Server-Side Security
Slim Rekhis and Noureddine Boudriga, National Digital Certification Agency and University of Carthage, Tunisia
M. S. Obaidat, Monmouth University
Protecting Servers from Overload
Protecting from Denial of Service
Risk Mitigation in the Use of Scripts
Reducing CGI Risk Using Wrappers
Certificate-Based Access Control
Guidelines for Improving Server Security
Server-Side Security Practices
Effective Use of Security Software
Infrastructure Countermeasures
Remote Authoring and Administration
Server-Side Transactions Security
SERVER VULNERABILITIES
Securing a server is a difficult and challenging task that cannot be fully accomplished. Introducing an additional solution to enhance a server's security can increase vulnerability and exposure to further threats. One answer to the problem is to understand server vulnerabilities and start implementing a risk-mitigation approach. In general, server security vulnerabilities might exist in three main areas: installed software, defined and enforced ...
Get Handbook of Information Security: Threats, Vulnerabilities, Prevention, Detection, and Management, Volume 3 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.