Hack proofing your e-commerce site :: the only way to stop a hacker is to think like one].
From the authors of the bestselling Hack Proofing Your Network! Yahoo!, E-Bay, Amazon. Three of the most popular, well-established, and lavishly funded Web sites in existence, yet hackers managed to penetrate their security systems and cripple these and many other Web giants for almost 24 hours. E-C...
Gespeichert in:
Körperschaft: | |
---|---|
Weitere Verfasser: | |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, MA :
Syngress,
©2001.
|
Schlagworte: | |
Online-Zugang: | Volltext Volltext |
Zusammenfassung: | From the authors of the bestselling Hack Proofing Your Network! Yahoo!, E-Bay, Amazon. Three of the most popular, well-established, and lavishly funded Web sites in existence, yet hackers managed to penetrate their security systems and cripple these and many other Web giants for almost 24 hours. E-Commerce giants, previously thought to be impenetrable are now being exposed as incredibly vulnerable. This book will give e-commerce architects and engineers insight into the tools and techniques used by hackers to compromise their sites. The security of e-commerce sites is even more imperative than non-commerce sites, because the site has the added responsibility of maintaining the security of their customer's personal and financial information. Hack Proofing Your E-Commerce Site will provide computer architects and engineers all of the information they need to design and implement security measures. * Heightened media awareness of malicious attacks against "secure" sites guarantees a wide audience * Uses forensics-based analysis to give the reader insight to the mind of a hacker. This understanding is crucial for security professionals to defend against attacks |
Beschreibung: | Includes index. |
Beschreibung: | 1 online resource (xxvi, 661 pages) : illustrations |
ISBN: | 1931836329 9781931836326 9781928994275 192899427X |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocm51502705 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 030122s2001 maua o 001 0 eng d | ||
040 | |a N$T |b eng |e pn |c N$T |d OCLCQ |d YDXCP |d OCLCQ |d OCLCF |d OCLCO |d NLGGC |d OCLCO |d OCLCQ |d OPELS |d B24X7 |d REDDC |d ZCU |d DKDLA |d MERUC |d CCO |d E7B |d U5D |d NNM |d FVL |d OCLCQ |d LOA |d AGLDB |d COCUF |d CNNOR |d MOR |d PIFBR |d AZK |d LIV |d OCLCQ |d U3W |d STF |d BRL |d WRM |d D6H |d VTS |d NRAMU |d INT |d VT2 |d OCLCQ |d AU@ |d COO |d A6Q |d OCLCQ |d LEAUB |d OL$ |d BRF |d EYM |d INARC |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d SXB |d OCLCQ | ||
015 | |a GBA261539 |2 bnb | ||
016 | 7 | |a 192899427x |2 Uk | |
019 | |a 50689218 |a 70732648 |a 162598272 |a 488335693 |a 559164699 |a 606018378 |a 646706632 |a 722109294 |a 727988739 |a 856958523 |a 961679924 |a 961688097 |a 962647206 |a 966181841 |a 988448975 |a 991957466 |a 1035654316 |a 1037501667 |a 1038605814 |a 1045556728 |a 1053049944 |a 1055254956 |a 1055370943 |a 1058182126 |a 1060188394 |a 1076306054 |a 1081262942 |a 1097128773 |a 1179687394 |a 1194774843 |a 1228600257 | ||
020 | |a 1931836329 |q (electronic bk.) | ||
020 | |a 9781931836326 |q (electronic bk.) | ||
020 | |a 9781928994275 | ||
020 | |a 192899427X | ||
035 | |a (OCoLC)51502705 |z (OCoLC)50689218 |z (OCoLC)70732648 |z (OCoLC)162598272 |z (OCoLC)488335693 |z (OCoLC)559164699 |z (OCoLC)606018378 |z (OCoLC)646706632 |z (OCoLC)722109294 |z (OCoLC)727988739 |z (OCoLC)856958523 |z (OCoLC)961679924 |z (OCoLC)961688097 |z (OCoLC)962647206 |z (OCoLC)966181841 |z (OCoLC)988448975 |z (OCoLC)991957466 |z (OCoLC)1035654316 |z (OCoLC)1037501667 |z (OCoLC)1038605814 |z (OCoLC)1045556728 |z (OCoLC)1053049944 |z (OCoLC)1055254956 |z (OCoLC)1055370943 |z (OCoLC)1058182126 |z (OCoLC)1060188394 |z (OCoLC)1076306054 |z (OCoLC)1081262942 |z (OCoLC)1097128773 |z (OCoLC)1179687394 |z (OCoLC)1194774843 |z (OCoLC)1228600257 | ||
037 | |a 100769:100777 |b Elsevier Science & Technology |n http://www.sciencedirect.com | ||
050 | 4 | |a QA76.9.A25 |b H334 2001eb | |
072 | 7 | |a BUS |x 097000 |2 bisacsh | |
072 | 7 | |a BUS |x 104000 |2 bisacsh | |
072 | 7 | |a BUS |x 071000 |2 bisacsh | |
072 | 7 | |a BUS |x 103000 |2 bisacsh | |
082 | 7 | |a 658.4/78 |2 21 | |
049 | |a MAIN | ||
245 | 0 | 0 | |a Hack proofing your e-commerce site : |b the only way to stop a hacker is to think like one]. |
260 | |a Rockland, MA : |b Syngress, |c ©2001. | ||
300 | |a 1 online resource (xxvi, 661 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a data file | ||
500 | |a Includes index. | ||
588 | 0 | |a Print version record. | |
520 | |a From the authors of the bestselling Hack Proofing Your Network! Yahoo!, E-Bay, Amazon. Three of the most popular, well-established, and lavishly funded Web sites in existence, yet hackers managed to penetrate their security systems and cripple these and many other Web giants for almost 24 hours. E-Commerce giants, previously thought to be impenetrable are now being exposed as incredibly vulnerable. This book will give e-commerce architects and engineers insight into the tools and techniques used by hackers to compromise their sites. The security of e-commerce sites is even more imperative than non-commerce sites, because the site has the added responsibility of maintaining the security of their customer's personal and financial information. Hack Proofing Your E-Commerce Site will provide computer architects and engineers all of the information they need to design and implement security measures. * Heightened media awareness of malicious attacks against "secure" sites guarantees a wide audience * Uses forensics-based analysis to give the reader insight to the mind of a hacker. This understanding is crucial for security professionals to defend against attacks | ||
505 | 0 | |a 192899427x.pdf; 192899427x.pdf; Cover; Table of Contents; Foreword; Chapter 1 Applying Security Principles to Your E-Business; Chapter 2 DDoS Attacks: Intent, Tools, and Defense; Chapter 3 Secure Web Site Design; Chapter 4 Designing and Implementing Security Policies; Chapter 5 Implementing a Secure E-Commerce Web Site; Chapter 6 Securing Financial Transactions; Chapter 7 Hacking Your Own Site; Chapter 8 Disaster Recovery Planning: The Best Defense; Chapter 9 Handling Large Volumes of Network Traffic; Chapter 10 Incident Response, Forensics, and the Law. | |
650 | 0 | |a Electronic commerce |x Security measures. | |
650 | 0 | |a Business enterprises |x Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh95010367 | |
650 | 0 | |a Internet |x Security measures. | |
650 | 6 | |a Commerce électronique |x Sécurité |x Mesures. | |
650 | 6 | |a Internet |x Sécurité |x Mesures. | |
650 | 7 | |a BUSINESS & ECONOMICS |x Workplace Culture. |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS |x Corporate Governance. |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS |x Leadership. |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS |x Organizational Development. |2 bisacsh | |
650 | 7 | |a Business enterprises |x Computer networks |x Security measures |2 fast | |
650 | 7 | |a Electronic commerce |x Security measures |2 fast | |
650 | 7 | |a Internet |x Security measures |2 fast | |
700 | 1 | |a Russell, Ryan. | |
710 | 2 | |a Syngress Media, Inc. |0 http://id.loc.gov/authorities/names/n98062058 | |
758 | |i has work: |a Hack proofing your e-commerce site (Text) |1 https://id.oclc.org/worldcat/entity/E39PCFHWy8h9WXYtrgFrPb4dYq |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |t Hack proofing your e-commerce site. |d Rockland, MA : Syngress, ©2001 |z 192899427X |w (OCoLC)47068413 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=75881 |3 Volltext |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9781928994275 |3 Volltext |
938 | |a Books 24x7 |b B247 |n bks00002100 | ||
938 | |a EBSCOhost |b EBSC |n 75881 | ||
938 | |a Internet Archive |b INAR |n hackproofingyour0000unse | ||
938 | |a YBP Library Services |b YANK |n 2361826 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocm51502705 |
---|---|
_version_ | 1816881604640899072 |
adam_text | |
any_adam_object | |
author2 | Russell, Ryan |
author2_role | |
author2_variant | r r rr |
author_corporate | Syngress Media, Inc |
author_corporate_role | |
author_facet | Russell, Ryan Syngress Media, Inc |
author_sort | Russell, Ryan |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 H334 2001eb |
callnumber-search | QA76.9.A25 H334 2001eb |
callnumber-sort | QA 276.9 A25 H334 42001EB |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | 192899427x.pdf; 192899427x.pdf; Cover; Table of Contents; Foreword; Chapter 1 Applying Security Principles to Your E-Business; Chapter 2 DDoS Attacks: Intent, Tools, and Defense; Chapter 3 Secure Web Site Design; Chapter 4 Designing and Implementing Security Policies; Chapter 5 Implementing a Secure E-Commerce Web Site; Chapter 6 Securing Financial Transactions; Chapter 7 Hacking Your Own Site; Chapter 8 Disaster Recovery Planning: The Best Defense; Chapter 9 Handling Large Volumes of Network Traffic; Chapter 10 Incident Response, Forensics, and the Law. |
ctrlnum | (OCoLC)51502705 |
dewey-full | 658.4/78 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/78 |
dewey-search | 658.4/78 |
dewey-sort | 3658.4 278 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05925cam a2200709 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocm51502705 </controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">030122s2001 maua o 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCO</subfield><subfield code="d">NLGGC</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OPELS</subfield><subfield code="d">B24X7</subfield><subfield code="d">REDDC</subfield><subfield code="d">ZCU</subfield><subfield code="d">DKDLA</subfield><subfield code="d">MERUC</subfield><subfield code="d">CCO</subfield><subfield code="d">E7B</subfield><subfield code="d">U5D</subfield><subfield code="d">NNM</subfield><subfield code="d">FVL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">LOA</subfield><subfield code="d">AGLDB</subfield><subfield code="d">COCUF</subfield><subfield code="d">CNNOR</subfield><subfield code="d">MOR</subfield><subfield code="d">PIFBR</subfield><subfield code="d">AZK</subfield><subfield code="d">LIV</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">U3W</subfield><subfield code="d">STF</subfield><subfield code="d">BRL</subfield><subfield code="d">WRM</subfield><subfield code="d">D6H</subfield><subfield code="d">VTS</subfield><subfield code="d">NRAMU</subfield><subfield code="d">INT</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AU@</subfield><subfield code="d">COO</subfield><subfield code="d">A6Q</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">LEAUB</subfield><subfield code="d">OL$</subfield><subfield code="d">BRF</subfield><subfield code="d">EYM</subfield><subfield code="d">INARC</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">SXB</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBA261539</subfield><subfield code="2">bnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">192899427x</subfield><subfield code="2">Uk</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">50689218</subfield><subfield code="a">70732648</subfield><subfield code="a">162598272</subfield><subfield code="a">488335693</subfield><subfield code="a">559164699</subfield><subfield code="a">606018378</subfield><subfield code="a">646706632</subfield><subfield code="a">722109294</subfield><subfield code="a">727988739</subfield><subfield code="a">856958523</subfield><subfield code="a">961679924</subfield><subfield code="a">961688097</subfield><subfield code="a">962647206</subfield><subfield code="a">966181841</subfield><subfield code="a">988448975</subfield><subfield code="a">991957466</subfield><subfield code="a">1035654316</subfield><subfield code="a">1037501667</subfield><subfield code="a">1038605814</subfield><subfield code="a">1045556728</subfield><subfield code="a">1053049944</subfield><subfield code="a">1055254956</subfield><subfield code="a">1055370943</subfield><subfield code="a">1058182126</subfield><subfield code="a">1060188394</subfield><subfield code="a">1076306054</subfield><subfield code="a">1081262942</subfield><subfield code="a">1097128773</subfield><subfield code="a">1179687394</subfield><subfield code="a">1194774843</subfield><subfield code="a">1228600257</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1931836329</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781931836326</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781928994275</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">192899427X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)51502705</subfield><subfield code="z">(OCoLC)50689218</subfield><subfield code="z">(OCoLC)70732648</subfield><subfield code="z">(OCoLC)162598272</subfield><subfield code="z">(OCoLC)488335693</subfield><subfield code="z">(OCoLC)559164699</subfield><subfield code="z">(OCoLC)606018378</subfield><subfield code="z">(OCoLC)646706632</subfield><subfield code="z">(OCoLC)722109294</subfield><subfield code="z">(OCoLC)727988739</subfield><subfield code="z">(OCoLC)856958523</subfield><subfield code="z">(OCoLC)961679924</subfield><subfield code="z">(OCoLC)961688097</subfield><subfield code="z">(OCoLC)962647206</subfield><subfield code="z">(OCoLC)966181841</subfield><subfield code="z">(OCoLC)988448975</subfield><subfield code="z">(OCoLC)991957466</subfield><subfield code="z">(OCoLC)1035654316</subfield><subfield code="z">(OCoLC)1037501667</subfield><subfield code="z">(OCoLC)1038605814</subfield><subfield code="z">(OCoLC)1045556728</subfield><subfield code="z">(OCoLC)1053049944</subfield><subfield code="z">(OCoLC)1055254956</subfield><subfield code="z">(OCoLC)1055370943</subfield><subfield code="z">(OCoLC)1058182126</subfield><subfield code="z">(OCoLC)1060188394</subfield><subfield code="z">(OCoLC)1076306054</subfield><subfield code="z">(OCoLC)1081262942</subfield><subfield code="z">(OCoLC)1097128773</subfield><subfield code="z">(OCoLC)1179687394</subfield><subfield code="z">(OCoLC)1194774843</subfield><subfield code="z">(OCoLC)1228600257</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">100769:100777</subfield><subfield code="b">Elsevier Science & Technology</subfield><subfield code="n">http://www.sciencedirect.com</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">H334 2001eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="x">097000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="x">104000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="x">071000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="x">103000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">658.4/78</subfield><subfield code="2">21</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Hack proofing your e-commerce site :</subfield><subfield code="b">the only way to stop a hacker is to think like one].</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Rockland, MA :</subfield><subfield code="b">Syngress,</subfield><subfield code="c">©2001.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxvi, 661 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">data file</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">From the authors of the bestselling Hack Proofing Your Network! Yahoo!, E-Bay, Amazon. Three of the most popular, well-established, and lavishly funded Web sites in existence, yet hackers managed to penetrate their security systems and cripple these and many other Web giants for almost 24 hours. E-Commerce giants, previously thought to be impenetrable are now being exposed as incredibly vulnerable. This book will give e-commerce architects and engineers insight into the tools and techniques used by hackers to compromise their sites. The security of e-commerce sites is even more imperative than non-commerce sites, because the site has the added responsibility of maintaining the security of their customer's personal and financial information. Hack Proofing Your E-Commerce Site will provide computer architects and engineers all of the information they need to design and implement security measures. * Heightened media awareness of malicious attacks against "secure" sites guarantees a wide audience * Uses forensics-based analysis to give the reader insight to the mind of a hacker. This understanding is crucial for security professionals to defend against attacks</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">192899427x.pdf; 192899427x.pdf; Cover; Table of Contents; Foreword; Chapter 1 Applying Security Principles to Your E-Business; Chapter 2 DDoS Attacks: Intent, Tools, and Defense; Chapter 3 Secure Web Site Design; Chapter 4 Designing and Implementing Security Policies; Chapter 5 Implementing a Secure E-Commerce Web Site; Chapter 6 Securing Financial Transactions; Chapter 7 Hacking Your Own Site; Chapter 8 Disaster Recovery Planning: The Best Defense; Chapter 9 Handling Large Volumes of Network Traffic; Chapter 10 Incident Response, Forensics, and the Law.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic commerce</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh95010367</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Commerce électronique</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Internet</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS</subfield><subfield code="x">Workplace Culture.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS</subfield><subfield code="x">Corporate Governance.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS</subfield><subfield code="x">Leadership.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS</subfield><subfield code="x">Organizational Development.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Electronic commerce</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Russell, Ryan.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Syngress Media, Inc.</subfield><subfield code="0">http://id.loc.gov/authorities/names/n98062058</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Hack proofing your e-commerce site (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCFHWy8h9WXYtrgFrPb4dYq</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="t">Hack proofing your e-commerce site.</subfield><subfield code="d">Rockland, MA : Syngress, ©2001</subfield><subfield code="z">192899427X</subfield><subfield code="w">(OCoLC)47068413</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=75881</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9781928994275</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Books 24x7</subfield><subfield code="b">B247</subfield><subfield code="n">bks00002100</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">75881</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Internet Archive</subfield><subfield code="b">INAR</subfield><subfield code="n">hackproofingyour0000unse</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2361826</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocm51502705 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:15:22Z |
institution | BVB |
institution_GND | http://id.loc.gov/authorities/names/n98062058 |
isbn | 1931836329 9781931836326 9781928994275 192899427X |
language | English |
oclc_num | 51502705 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xxvi, 661 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2001 |
publishDateSearch | 2001 |
publishDateSort | 2001 |
publisher | Syngress, |
record_format | marc |
spelling | Hack proofing your e-commerce site : the only way to stop a hacker is to think like one]. Rockland, MA : Syngress, ©2001. 1 online resource (xxvi, 661 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier data file Includes index. Print version record. From the authors of the bestselling Hack Proofing Your Network! Yahoo!, E-Bay, Amazon. Three of the most popular, well-established, and lavishly funded Web sites in existence, yet hackers managed to penetrate their security systems and cripple these and many other Web giants for almost 24 hours. E-Commerce giants, previously thought to be impenetrable are now being exposed as incredibly vulnerable. This book will give e-commerce architects and engineers insight into the tools and techniques used by hackers to compromise their sites. The security of e-commerce sites is even more imperative than non-commerce sites, because the site has the added responsibility of maintaining the security of their customer's personal and financial information. Hack Proofing Your E-Commerce Site will provide computer architects and engineers all of the information they need to design and implement security measures. * Heightened media awareness of malicious attacks against "secure" sites guarantees a wide audience * Uses forensics-based analysis to give the reader insight to the mind of a hacker. This understanding is crucial for security professionals to defend against attacks 192899427x.pdf; 192899427x.pdf; Cover; Table of Contents; Foreword; Chapter 1 Applying Security Principles to Your E-Business; Chapter 2 DDoS Attacks: Intent, Tools, and Defense; Chapter 3 Secure Web Site Design; Chapter 4 Designing and Implementing Security Policies; Chapter 5 Implementing a Secure E-Commerce Web Site; Chapter 6 Securing Financial Transactions; Chapter 7 Hacking Your Own Site; Chapter 8 Disaster Recovery Planning: The Best Defense; Chapter 9 Handling Large Volumes of Network Traffic; Chapter 10 Incident Response, Forensics, and the Law. Electronic commerce Security measures. Business enterprises Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh95010367 Internet Security measures. Commerce électronique Sécurité Mesures. Internet Sécurité Mesures. BUSINESS & ECONOMICS Workplace Culture. bisacsh BUSINESS & ECONOMICS Corporate Governance. bisacsh BUSINESS & ECONOMICS Leadership. bisacsh BUSINESS & ECONOMICS Organizational Development. bisacsh Business enterprises Computer networks Security measures fast Electronic commerce Security measures fast Internet Security measures fast Russell, Ryan. Syngress Media, Inc. http://id.loc.gov/authorities/names/n98062058 has work: Hack proofing your e-commerce site (Text) https://id.oclc.org/worldcat/entity/E39PCFHWy8h9WXYtrgFrPb4dYq https://id.oclc.org/worldcat/ontology/hasWork Print version: Hack proofing your e-commerce site. Rockland, MA : Syngress, ©2001 192899427X (OCoLC)47068413 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=75881 Volltext FWS01 ZDB-4-EBA FWS_PDA_EBA https://www.sciencedirect.com/science/book/9781928994275 Volltext |
spellingShingle | Hack proofing your e-commerce site : the only way to stop a hacker is to think like one]. 192899427x.pdf; 192899427x.pdf; Cover; Table of Contents; Foreword; Chapter 1 Applying Security Principles to Your E-Business; Chapter 2 DDoS Attacks: Intent, Tools, and Defense; Chapter 3 Secure Web Site Design; Chapter 4 Designing and Implementing Security Policies; Chapter 5 Implementing a Secure E-Commerce Web Site; Chapter 6 Securing Financial Transactions; Chapter 7 Hacking Your Own Site; Chapter 8 Disaster Recovery Planning: The Best Defense; Chapter 9 Handling Large Volumes of Network Traffic; Chapter 10 Incident Response, Forensics, and the Law. Electronic commerce Security measures. Business enterprises Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh95010367 Internet Security measures. Commerce électronique Sécurité Mesures. Internet Sécurité Mesures. BUSINESS & ECONOMICS Workplace Culture. bisacsh BUSINESS & ECONOMICS Corporate Governance. bisacsh BUSINESS & ECONOMICS Leadership. bisacsh BUSINESS & ECONOMICS Organizational Development. bisacsh Business enterprises Computer networks Security measures fast Electronic commerce Security measures fast Internet Security measures fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh95010367 |
title | Hack proofing your e-commerce site : the only way to stop a hacker is to think like one]. |
title_auth | Hack proofing your e-commerce site : the only way to stop a hacker is to think like one]. |
title_exact_search | Hack proofing your e-commerce site : the only way to stop a hacker is to think like one]. |
title_full | Hack proofing your e-commerce site : the only way to stop a hacker is to think like one]. |
title_fullStr | Hack proofing your e-commerce site : the only way to stop a hacker is to think like one]. |
title_full_unstemmed | Hack proofing your e-commerce site : the only way to stop a hacker is to think like one]. |
title_short | Hack proofing your e-commerce site : |
title_sort | hack proofing your e commerce site the only way to stop a hacker is to think like one |
title_sub | the only way to stop a hacker is to think like one]. |
topic | Electronic commerce Security measures. Business enterprises Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh95010367 Internet Security measures. Commerce électronique Sécurité Mesures. Internet Sécurité Mesures. BUSINESS & ECONOMICS Workplace Culture. bisacsh BUSINESS & ECONOMICS Corporate Governance. bisacsh BUSINESS & ECONOMICS Leadership. bisacsh BUSINESS & ECONOMICS Organizational Development. bisacsh Business enterprises Computer networks Security measures fast Electronic commerce Security measures fast Internet Security measures fast |
topic_facet | Electronic commerce Security measures. Business enterprises Computer networks Security measures. Internet Security measures. Commerce électronique Sécurité Mesures. Internet Sécurité Mesures. BUSINESS & ECONOMICS Workplace Culture. BUSINESS & ECONOMICS Corporate Governance. BUSINESS & ECONOMICS Leadership. BUSINESS & ECONOMICS Organizational Development. Business enterprises Computer networks Security measures Electronic commerce Security measures Internet Security measures |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=75881 https://www.sciencedirect.com/science/book/9781928994275 |
work_keys_str_mv | AT russellryan hackproofingyourecommercesitetheonlywaytostopahackeristothinklikeone AT syngressmediainc hackproofingyourecommercesitetheonlywaytostopahackeristothinklikeone |