Hack Proofing XMLElsevier, 2002. gada 16. aug. - 608 lappuses The only way to stop a hacker is to think like one! The World Wide Web Consortium's Extensible Markup Language (XML) is quickly becoming the new standard for data formatting and Internet development. XML is expected to be as important to the future of the Web as HTML has been to the foundation of the Web, and has proven itself to be the most common tool for all data manipulation and data transmission. Hack Proofing XML provides readers with hands-on instruction for how to secure the Web transmission and access of their XML data. This book will also introduce database administrators, web developers and web masters to ways they can use XML to secure other applications and processes. The first book to incorporate standards from both the Security Services Markup Language (S2ML) and the Organization for the Advancement of Structured Information Standards (OASIS) in one comprehensive book Covers the four primary security objectives: Confidentiality, Integrity, Authentication and Non-repudiation Not only shows readers how to secure their XML data, but describes how to provide enhanced security for a broader range of applications and processes |
Saturs
1 | |
27 | |
Chapter 3 Reviewing the Fundamentals of XML | 79 |
The Validation Gateway | 101 |
Chapter 5 XML Digital Signatures | 143 |
Chapter 6 Encryption in XML | 183 |
Chapter 7 RoleBased Access Control | 215 |
Chapter 8 Understanding NET and XML Security | 257 |
Chapter 9 Reporting Security Problems | 331 |
Hack Proofing XML Fast Track | 351 |
Index | 369 |
Related Titles | 378 |
Citi izdevumi - Skatīt visu
Bieži izmantoti vārdi un frāzes
able actually addition algorithm allow application assembly attack attribute authentication authorized called chapter character Code Access Security code group concept contains Continued create database defined demand designed determine discussed DTDs element encryption example execution exist exploit Figure function gain give granted hackers hash identify identity implementation important Internet language Learning look manager means method node object operating system optional perform permission set possible prevent principal privileges problem protected reason Reference remote request role schema security policy server signed simple specific standard string structure testing Transforms Understanding Unicode validation vendor verify vulnerability XML digital signature XML document XPath
Populāri fragmenti
40. lappuse - Interesting ports on parabola.cipherpunks.com (192.168.1.2) : (The 1533 ports scanned but not shown below are in state: closed) Port State Service...
3. lappuse - A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary.
v. lappuse - Marie Chieng, Lucy Chong, Leslie Lim, Audrey Gan, and Joseph Chan of Transquest Publishers for the enthusiasm with which they receive our books. Kwon Sung June at Acorn Publishing for his support. Ethan Atkin at Cranbury International for his help in expanding the Syngress program.
v. lappuse - Jon Mayes, John Mesjak, Peg O'Donnell, Sandra Patterson, Betty Redmond, Roy Remer, Ron Shapiro, Patricia Kelly, Andrea Tetrick, Jennifer Pascal, Doug Reil, David Dahl,Janis Carpenter, and Susan Fryer of Publishers Group West for sharing their incredible marketing experience and expertise.
67. lappuse - » @got .wedgie.org version, bind, txt chaos ; (1 server found) ; ; res options: init recurs defnam dnsrch got answer : -»HEADER«- opcode: QUERY, status: NOERROR, id: 4 flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0 QUERY SECTION: version. bind, type = TXT, class = CHAOS ANSWER SECTION: VERSION. BIND. OS CHAOS TXT '8.3.4-RBL...
62. lappuse - Whois Server Version 1.3 Domain names in the .com, .net, and .org domains can now be registered with many different competing registrars. Go to http://www.internic.net for detailed information.
81. lappuse - XML documents. 5. The number of optional features in XML is to be kept to the absolute minimum, ideally zero.
i. lappuse - With more than 1,500,000 copies of our MCSE, MCSD, CompTIA, and Cisco study guides in print, we continue to look for ways we can better serve the information needs of our readers. One way we do that is by listening. Readers like yourself have been telling us they want an Internet-based service that would extend and enhance the value of our books. Based on reader feedback and our own strategic plan, we have created a Web site that we hope will exceed your expectations. Solutions@syngress.com is an...
317. lappuse - To canonicalize something is to put it in a standard format everyone generally uses. Because the signature is dependent on the content it is signing, a signature produced from a noncanonicalized document could possibly be different from that produced from a canonicalized document. Remember that this specification is about defining digital signatures in general, not just those involving XML documents — the manifest may also contain references to any digital content that can be addressed or even...
146. lappuse - ... public key. The recipient, upon receiving both the message and the encrypted hash value, can decrypt the hash value knowing the sender's public key. The recipient must also try to generate the hash value of the message and compare the newly generated hash value with the unencrypted hash value received from the sender. If...