封面
Joomla! Web Security
Credits
About the Author
About the Reviewer
Preface
What This Book Covers
Who is This Book For
Conventions
Reader Feedback
Customer Support
Chapter 1. Let's Get Started
Introduction
Common Terminology
Hosting—Selection and Unique Needs
Architecting for a Successful Site
Downloading Joomla!
.htaccess
Permissions
Common Trip Ups
Setting Up Security Metrics
Summary
Chapter 2. Test and Development
Welcome to the Laboratory!
Reporting
Using the Ravenswood Joomla! Server
Summary
Chapter 3. Tools
Introduction
Tools Tools and More Tools
Summary
Chapter 4. Vulnerabilities
Introduction
Importance of Patching is Paramount
What is a Vulnerability?
End Users
Summary
Chapter 5. Anatomy of Attacks
Introduction
SQL Injections
Remote File Includes
Summary
Chapter 6. How the Bad Guys Do It
Laws on the Books
Acquiring Target
Sizing up the Target
Vulnerability Tools
Finding Targets to Attack
What Do I Do Then?
Countermeasures
Closing Words
Summary
Chapter 7. php.ini and .htaccess
.htaccess
php.ini
Summary
Chapter 8. Log Files
What are Log Files Exactly?
Learning to Read the Log
Log File Analysis
Care and Feeding of Your Log Files
Tools to Review Your Log Files
Summary
Chapter 9. SSL for Your Joomla! Site
What is SSL/TLS?
Process Steps for SSL
Performance Considerations
Other Resources
Summary
Chapter 10. Incident Management
Creating an Incident Response Policy
Developing Procedures Based on Policy to Respond to Incidents
Summary
Appendix A. Security Handbook
Security Handbook Reference
General Information
Tools
Ports
Logs
List of Critical Settings
General Apache Information
List of Ports
Summary
Index
A
B
C
D
E
F
H
I
J
L
M
N
P
R
S
T
V
W
更新时间:2021-07-02 11:38:09