Hack Proofing XML

The Items shown on this page are posted { FOR SALE} at the Amazon Store site Below

amazon


Hack Proofing XML -NIB

Condition of Item(s):

New

Author(s):

Evert Carter, Jeremy faircloth, curtis franklin, larry loeb

Type:

Softcover

Publisher:

Syngress

Category:

Programming Online

Functionality:

Excellent

Last Copywrite:

2002

ISBM/Congress/ID:

1-931836-50-7

Weight:

1 pd, 9 oz

Lot:

MC - B6

notes: 9.25 x 7.5 x .8 inches

           XML is quickly becoming the universal protocol for transferring information from site to via HTTP. Whereas HTML will continue to be the language for displaying documents on the Internet,  developers will find new and interesting ways to harness the power of XML to transmit, exchange, and manipulate data using XML Validation of the XML document and of the messages going to that document is the first line of defense in hack proofing XML. The same properties that make XML a powerful language for defining data across systems make it vulnerable to attacks. More important, since many firewalls will pass XML data without filtering, a poorly constructed and unvalidated document can constitute a serious system-level vulnerability. Hack Proofing" XML will show you the ins and outs of XML and .NET security.

     

    .Understand the Role of the Hacker

    Review hacking terms such as hacker, cracker, black hat, phreakers, and script kiddies and learn how to identify real threats.

    Learn the Forms of Information Leakage

    See how banners, error messages, protocol analysis, and bad designs can be exploited by attackers.

    Build Well-Formed XML Documents

    Review the goals of XML and see how well-formed code will help protect you from hackers.

    Learn About Plain-Text Attacks

    See how this type of attack is one of the most insidious tools hackers can use to compromise a database or application.

    Apply XML Digital Signatures to Security

    The XML specification for digital signatures is flexible and gives users the ability to sign anything from a simple message embedded in a signature, or a message that contains the signature within it, or external resources.

    Apply Encryption to XML

    Encryption in XML provides the essential elements of security: integrity of the document, confidentiality of content, and authentication.

    Apply Role-Based Access Control Ideas in XML

    See how a secure operating system working in conjunction with a secure application provides the most hack proof design possible.

    Learn the Risks Associated with Using XML

    See how .NET security can be a viable alternative for handling permissions, authentication, and authorization.

    Report Security Problems

    Determine when and to whom to report the problem and find rules for deciding how much detail to publish.

    Register for Your 1 Year Upgrade

    The Syngress Solutions upgrade plan protects you from content obsolescence and provides monthly mailings, whitepapers, and more!  make


PayPal—eBay's service to make fast, easy, and secure payments for your eBay purchases!

 More Auction items at: www.duftopia.com/html/auctions.html