Internet Security: How to Defend Against Attackers on the Web

Jones & Bartlett Learning

The Second Edition of Internet Security: How to Defend Against Attackers on the Web (formerly titled Security Strategies in Web Applications and Social Networking) provides an in-depth look at how to secure mobile users as customer-facing information migrates from mainframe computers and application servers to Web-enabled applications. Written by an industry expert, this book provides a comprehensive explanation of the evolutionary changes that have occurred in computing, communications, and social networking and discusses how to secure systems against all the risks, threats, and vulnerabilities associated with Web-enabled applications accessible via the internet. Using examples and exercises, this book incorporates hands-on activities to prepare readers to successfully secure Web-enabled applications.

Features and Benefits
Available with the Virtual Security Cloud Labs, which provide a hands-on, immersive mock IT infrastructure enabling students to test their skills with realistic security scenarios
NEW! - New Chapter 4, Securing Mobile Communications
Provides a weatlh of exercises and real-world examples
Details the latest internet threats and risks when connecting to the internet, as well as mitigating risk and securing applications
Discusses penetration testing of production Web sites
Examines mobile device and connectivity security
previous edition 9780763791957,
Chapter 1: From Mainframe to Client / Server to World Wide Web
Chapter 2: Security Considerations for Small Businesses
Chapter 3: Security Considerations for Home and Personal Online Use
Chapter 4: Mitigating Risk When Connecting to the Internet
Chapter 5: Mitigating Web Site Risks, Threats, and Vulnerabilities
Chapter 6: Introducing the Web Application Security Consortium (WASC)
Chapter 7: Securing Web Applications
Chapter 8: Mitigating Web Application Vulnerabilities
Chapter 9: Maintaining PCI DSS Compliance for E-commerce Web Sites
Chapter 10: Testing and Quality Assurance for Production Web Sites
Chapter 11: Performing a Web Site Vulnerability and Security Assessment
Chapter 12: Securing Mobile Communications
Chapter 13: Securing Personal and Business Communications
Chapter 14: Security Training, Education, and Certification
Chapter 15: Web Application Security Organizations

Reviews (0)

If you would like to submit a review, you will need to log in or create an account first.
There are no reviews yet