Download Apache Security - Ivan Ristic - Oreilly - 2005 - My E

Transcript
detecting common attacks
command execution and file disclosure
content management system problems
database
database-specific patterns
XSS
evolution of
HIDSs
NIDS
features
anti-evasion techniques
input validation enforcement
negative versus positive models
protocol anomaly
response monitoring (information leak detection)
rule-based versus anomaly-based
state management
firewall deployment guidelines
configuration starting point, reasonable
steps
host-based
HTTP traffic and
log-based
mod_security firewall module [See mod_security firewall module]
network
real-time
systems for 2nd
Prelude tool
Snort tool
value of