Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover Title Page Copyright Dedication Credits About the Authors
About the Technical Editor
Acknowledgments Introduction
Overview of the Book and Technology How This Book Is Organized Who Should Read This Book Tools You Will Need Summary
Chapter 1: Introduction to CMS Security and Operations
Target Acquired Operational Considerations Looking at Your Site Through the Eyes of a Hacker Steps to Gaining Access to Your Site Examples of Threats Reviewing Your Perimeter How Will You Respond to an Incident? Summary
Chapter 2: Choosing the Right Hosting Company
Types of Hosting Available Selecting the Right Hosting Option What to Look for in Web Host Security Accepting Credit Cards on Your Website Domain Name System Servers Hosting Your Own Website Server Summary
Chapter 3: Preventing Problems Before They Start
Choosing an Appropriate CMS for Your Needs Building It Before You Build It Performing CMS Installations Advanced Security After Installation Cleanup and Verification Before Going Live Summary
Chapter 4: Baselining Your Existing Website
Starting Your Baseline Identifying Areas of Trouble Uncovering Hidden Dangers Through Vulnerability Scanning Remediating Problems Summary
Chapter 5: Hardening the Server Against Attack
Ensuring Secure Passwords Securely Configuring the Linux Operating System Securing an Apache Server Securing SNMP Configuring PHP for Secure Operation Checking for Open Ports Securing FTP Communications Ports Securing SFTP Communications Ports Ensuring Secure Logging Using SSL Miscellaneous Hardening Tasks Physically Securing Equipment Summary
Chapter 6: Establishing a Workable Disaster Recovery Plan
Understanding Site and Systems Disaster Planning Identifying a Basic Backup Policy Server-Side Backup and Restoration Methods CMS Backup and Restoration Methods Considerations for Setting Up Alternative Web Hosts Additional Considerations Summary
Chapter 7: Patching Process
Understanding the Patching Process Understanding the Need for the Patching Process Organizational Requirements Security Metrics Monitoring for New Vulnerabilities Testing for Deployment Documenting Your Patches Patching after a Security Breach Patching a CMS Summary
Chapter 8: Log Review
Understanding the Need to Retain Logs Planning for Your Logs Using Standard Log Files Using Tools to Assist in Log Analysis Using Log Rotation Summary
Chapter 9: Hack Recovery
Activating Your Disaster Recovery Plan Tools for Successful Recovery Collecting the Information Procedures for Containment Crisis Communication to the User Community Reporting Attack(s) to the ISP of Origin Summary
Chapter 10: Wireless Networks
Determining the Business Need for Wireless Networks Understanding Threats to Your Wireless Security Securing the Data in the Air Employing Adequate Countermeasures Bluetooth Security Considerations Summary
Chapter 11: Information Security Policy and Awareness
Establishing an Information Security Policy Social Engineering Summary
Appendix A: Security Tools, Port Vulnerabilities, and Apache Tips
Security Tools Backdoor Intruders Apache Status Codes .htaccess settings
Appendix B: Acronyms and Terminology Index
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion