CMS security handbook : the comprehensive guide for WordPress, Joomla!, Drupal, and Plone / Tom Canavan
Resource type: Ressourcentyp: Buch (Online)Book (Online)Language: English Publisher: Indianapolis, IN : Wiley Pub, c2011Edition: Online-AusgDescription: Online-Ressource (1 online resource (xxvi, 406 p.)) : illISBN:- 9781283397766
- 1283397765
- 9781118091746
- Content Management
- Computersicherheit
- Joomla! (Computer file)
- WordPress (Electronic resource)
- Drupal (Computer file)
- Web sites
- Computer networks
- Data protection
- Web sites -- Security measures
- Open source software
- Computer networks ; Security measures
- Web sites ; Security measures
- Electronic books
- Electronic books
- 005.8
- TK5105.59
Contents:
Summary: Learn to secure Web sites built on open source CMSs Web sites built on Joomla!, WordPress, Drupal, or Plone face some unique security threats. If you're responsible for one of them, this comprehensive security guide, the first of its kind, offers detailed guidance to help you prevent attacks, develop secure CMS-site operations, and restore your site if an attack does occur. You'll learn a strong, foundational approach to CMS operations and security from an expert in the field. More and more Web sites are being built on open source CMSs, making them a popular target, thus making you vulnerable to new forms of attack This is the first comprehensive guide focused on securing the most common CMS platforms: Joomla!, WordPress, Drupal, and Plone Provides the tools for integrating the Web site into business operations, building a security protocol, and developing a disaster recovery plan Covers hosting, installation security issues, hardening servers against attack, establishing a contingency plan, patching processes, log review, hack recovery, wireless considerations, and infosec policy CMS Security Handbook is an essential reference for anyone responsible for a Web site built on an open source CMS.Summary: Intro -- CMS Security Handbook -- Contents -- Introduction -- Chapter 1 Introduction to CMS Security and Operations -- Target Acquired -- Operational Considerations -- Educating Your Employees and End Users -- Raising Security Awareness -- Training on Information Security Policies -- Providing a Standard Protocol for Threat Reporting -- Ensuring E-mail Security -- Applying Patches and Updates -- Being Aware and Staying Safe -- Looking at Your Site Through the Eyes of a Hacker -- Steps to Gaining Access to Your Site -- Researching -- Googling Away -- Using Google Hacking Tools (Dorks) -- Footprinting -- Using NMAP for Nefarious Means -- Using Traceroute -- Finding Subdomains -- Enumeration -- Attacking and Owning the Site -- Wiping Out Their Tracks -- Examples of Threats -- Social Engineering -- Calling into Your Office -- Sending in a Trusted Friend -- Using USB Keys -- Indiscriminate Browsing or Instant Messaging -- External Media -- Vendors or External Clients/Customers as the Threat -- Reviewing Your Perimeter -- Using Virus Protection -- Banning Passwords on Desks -- Enforcing a Password Complexity and Change Policy -- Policing Open Wireless -- Tools for Wireless Detection -- How Will You Respond to an Incident? -- Does Your Plan Exist? -- Is the Plan Up to Date? -- Where Are Your Backup Tapes, Disks, and USBs? -- Summary -- Chapter 2 Choosing the Right Hosting Company -- Types of Hosting Available -- Shared Hosting -- Virtual Private Server (VPS) -- Dedicated Server -- Cloud Hosting -- Security of Data in a Cloud -- Selecting the Right Hosting Option -- Budget Considerations -- Determining the Appropriate Server Size -- Case 1: Light Website Traffic (Shared Hosting) -- Case 2: Medium Website Traffic (VPS) -- Case 3: Heavy Website Traffic -- Using Backups -- What to Look for in Web Host Security -- Physical Security -- Glass Windows.PPN: PPN: 809506661Package identifier: Produktsigel: BSZ-30-PQE-K1DLR | ZDB-26-MYL | ZDB-30-PAD | ZDB-30-PQE | ZDB-38-EBR
No physical items for this record