Hack Proofing XML

Pirmais vāks
Elsevier, 2002. gada 16. aug. - 608 lappuses
The only way to stop a hacker is to think like one!
The World Wide Web Consortium's Extensible Markup Language (XML) is quickly becoming the new standard for data formatting and Internet development. XML is expected to be as important to the future of the Web as HTML has been to the foundation of the Web, and has proven itself to be the most common tool for all data manipulation and data transmission.
Hack Proofing XML provides readers with hands-on instruction for how to secure the Web transmission and access of their XML data. This book will also introduce database administrators, web developers and web masters to ways they can use XML to secure other applications and processes.

The first book to incorporate standards from both the Security Services Markup Language (S2ML) and the Organization for the Advancement of Structured Information Standards (OASIS) in one comprehensive book
Covers the four primary security objectives: Confidentiality, Integrity, Authentication and Non-repudiation
Not only shows readers how to secure their XML data, but describes how to provide enhanced security for a broader range of applications and processes

No grāmatas satura

Saturs

Chapter 1 The Zen of Hack Proofing
1
Chapter 2 Classes of Attack
27
Chapter 3 Reviewing the Fundamentals of XML
79
The Validation Gateway
101
Chapter 5 XML Digital Signatures
143
Chapter 6 Encryption in XML
183
Chapter 7 RoleBased Access Control
215
Chapter 8 Understanding NET and XML Security
257
Chapter 9 Reporting Security Problems
331
Hack Proofing XML Fast Track
351
Index
369
Related Titles
378
Autortiesības

Citi izdevumi - Skatīt visu

Bieži izmantoti vārdi un frāzes

Populāri fragmenti

40. lappuse - Interesting ports on parabola.cipherpunks.com (192.168.1.2) : (The 1533 ports scanned but not shown below are in state: closed) Port State Service...
3. lappuse - A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary.
v. lappuse - Marie Chieng, Lucy Chong, Leslie Lim, Audrey Gan, and Joseph Chan of Transquest Publishers for the enthusiasm with which they receive our books. Kwon Sung June at Acorn Publishing for his support. Ethan Atkin at Cranbury International for his help in expanding the Syngress program.
v. lappuse - Jon Mayes, John Mesjak, Peg O'Donnell, Sandra Patterson, Betty Redmond, Roy Remer, Ron Shapiro, Patricia Kelly, Andrea Tetrick, Jennifer Pascal, Doug Reil, David Dahl,Janis Carpenter, and Susan Fryer of Publishers Group West for sharing their incredible marketing experience and expertise.
67. lappuse - » @got .wedgie.org version, bind, txt chaos ; (1 server found) ; ; res options: init recurs defnam dnsrch got answer : -»HEADER«- opcode: QUERY, status: NOERROR, id: 4 flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0 QUERY SECTION: version. bind, type = TXT, class = CHAOS ANSWER SECTION: VERSION. BIND. OS CHAOS TXT '8.3.4-RBL...
62. lappuse - Whois Server Version 1.3 Domain names in the .com, .net, and .org domains can now be registered with many different competing registrars. Go to http://www.internic.net for detailed information.
81. lappuse - XML documents. 5. The number of optional features in XML is to be kept to the absolute minimum, ideally zero.
i. lappuse - With more than 1,500,000 copies of our MCSE, MCSD, CompTIA, and Cisco study guides in print, we continue to look for ways we can better serve the information needs of our readers. One way we do that is by listening. Readers like yourself have been telling us they want an Internet-based service that would extend and enhance the value of our books. Based on reader feedback and our own strategic plan, we have created a Web site that we hope will exceed your expectations. Solutions@syngress.com is an...
317. lappuse - To canonicalize something is to put it in a standard format everyone generally uses. Because the signature is dependent on the content it is signing, a signature produced from a noncanonicalized document could possibly be different from that produced from a canonicalized document. Remember that this specification is about defining digital signatures in general, not just those involving XML documents — the manifest may also contain references to any digital content that can be addressed or even...
146. lappuse - ... public key. The recipient, upon receiving both the message and the encrypted hash value, can decrypt the hash value knowing the sender's public key. The recipient must also try to generate the hash value of the message and compare the newly generated hash value with the unencrypted hash value received from the sender. If...

Bibliogrāfiskā informācija