Xem 1-20 trên 884 kết quả Application security
  • With the Android platform fast becoming a target of malicious hackers, application security is crucial. This concise book provides the knowledge you need to design and implement robust, rugged, and secure apps for any Android device. You’ll learn how to identify and manage the risks inherent in your design, and work to minimize a hacker’s opportunity to compromise your app and steal user data.

    pdf112p hoa_can 29-01-2013 12 5   Download

  • Threats and Mitigation Conventional Cryptography and Kerberos Public Key Cryptography and SSL Windows Security 101: Basics Windows Security 102: Impersonation and Delegation Code Access Security Part 1, Policy Code Access Security Part 2, Enforcement Securing Web Applications Securing Web Services Securing System.Runtime.Remoting Securing COM+ Dumb Code: avoid writing code with silly security holes

    pdf368p goldit 09-10-2010 81 19   Download

  • Mod_security là một opensource web application firewall được Ivan Ristic phát triển dành cho Apache Web Server. Ivan Ristic là tác giả quyển sách.Ông là một người có rất nhiều kinh nghiệm trong bảo vệ Apache Web Server. Ông đã có nhiều thời gian nghiên cứu Web Application Security, Web Intrusion Detection, và Security Patterns.

    doc12p astronaut 11-02-2012 245 102   Download

  • This book is a step-by-step tutorial to developing a real-world application using the Yii web application development framework. The book attempts to mirror the environment of a software development team that is being tasked with building an online application, touching on each aspect of the software development lifecycle, as you build a project task management application from its conception to its production deployment.

    pdf332p hotmoingay3 09-01-2013 125 45   Download

  • You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy, you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web applications secure.

    pdf336p titatu_123 01-03-2013 38 15   Download

  • Ajax applications should be open yet secure. Far too often security is added as an afterthought. Potential flaws need to be identified and addressed right away. This book explores Ajax and web application security with an eye for dangerous gaps and offers ways that you can plug them before they become a problem. Learn how to build secure Ajax applications and discover how to respond quickly when attacks occur.

    pdf251p trac2_123 16-04-2013 24 6   Download

  • As more companies are moving to Linux for mission-critical applications, security becomes a major issue. This guide explains the pros and cons of the most the valuable open source security tools and is complete with implementation details. It gives detailed instructions on the implementation, configuration, and use of publicly available tools and features of Linux as they relate to Linux security.

    pdf79p samsung_12 07-05-2013 20 5   Download

  • will consider authentication functions developed to support application-level authentication & digital signatures will consider Kerberos – a private-key authentication service then X.509 - a public-key directory authentication service

    ppt26p muathu_102 28-01-2013 20 4   Download

  • Web now widely used by business, government, individuals but Internet & Web are vulnerable have a variety of threats integrity confidentiality denial of service authentication need added security mechanisms

    ppt24p muathu_102 28-01-2013 28 4   Download

  • Outline Introduction Android Applications Security Enforcement Security Refinements Lessons in Defining Policy Introduction Next generation open operation system will be developed on small mobile devices. Android (Google) -a widely anticipated open source operating system for mobile devices -it provide base operation system, application middleware layer, Java software development kit and a collection of system applications

    ppt23p baoyen-hvktqs 14-03-2013 26 4   Download

  • Privacy Enhanced Mail (PEM) was the first serious effort to secure Internet mail. The Internet Resources Task Force (IRTF) Privacy and Security Research Group (PSRG) did the initial design. The Internet Engineering Task Force (IETF) PEM Working Group continued development for three years, resulting in a four- part Proposed Internet Standard published in early 1993 [64] [56] [5] [55]. PEM is a broad standard suite, it provides encryption, authentication, message integrity and key management. PEM supports both symmetric and asymmetric (public- key) key management schemes.

    pdf109p cao_can 02-01-2013 21 3   Download

  • WPA: A rush solution to the security problems of WEP WPA2: Based on 802.11i (official version) Encrypt and authenticate MSDUs: counter mode-CBC MAC protocol with AES-128 Authenticate STAs: 802.1X Initialization vectors transmitted in plaintext are no longer needed to generate per-frame keys But most of the existing Wi-Fi WPA cards cannot be upgraded to support 802.11i

    ppt28p muathu_102 28-01-2013 18 3   Download

  • Tham khảo tài liệu 'module 8: making applications secure', công nghệ thông tin, quản trị mạng phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf80p trungha 31-08-2009 40 2   Download

  • Encryption and authentication algorithms are building blocks of secure network protocols Deploying cryptographic algorithms at different layers have different security effects Where should we put the security protocol in the network architecture?

    ppt27p muathu_102 28-01-2013 22 2   Download

  • Secure Socket Layer Protocol (SSL) Designed by Netscape in 1994 To protect WWW applications and electronic transactions Transport layer security protocol (TLS) A revised version of SSLv3 Two major components: Record protocol, on top of transport-layer protocols Handshake protocol, change-cipher-spec protocol, and alert protocol; they reside between application-layer protocols and the record protocol

    ppt32p muathu_102 28-01-2013 30 2   Download

  • Radio based communication, open air The attacker, having a radio transmitter and receiver with the same radio frequency of the underlying wireless network, can easily: Intercept wireless data Connect his computing devices to a nearby wireless network Inject new packets to an existing wireless network Jam a particular wireless channel using a jamming device Security measures Implement encryption algorithms, authentication algorithms, and integrity-check algorithms at the data-link layer Provide network access with wired equivalent privacy Higher-layer protocols and applications can be used ...

    ppt32p muathu_102 28-01-2013 18 2   Download

  • Also called a Proxy Firewall Acts as a relay for application level traffic Typical applications: Telnet FTP SMTP HTTP More secure than packet filters Bad packets won't get through the gateway Only has to deal with application level packets Simplifies rules needed in packet filter

    ppt13p muathu_102 28-01-2013 22 2   Download

  • Never trust user input Poorly or unvalidated user input constitutes the most severe security problem with web applications can crash a server can cause buffer overflows can allow machine to be hijacked allow hacker to have root access Assume user input is bad until you prove its OK

    ppt10p muathu_102 28-01-2013 18 2   Download

  • transport layer security service originally developed by Netscape version 3 designed with public input subsequently became Internet standard known as TLS (Transport Layer Security) uses TCP to provide a reliable end-to-end service SSL has two layers of protocols

    ppt23p muathu_102 28-01-2013 13 2   Download

  • In CERTs 2001 annual report it listed 52,000 security incidents the most serious involving: IP spoofing intruders creating packets with false address then taking advantages of OS exploits eavesdropping and sniffing attackers listen for userids and passwords and then just walk into target systems as a result the IAB included authentication and encryption in the next generation IP (IPv6)

    ppt22p muathu_102 28-01-2013 21 1   Download

Đồng bộ tài khoản