCoLC)1005044953</subfield><subfield code="z">(OCoLC)1007382942</subfield><subfield code="z">(OCoLC)1008891387</subfield><subfield code="z">(OCoLC)1013736884</subfield><subfield code="z">(OCoLC)1017968341</subfield><subfield code="z">(OCoLC)1021218022</subfield><subfield code="z">(OCoLC)1044055290</subfield><subfield code="z">(OCoLC)1053018918</subfield><subfield code="z">(OCoLC)1055841628</subfield><subfield code="z">(OCoLC)1071925738</subfield><subfield code="z">(OCoLC)1084492983</subfield><subfield code="z">(OCoLC)1087302248</subfield><subfield code="z">(OCoLC)1108904366</subfield><subfield code="z">(OCoLC)1123226998</subfield><subfield code="z">(OCoLC)1127916741</subfield><subfield code="z">(OCoLC)1135426126</subfield><subfield code="z">(OCoLC)1200055615</subfield><subfield code="z">(OCoLC)1320983083</subfield><subfield code="z">(OCoLC)1331422485</subfield></datafield><datafield tag="042" ind1=" " ind2=" "><subfield code="a">dlr</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">O68 1999eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">21</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">54.65</subfield><subfield code="2">bcl</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Oppliger, Rolf.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security technologies for the World Wide Web /</subfield><subfield code="c">Rolf Oppliger.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Boston, MA :</subfield><subfield code="b">Artech House,</subfield><subfield code="c">©2000.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxi, 419 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="b">PDF</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Artech House computer security series</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Artech House computing library."</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Internet --</subfield><subfield code="t">WWW --</subfield><subfield code="t">Vulnerabilities, threats, and countermeasures --</subfield><subfield code="t">Generic security model --</subfield><subfield code="t">Security policy --</subfield><subfield code="t">Host security --</subfield><subfield code="t">Network security --</subfield><subfield code="t">Organizational security --</subfield><subfield code="t">Legal security --</subfield><subfield code="t">HTTP Security --</subfield><subfield code="t">HTTP --</subfield><subfield code="t">User authentication, authorization, and access control --</subfield><subfield code="t">Basic authentication --</subfield><subfield code="t">Digest access authentication --</subfield><subfield code="t">Certificate-based authentication --</subfield><subfield code="t">Sever configuration --</subfield><subfield code="t">Configuring HTTP basic authentication --</subfield><subfield code="t">Configuring HTTP digest access authentication --</subfield><subfield code="t">Proxy Servers and Firewalls --</subfield><subfield code="t">Static packet filtering --</subfield><subfield code="t">Dynamic packet filtering or stateful inspection --</subfield><subfield code="t">Circuit-level gateways --</subfield><subfield code="t">Application-level gateways --</subfield><subfield code="t">Firewall configurations --</subfield><subfield code="t">Dual-homed firewall --</subfield><subfield code="t">Screened host firewall --</subfield><subfield code="t">Screened subnet firewall --</subfield><subfield code="t">Network address translation --</subfield><subfield code="t">Configuring the browser --</subfield><subfield code="t">Cryptographic Techniques --</subfield><subfield code="t">Cryptographic hash functions --</subfield><subfield code="t">Secret key cryptography --</subfield><subfield code="t">DES --</subfield><subfield code="t">Triple-DES --</subfield><subfield code="t">IDEA --</subfield><subfield code="t">SAFER --</subfield><subfield code="t">Blowfish --</subfield><subfield code="t">CAST-128 --</subfield><subfield code="t">RC2, RC4, RC5, and RC6 --</subfield><subfield code="t">AES --</subfield><subfield code="t">Public key cryptography --</subfield><subfield code="t">RSA --</subfield><subfield code="t">Diffie-Hellman --</subfield><subfield code="t">ElGamal --</subfield><subfield code="t">DSS --</subfield><subfield code="t">ECC --</subfield><subfield code="t">Digital envelopes --</subfield><subfield code="t">Protection of cryptographic keys --</subfield><subfield code="t">Generation of pseudorandom bit sequences --</subfield><subfield code="t">Legal issues --</subfield><subfield code="t">Patent claims --</subfield><subfield code="t">Regulations --</subfield><subfield code="t">Electronic and digital signature legislation --</subfield><subfield code="t">Internet Security Protocols --</subfield><subfield code="t">Network access layer security protocols --</subfield><subfield code="t">Layer 2 Forwarding Protocol --</subfield><subfield code="t">Point-to-Point Tunneling Protocol --</subfield><subfield code="t">Layer 2 Tunneling Protocol --</subfield><subfield code="t">Virtual private networking --</subfield><subfield code="t">Internet layer security protocols --</subfield><subfield code="t">IP security architecture.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="3">Use copy</subfield><subfield code="f">Restrictions unspecified</subfield><subfield code="2">star</subfield><subfield code="5">MiAaHDL</subfield></datafield><datafield tag="533" ind1=" " ind2=" "><subfield code="a">Electronic reproduction.</subfield><subfield code="b">[Place of publication not identified] :</subfield><subfield code="c">HathiTrust Digital Library,</subfield><subfield code="d">2010.</subfield><subfield code="5">MiAaHDL</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.</subfield><subfield code="u">http://purl.oclc.org/DLF/benchrepro0212</subfield><subfield code="5">MiAaHDL</subfield></datafield><datafield tag="583" ind1="1" ind2=" "><subfield code="a">digitized</subfield><subfield code="c">2010</subfield><subfield code="h">HathiTrust Digital Library</subfield><subfield code="l">committed to preserve</subfield><subfield code="2">pda</subfield><subfield code="5">MiAaHDL</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="520" ind1="1" ind2=" "><subfield code="a">"This hands-on book gives you a comprehensive analysis of current trends in WWW security, plus an evaluation of existing technologies, such as anonymity services and security products. It helps you guarantee that electronic commerce applications on your website are executed with the utmost security and protection. What's more, it helps you understand content protection and the benefits and drawbacks of censorship on the web."--BOOK JACKET. "Geared toward proactive Internet security professionals, this handy resource helps you comprehend existing security technologies, evaluate and choose those that best suit your needs, understand corresponding software and hardware, and more."--Jacket</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">World Wide Web</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Web</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">World Wide Web</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1="1" ind2="7"><subfield code="a">World wide web.</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1="1" ind2="7"><subfield code="a">Beveiliging.</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Oppliger, Rolf.</subfield><subfield code="t">Security technologies for the World Wide Web.</subfield><subfield code="d">Boston, MA : Artech House, ©2000</subfield><subfield code="z">1580530451</subfield><subfield code="w">(DLC) 99045835</subfield><subfield code="w">(OCoLC)42295827</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Artech House computer security series.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no00015115</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=42390</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="936" ind1=" " ind2=" "><subfield code="a">BATCHLOAD</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">42390</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2323101</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocm45843371 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:15:11Z |
institution | BVB |
isbn | 0585337659 9780585337654 1580530451 9781580530453 |
language | English |
oclc_num | 45843371 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xxi, 419 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2000 |
publishDateSearch | 2000 |
publishDateSort | 2000 |
publisher | Artech House, |
record_format | marc |
series | Artech House computer security series. |
series2 | Artech House computer security series |
spelling | Oppliger, Rolf. Security technologies for the World Wide Web / Rolf Oppliger. Boston, MA : Artech House, ©2000. 1 online resource (xxi, 419 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier text file Artech House computer security series "Artech House computing library." Includes bibliographical references and index. Internet -- WWW -- Vulnerabilities, threats, and countermeasures -- Generic security model -- Security policy -- Host security -- Network security -- Organizational security -- Legal security -- HTTP Security -- HTTP -- User authentication, authorization, and access control -- Basic authentication -- Digest access authentication -- Certificate-based authentication -- Sever configuration -- Configuring HTTP basic authentication -- Configuring HTTP digest access authentication -- Proxy Servers and Firewalls -- Static packet filtering -- Dynamic packet filtering or stateful inspection -- Circuit-level gateways -- Application-level gateways -- Firewall configurations -- Dual-homed firewall -- Screened host firewall -- Screened subnet firewall -- Network address translation -- Configuring the browser -- Cryptographic Techniques -- Cryptographic hash functions -- Secret key cryptography -- DES -- Triple-DES -- IDEA -- SAFER -- Blowfish -- CAST-128 -- RC2, RC4, RC5, and RC6 -- AES -- Public key cryptography -- RSA -- Diffie-Hellman -- ElGamal -- DSS -- ECC -- Digital envelopes -- Protection of cryptographic keys -- Generation of pseudorandom bit sequences -- Legal issues -- Patent claims -- Regulations -- Electronic and digital signature legislation -- Internet Security Protocols -- Network access layer security protocols -- Layer 2 Forwarding Protocol -- Point-to-Point Tunneling Protocol -- Layer 2 Tunneling Protocol -- Virtual private networking -- Internet layer security protocols -- IP security architecture. Use copy Restrictions unspecified star MiAaHDL Electronic reproduction. [Place of publication not identified] : HathiTrust Digital Library, 2010. MiAaHDL Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. http://purl.oclc.org/DLF/benchrepro0212 MiAaHDL digitized 2010 HathiTrust Digital Library committed to preserve pda MiAaHDL Print version record. "This hands-on book gives you a comprehensive analysis of current trends in WWW security, plus an evaluation of existing technologies, such as anonymity services and security products. It helps you guarantee that electronic commerce applications on your website are executed with the utmost security and protection. What's more, it helps you understand content protection and the benefits and drawbacks of censorship on the web."--BOOK JACKET. "Geared toward proactive Internet security professionals, this handy resource helps you comprehend existing security technologies, evaluate and choose those that best suit your needs, understand corresponding software and hardware, and more."--Jacket Computer security. World Wide Web Security measures. Sécurité informatique. Web Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer security fast World Wide Web Security measures fast World wide web. gtt Beveiliging. gtt Print version: Oppliger, Rolf. Security technologies for the World Wide Web. Boston, MA : Artech House, ©2000 1580530451 (DLC) 99045835 (OCoLC)42295827 Artech House computer security series. http://id.loc.gov/authorities/names/no00015115 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=42390 Volltext |
spellingShingle | Oppliger, Rolf Security technologies for the World Wide Web / Artech House computer security series. Internet -- WWW -- Vulnerabilities, threats, and countermeasures -- Generic security model -- Security policy -- Host security -- Network security -- Organizational security -- Legal security -- HTTP Security -- HTTP -- User authentication, authorization, and access control -- Basic authentication -- Digest access authentication -- Certificate-based authentication -- Sever configuration -- Configuring HTTP basic authentication -- Configuring HTTP digest access authentication -- Proxy Servers and Firewalls -- Static packet filtering -- Dynamic packet filtering or stateful inspection -- Circuit-level gateways -- Application-level gateways -- Firewall configurations -- Dual-homed firewall -- Screened host firewall -- Screened subnet firewall -- Network address translation -- Configuring the browser -- Cryptographic Techniques -- Cryptographic hash functions -- Secret key cryptography -- DES -- Triple-DES -- IDEA -- SAFER -- Blowfish -- CAST-128 -- RC2, RC4, RC5, and RC6 -- AES -- Public key cryptography -- RSA -- Diffie-Hellman -- ElGamal -- DSS -- ECC -- Digital envelopes -- Protection of cryptographic keys -- Generation of pseudorandom bit sequences -- Legal issues -- Patent claims -- Regulations -- Electronic and digital signature legislation -- Internet Security Protocols -- Network access layer security protocols -- Layer 2 Forwarding Protocol -- Point-to-Point Tunneling Protocol -- Layer 2 Tunneling Protocol -- Virtual private networking -- Internet layer security protocols -- IP security architecture. Computer security. World Wide Web Security measures. Sécurité informatique. Web Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer security fast World Wide Web Security measures fast World wide web. gtt Beveiliging. gtt |
title | Security technologies for the World Wide Web / |
title_alt | Internet -- WWW -- Vulnerabilities, threats, and countermeasures -- Generic security model -- Security policy -- Host security -- Network security -- Organizational security -- Legal security -- HTTP Security -- HTTP -- User authentication, authorization, and access control -- Basic authentication -- Digest access authentication -- Certificate-based authentication -- Sever configuration -- Configuring HTTP basic authentication -- Configuring HTTP digest access authentication -- Proxy Servers and Firewalls -- Static packet filtering -- Dynamic packet filtering or stateful inspection -- Circuit-level gateways -- Application-level gateways -- Firewall configurations -- Dual-homed firewall -- Screened host firewall -- Screened subnet firewall -- Network address translation -- Configuring the browser -- Cryptographic Techniques -- Cryptographic hash functions -- Secret key cryptography -- DES -- Triple-DES -- IDEA -- SAFER -- Blowfish -- CAST-128 -- RC2, RC4, RC5, and RC6 -- AES -- Public key cryptography -- RSA -- Diffie-Hellman -- ElGamal -- DSS -- ECC -- Digital envelopes -- Protection of cryptographic keys -- Generation of pseudorandom bit sequences -- Legal issues -- Patent claims -- Regulations -- Electronic and digital signature legislation -- Internet Security Protocols -- Network access layer security protocols -- Layer 2 Forwarding Protocol -- Point-to-Point Tunneling Protocol -- Layer 2 Tunneling Protocol -- Virtual private networking -- Internet layer security protocols -- IP security architecture. |
title_auth | Security technologies for the World Wide Web / |
title_exact_search | Security technologies for the World Wide Web / |
title_full | Security technologies for the World Wide Web / Rolf Oppliger. |
title_fullStr | Security technologies for the World Wide Web / Rolf Oppliger. |
title_full_unstemmed | Security technologies for the World Wide Web / Rolf Oppliger. |
title_short | Security technologies for the World Wide Web / |
title_sort | security technologies for the world wide web |
topic | Computer security. World Wide Web Security measures. Sécurité informatique. Web Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer security fast World Wide Web Security measures fast World wide web. gtt Beveiliging. gtt |
topic_facet | Computer security. World Wide Web Security measures. Sécurité informatique. Web Sécurité Mesures. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Computer security World Wide Web Security measures World wide web. Beveiliging. |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=42390 |
work_keys_str_mv | AT oppligerrolf securitytechnologiesfortheworldwideweb |