Download Apache Security - Ivan Ristic - Oreilly - 2005 - My E
Transcript
detecting common attacks command execution and file disclosure content management system problems database database-specific patterns XSS evolution of HIDSs NIDS features anti-evasion techniques input validation enforcement negative versus positive models protocol anomaly response monitoring (information leak detection) rule-based versus anomaly-based state management firewall deployment guidelines configuration starting point, reasonable steps host-based HTTP traffic and log-based mod_security firewall module [See mod_security firewall module] network real-time systems for 2nd Prelude tool Snort tool value of