買這商品的人也買了...
-
$650$429 -
$690$587 -
$590$466 -
$590$466 -
$780$663 -
$480$379 -
$750$593 -
$580$493 -
$680$537 -
$700$686 -
$990$782 -
$650$553 -
$650$507 -
$450$383 -
$550$468 -
$590$460 -
$580$452 -
$620$527 -
$780$663 -
$520$442 -
$600$474 -
$650$507 -
$980$774 -
$760$600 -
$880$695
相關主題
商品描述
Description:
With more than 67% of web servers running Apache, it is by far the most widely used web server platform in the world. Apache has evolved into a powerful system that easily rivals other HTTP servers in terms of functionality, efficiency, and speed. Despite these impressive capabilities, though, Apache is only a beneficial tool if it's a secure one.
To be sure, administrators installing and configuring Apache still need a sure-fire way to secure it--whether it's running a huge e-commerce operation, corporate intranet, or just a small hobby site.
Our new guide, Apache Security, gives administrators and webmasters just what they crave--a comprehensive security source for Apache. Successfully combining Apache administration and web security topics, Apache Security speaks to nearly everyone in the field. What's more, it offers a concise introduction to the theory of securing Apache, as well as a broad perspective on server security in general.
But this book isn't just about theory. The real strength of Apache Security lies in its wealth of interesting and practical advice, with many real-life examples and solutions. Administrators and programmers will learn how to:
- install and configure Apache
- prevent denial of service (DoS) and other attacks
- securely share servers
- control logging and monitoring
- secure custom-written web applications
- conduct a web security assessment
- use mod_security and other security-related modules
And that's just the tip of the iceberg, as mainstream Apache users will also gain valuable information on PHP and SSL/ TLS. Clearly, Apache Security is packed and to the point, with plenty of details for locking down this extremely popular and versatile web server.
Table of Contents:
Preface
1. Apache Security Principles
Security Definitions
Essential Security Principles
Common Security Vocabulary
Security Process Steps
Threat Modeling
System-Hardening Matrix
Calculating Risk
Web Application Architecture Blueprints
User View
Network View
Apache View
2. Installation and Configuration
Installation
Source or Binary
Static Binary or Dynamic Modules
Folder Locations
Installation Instructions
Configuration and Hardening
Setting Up the Server User Account
Setting Apache Binary File Permissions
Configuring Secure Defaults
Enabling CGI Scripts
Logging
Setting Server Configuration Limits
Preventing Information Leaks
Changing Web Server Identity
Changing the Server Header Field
Removing Default Content
Putting Apache in Jail
Tools of the chroot Trade
Using chroot to Put Apache in Jail
Using the chroot(2) Patch
Using mod_security or mod_chroot
3. PHP
Installation
Using PHP as a Module
Using PHP as a CGI
Choosing Modules
Configuration
Disabling Undesirable Options
Disabling Functions and Classes
Restricting Filesystem Access
Setting Logging Options
Setting Limits
Controlling File Uploads
Increasing Session Security
Setting Safe Mode Options
Advanced PHP Hardening
PHP 5 SAPI Input Hooks
Hardened-PHP
4. SSL and TLS
Cryptography
Symmetric Encryption
Asymmetric Encryption
One-Way Encryption
Public-Key Infrastructure
How It All Falls into Place
SSL
SSL Communication Summary
Is SSL Secure?
OpenSSL
Apache and SSL
Installing mod_ssl
Generating Keys
Generating a Certificate Signing Request
Signing Your Own Certificate
Getting a Certificate Signed by a CA
Configuring SSL
Setting Up a Certificate Authority
Preparing the CA Certificate for Distribution
Issuing Server Certificates
Issuing Client Certificates
Revoking Certificates
Using Client Certificates
Performance Considerations
OpenSSL Benchmark Script
Hardware Acceleration
5. Denial of Service Attacks
Network Attacks
Malformed Traffic
Brute-Force Attacks
SYN Flood Attacks
Source Address Spoofing
Distributed Denial of Service Attacks
Reflection DoS Attacks
Self-Inflicted Attacks
Badly Configured Apache
Poorly Designed Web Applications
Real-Life Client Problems
Traffic Spikes
Content Compression
Bandwidth Attacks
Cyber-Activism
The Slashdot Effect
Attacks on Apache
Apache Vulnerabilities
Brute-Force Attacks
Programming Model Attacks
Local Attacks
PAM Limits
Process Accounting
Kernel Auditing
Traffic-Shaping Modules
DoS Defense Strategy
6. Sharing Servers
Sharing Problems
File Permission Problems
Dynamic-Content Problems
Sharing Resources
Same Domain Name Problems
Information Leaks on Execution Boundaries
Distributing Configuration Data
Securing Dynamic Requests
Enabling Script Execution
Setting CGI Script Limits
Using suEXEC
FastCGI
Running PHP as a Module
Working with Large Numbers of Users
Web Shells
Dangerous Binaries
7. Access Control
Overview
Authentication Methods
Basic Authentication
Digest Authentication
Form-Based Authentication
Access Control in Apache
Basic Authentication Using Plaintext Files
Basic Authentication Using DBM Files
Digest Authentication
Certificate-Based Access Control
Network Access Control
Proxy Access Control
Final Access Control Notes
Single Sign-on
Web Single Sign-on
Simple Apache-Only Single Sign-on
8. Logging and Monitoring
Apache Logging Facilities
Request Logging
Error Logging
Special Logging Modules
Audit Log
Performance Measurement
File Upload Interception
Application Logs
Logging as Much as Possible
Log Manipulation
Piped Logging
Log Rotation
Issues with Log Distribution
Remote Logging
Manual Centralization
Syslog Logging
Database Logging
Distributed Logging with the Spread Toolkit
Logging Strategies
Log Analysis
Monitoring
File Integrity
Event Monitoring
Web Server Status
9. Infrastructure
Application Isolation Strategies
Isolating Applications from Servers
Isolating Application Modules
Utilizing Virtual Servers
Host Security
Restricting and Securing User Access
Deploying Minimal Services
Gathering Information and Monitoring Events
Securing Network Access
Advanced Hardening
Keeping Up to Date
Network Security
Firewall Usage
Centralized Logging
Network Monitoring
External Monitoring
Using a Reverse Proxy
Apache Reverse Proxy
Reverse Proxy by Network Design
Reverse Proxy by Redirecting Network Traffic
Network Design
Reverse Proxy Patterns
Advanced Architectures
10. Web Application Security
Session Management Attacks
Cookies
Session Management Concepts
Keeping in Touch with Clients
Session Tokens
Session Attacks
Good Practices
Attacks on Clients
Typical Client Attack Targets
Phishing
Application Logic Flaws
Cookies and Hidden Fields
POST Method
Referrer Check Flaws
Process State Management
Client-Side Validation
Information Disclosure
HTML Source Code
Directory Listings
Verbose Error Messages
Debug Messages
File Disclosure
Path Traversal
Application Download Flaws
Source Code Disclosure
Predictable File Locations
Injection Flaws
SQL Injection
Cross-Site Scripting
Command Execution
Code Execution
Preventing Injection Attacks
Buffer Overflows
Evasion Techniques
Simple Evasion Techniques
Path Obfuscation
URL Encoding
Unicode Encoding
Null-Byte Attacks
SQL Evasion
Web Application Security Resources
General Resources
Web Application Security Resources
11. Web Security Assessment
Black-Box Testing
Information Gathering
Web Server Analysis
Web Application Analysis
Attacks Against Access Control
Vulnerability Probing
White-Box Testing
Architecture Review
Configuration Review
Functional Review
Gray-Box Testing
12. Web Intrusion Detection
Evolution of Web Intrusion Detection
Is Intrusion Detection the Right Approach?
Log-Based Web Intrusion Detection
Real-Time Web Intrusion Detection
Web Intrusion Detection Features
Using mod_security
Introduction
More Configuration Advice
Deployment Guidelines
Detecting Common Attacks
Advanced Topics
Appendix: Tools
Index
商品描述(中文翻譯)
描述:
超過67%的網頁伺服器運行Apache,這使得它成為全球使用最廣泛的網頁伺服器平台。Apache已發展成為一個強大的系統,在功能、效率和速度上輕鬆與其他HTTP伺服器競爭。儘管擁有這些令人印象深刻的能力,Apache只有在安全的情況下才是一個有益的工具。
確保安裝和配置Apache的管理員仍然需要一種可靠的方法來保護它——無論是運行大型電子商務操作、企業內部網路,還是僅僅是一個小型的興趣網站。
我們的新指南《Apache Security》為管理員和網站管理員提供了他們所渴望的——一個全面的Apache安全資源。《Apache Security》成功地結合了Apache管理和網頁安全主題,幾乎涵蓋了該領域的每一個人。此外,它還提供了有關保護Apache的理論簡介,以及對伺服器安全的一個廣泛視角。
但這本書不僅僅是理論。《Apache Security》的真正優勢在於其豐富的有趣和實用建議,並包含許多現實生活中的例子和解決方案。管理員和程式設計師將學會如何:
- 安裝和配置Apache
- 防止拒絕服務(DoS)和其他攻擊
- 安全地共享伺服器
- 控制日誌記錄和監控
- 安全地保護自定義編寫的網頁應用程式
- 進行網頁安全評估
- 使用mod_security和其他安全相關模組
這僅僅是冰山一角,主流的Apache使用者還將獲得有關PHP和SSL/TLS的寶貴資訊。顯然,《Apache Security》內容豐富且切中要點,提供了大量細節以鎖定這個極受歡迎且多功能的網頁伺服器。
目錄:
前言
1. Apache安全原則
- 安全定義
- 基本安全原則
- 常見安全詞彙
- 安全過程步驟
- 威脅建模
- 系統加固矩陣
- 風險計算
- 網頁應用程式架構藍圖
- 使用者視圖
- 網路視圖
- Apache視圖
2. 安裝與配置
- 安裝
- 源碼或二進制
- 靜態二進制或動態模組
- 資料夾位置
- 安裝說明
- 配置與加固
- 設定伺服器使用者帳戶
- 設定Apache二進制檔案權限
- 配置安全預設值
- 啟用CGI腳本
- 日誌記錄
- 設定伺服器配置限制
- 防止資訊洩漏
- 更改網頁伺服器身份
- 更改伺服器標頭欄位
- 移除預設內容
- 將Apache放入監獄
- chroot工具
- 使用chroot將Apache放入監獄
- 使用chroot(2)補丁
- 使用mod_security或mod_chroot
3. PHP
- 安裝
- 使用PHP作為模組
- 使用PHP作為CGI
- 選擇模組
- 配置
- 禁用不必要的選項
- 禁用函數和類別
- 限制檔案系統訪問
- 設定日誌選項
- 設定限制
- 控制檔案上傳
- 增加會話安全性
- 設定安全模式選項
- 進階PHP加固
- PHP 5 SAPI輸入鉤子
- 加固的PHP
4. SSL和TLS
- 密碼學
- 對稱加密
- 非對稱加密
- 單向加密
- 公鑰基礎設施
- 如何將所有內容整合
- SSL
- SSL通訊摘要
- SSL是否安全?
- OpenSSL
- Apache和SSL
- 安裝mod_ssl
- 生成金鑰
- 生成證書簽署請求
- 簽署自己的證書
- 獲取CA簽署的證書
- 配置SSL
- 設定證書授權機構
- 準備CA證書以供分發
- 發放伺服器證書
- 發放客戶端證書
- 撤銷證書
- 使用客戶端證書
- 性能考量
- OpenSSL基準測試腳本
- 硬體加速
5. 拒絕服務攻擊
- 網路攻擊
- 異常流量
- 暴力攻擊
- SYN洪水攻擊
- 源地址欺騙
- 分散式拒絕服務攻擊
- 反射DoS攻擊
- 自我造成的攻擊
- 配置不當的Apache
- 設計不良的網頁應用程式
- 實際客戶問題
- 流量激增
- 內容壓縮
- 帶寬攻擊
- 網路行動主義
- Slashdot效應
- 對Apache的攻擊
- Apache漏洞
- 暴力攻擊
- 程式模型攻擊
- 本地攻擊
- PAM限制
- 程序會計
- 核心審計
- 流量整形模組
- DoS防禦策略