Description |
1 online resource (xxiv, 515 pages) : illustrations |
|
text txt rdacontent |
|
computer c rdamedia |
|
online resource cr rdacarrier |
|
data file |
Note |
Includes index. |
|
Print version record. |
Summary |
The only way to stop a hacker is to think like one! ColdFusion is a Web application development tool that allows programmers to quickly build robust applications using server-side markup language. It is incredibly popular and has both an established user base and a quickly growing number of new adoptions. It has become the development environment of choice for e-commerce sites and content sites where databases and transactions are the most vulnerable and where security is of the utmost importance. Several security concerns exist for ColdFusion due to its unique approach of designing pages using dynamic-page templates rather than static HTML documents. Because ColdFusion does not require that developers have expertise in Visual Basic, Java and C++; Web applications created using ColdFusion Markup language are vulnerable to a variety of security breaches. Hack Proofing ColdFusion 5.0 is the seventh edition in the popular Hack Proofing series and provides developers with step-by-step instructions for developing secure web applications. Teaches strategy and techniques: Using forensics-based analysis this book gives the reader insight to the mind of a hacker Interest in topic continues to grow: Network architects, engineers and administrators are scrambling for security books to help them protect their new networks and applications powered by ColdFusion Unrivalled Web-based support: Up-to-the minute links, white papers and analysis for two years at solutions@syngress.com. |
Contents |
1928994776.pdf; 1928994776.pdf; Cover; Table of Contents; Foreword; Chapter 1 Thinking Like a Hacker; Chapter 2 Securing Your ColdFusion Development; Chapter 3 Securing Your ColdFusion Tags; Chapter 4 Securing Your ColdFusion Applications; Chapter 5 The ColdFusion Development System; Chapter 6 Configuring ColdFusion Server Security; Chapter 7 Securing the ColdFusion Server after Installation; Chapter 8 Securing Windows and IIS; Chapter 9 Securing Solaris, Linux, and Apache; Chapter 10 Database Security; Chapter 11 Securing Your ColdFusion Applications Using Third-Party Tools |
|
Chapter 12 Security Features in ColdFusion MXIndex; Related Titles |
Language |
English. |
Subject |
ColdFusion.
|
|
ColdFusion
|
|
Computer security.
|
|
Computer networks -- Security measures.
|
|
Sécurité informatique.
|
|
Réseaux d'ordinateurs -- Sécurité -- Mesures.
|
|
COMPUTERS -- Internet -- Security.
|
|
COMPUTERS -- Networking -- Security.
|
|
COMPUTERS -- Security -- General.
|
|
Computer networks -- Security measures
|
|
Computer security
|
Added Author |
Meyer, Greg.
|
|
Casco, Steven.
|
Other Form: |
Print version: Hack proofing ColdFusion. Rockland, MA : Syngress, ©2002 1928994776 (OCoLC)48754905 |
ISBN |
1932266224 (electronic bk.) |
|
9781932266221 (electronic bk.) |
|
9781928994770 |
|
1928994776 |
|
1281052566 |
|
9781281052568 |
|
9786611052560 |
|
6611052569 |
|
0080478093 |
|
9780080478098 |
Standard No. |
AU@ 000053222300 |
|
AU@ 000053236260 |
|
AU@ 000065666721 |
|
CHBIS 005829659 |
|
CHNEW 001004522 |
|
CHVBK 168676761 |
|
DEBBG BV042307310 |
|
DEBBG BV043084146 |
|
DEBSZ 40531387X |
|
DEBSZ 422447072 |
|
NZ1 11917608 |
|