11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Introduction lvii●●●Chapter 12, “Building Secure <strong>Web</strong> Services”Chapter 13, “Building Secure Remoted Components”Chapter 14, “Building Secure Data Access”Part IV, Securing Your Network, Host, <strong>and</strong> <strong>Application</strong>This part shows you how to apply security configuration settings to secure theinterrelated network, host, <strong>and</strong> application levels. Rather than applying securityr<strong>and</strong>omly, you’ll learn the reasons for the security recommendations. Part IVincludes:● Chapter 15, “Securing Your Network”● Chapter 16, “Securing Your <strong>Web</strong> Server”● Chapter 17, “Securing Your <strong>Application</strong> Server”● Chapter 18, “Securing Your Database Server”● Chapter 19, “Securing Your ASP.NET <strong>Application</strong> <strong>and</strong> <strong>Web</strong> Services”● Chapter 20, “Hosting Multiple <strong>Web</strong> <strong>Application</strong>s”Part V, Assessing Your <strong>Security</strong>This part provides you with the tools you need to evaluate the success of yoursecurity efforts. It shows you how to evaluate your code <strong>and</strong> design <strong>and</strong> also howto review your deployed application, to identify potential vulnerabilities.● Chapter 21, “Code Review”● Chapter 22, “Deployment Review”ChecklistsThis section contains printable, task-based checklists, which are quick referencesheets to help you turn information into action. This section includes the followingchecklists:● Checklist: Architecture <strong>and</strong> Design Review● Checklist: Securing ASP.NET● Checklist: Securing <strong>Web</strong> Services● Checklist: Securing Enterprise Services● Checklist: Securing Remoting● Checklist: Securing Data Access● Checklist: Securing Your Network● Checklist: Securing Your <strong>Web</strong> Server● Checklist: Securing Your Database Server● Checklist: <strong>Security</strong> Review for Managed Code

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!