Angebote zu "Authentication" (20 Treffer)

Kategorien

Shops

Web Database Applications with PHP and MySQL
63,90 CHF *
ggf. zzgl. Versand

There are many reasons for serving up dynamic content from a web site: to offer an online shopping site, create customized information pages for users, or just manage a large volume of content through a database. Anyone with a modest knowledge of HTML and web site management can learn to create dynamic content through the PHP programming language and the MySQL database. This book gives you the background and tools to do the job safely and reliably. Web Database Applications with PHP and MySQL, Second Edition thoroughly reflects the needs of real-world applications. It goes into detail on such practical issues as validating input (do you know what a proper credit card number looks like?), logging in users, and using templates to give your dynamic web pages a standard look. But this book goes even further. It shows how JavaScript and PHP can be used in tandem to make a user's experience faster and more pleasant. It shows the correct way to handle errors in user input so that a site looks professional. It introduces the vast collection of powerful tools available in the PEAR repository and shows how to use some of the most popular tools. Even while it serves as an introduction to new programmers, the book does not omit critical tasks that web sites require. For instance, every site that allows updates must handle the possibility of multiple users accessing data at the same time. This book explains how to solve the problem in detail with locking. Through a sophisticated sample application--Hugh and Dave's Wine Store--all the important techniques of dynamic content are introduced. Good design is emphasized, such as dividing logic from presentation. The book introduces PHP 5 and MySQL 4.1 features, while providing techniques that can be used on older versions of the software that are still in widespread use. This new edition has been redesigned around the rich offerings of PEAR. Several of these, including the Template package and the database-independent query API, are fully integrated into examples and thoroughly described in the text. Topics include: * Installation and configuration of Apache, MySQL, and PHP on Unix®, Windows®, and Mac OS® X systems * Introductions to PHP, SQL, and MySQL administration * Session management, including the use of a custom database for improved efficiency * User input validation, security, and authentication * The PEAR repository, plus details on the use of PEAR DB and Template classes * Production of PDF reports

Anbieter: Orell Fuessli CH
Stand: 09.12.2019
Zum Angebot
Enhancing Biometric Authentication Using Visual...
79,90 CHF *
ggf. zzgl. Versand

A reliable identity management system is urgently needed in order to combat the epidemic growth in identity theft and to meet the increased security requirements in a variety of applications. Biometric authentication establishes the identity of a person based on 'who he is', rather than 'what he knows' or 'what he possess'. There are usually two very serious criticisms against biometric technology that have not been addressed satisfactorily, biometrics are not secrets and enrolled biometric templates are not revocable. The first fact implies that the attacker has a ready access to the legitimate biometric trait (e.g., facial image finger print of an enrolled user of the biometric system) and, therefore, could fraudulently inject it into the biometric system to gain access. The second fact implies that when a biometric trait has been 'compromised', the legitimate user has no recourse to revoking the trait. In this work, we devise a technique that complements the weakness of a biometric system by Combining both biometrics and a Visual-based challenge response for access control, thus Enhancing Biometric System Using Visual-Based Challenge Response, having considered human factor.

Anbieter: Orell Fuessli CH
Stand: 09.12.2019
Zum Angebot
Applied Information Security
42,90 CHF *
ggf. zzgl. Versand

This book explores fundamental principles for securing IT systems and illustrates them with hands-on experiments that may be carried out by the reader using accompanying software. The experiments highlight key information security problems that arise in modern operating systems, networks, and web applications. The authors explain how to identify and exploit such problems and they show different countermeasures and their implementation. The reader thus gains a detailed understanding of how vulnerabilities arise and practical experience tackling them. After presenting the basics of security principles, virtual environments, and network services, the authors explain the core security principles of authentication and access control, logging and log analysis, web application security, certificates and public-key cryptography, and risk management. The book concludes with appendices on the design of related courses, report templates, and the basics of Linux as needed for the assignments. The authors have successfully taught IT security to students and professionals using the content of this book and the laboratory setting it describes. The book can be used in undergraduate or graduate laboratory courses, complementing more theoretically oriented courses, and it can also be used for self-study by IT professionals who want hands-on experience in applied information security. The authors' supporting software is freely available online and the text is supported throughout with exercises.

Anbieter: Orell Fuessli CH
Stand: 09.12.2019
Zum Angebot
Applied Information Security
42,90 CHF *
ggf. zzgl. Versand

This book explores fundamental principles for securing IT systems and illustrates them with hands-on experiments that may be carried out by the reader using accompanying software. The experiments highlight key information security problems that arise in modern operating systems, networks, and web applications. The authors explain how to identify and exploit such problems and they show different countermeasures and their implementation. The reader thus gains a detailed understanding of how vulnerabilities arise and practical experience tackling them. After presenting the basics of security principles, virtual environments, and network services, the authors explain the core security principles of authentication and access control, logging and log analysis, web application security, certificates and public-key cryptography, and risk management. The book concludes with appendices on the design of related courses, report templates, and the basics of Linux as needed for the assignments. The authors have successfully taught IT security to students and professionals using the content of this book and the laboratory setting it describes. The book can be used in undergraduate or graduate laboratory courses, complementing more theoretically oriented courses, and it can also be used for self-study by IT professionals who want hands-on experience in applied information security. The authors' supporting software is freely available online and the text is supported throughout with exercises.

Anbieter: Orell Fuessli CH
Stand: 09.12.2019
Zum Angebot
Enhancing Microsoft Content Management Server w...
87,90 CHF *
ggf. zzgl. Versand

The release of Microsoft Content Management Server (MCMS) Service Pack 2 opens up the world of ASP.NET 2.0 to MCMS developers. Written by the masters of MCMS, this book shows you how to use the new features of ASP.NET 2.0 that everyone is talking about in your MCMS development. You will first learn how to install and configure MCMS SP2. There are two approaches to setting up a development environment for SP2: an upgrade from a previous SP1a installation or starting from scratch and building a fresh installation including SP2. Of course, both approaches are covered. You will become familiar with the MCMS Service Pack 2 development environment, and create custom Visual Studio 2005 templates to overcome some of the issues which are present with the templates shipped with MCMS SP2. After that, its time to look at some of the most exciting features of ASP.NET 2.0, and how you can make use of them in MCMS: master pages, site navigation, themes, and the membership provider model. One of the coolest features introduced with ASP.NET 2.0 is master pages, which allow developers to enforce common layout and behaviour across pages within an application. You will learn about the benefits of using master pages and see a step-by-step guide for implementing them in your MCMS applications, where they become master templates! ASP.NET 2.0 introduces a whole new way of implementing site navigation, driven by site maps. By programmatically adding channels and postings to a site map you will see how to smoothly integrate these controls to any MCMS site. To customize the look of your site, we will see how a common look and feel can be applied efficiently to a MCMS site by using ASP.NET 2.0 themes. An essential customization required for themes to work correctly in an MCMS site is a must-read feature of this chapter. MCMS has its own role based authorization and user management system which cannot be extended. However, the new ASP.NET 2.0 Membership Provider Model and the shipped controls can be used within MCMS applications to improve the implementation of Forms Authentication and provide a more elegant solution for authenticating against an external store. A collection of tips and tricks round off the book, including using the Provider Model design pattern to ease migration to Office SharePoint Portal Server.

Anbieter: Orell Fuessli CH
Stand: 09.12.2019
Zum Angebot
Web Application Security, A Beginner's Guide
53,90 CHF *
ggf. zzgl. Versand

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Security Smarts for the Self-Guided IT Professional 'Get to know the hackers-or plan on getting hacked. Sullivan and Liu have created a savvy, essentials-based approach to web app security packed with immediately applicable tools for any information security practitioner sharpening his or her tools or just starting out.' -Ryan McGeehan, Security Manager, Facebook, Inc. Secure web applications from today's most devious hackers. Web Application Security: A Beginner's Guide helps you stock your security toolkit, prevent common hacks, and defend quickly against malicious attacks. This practical resource includes chapters on authentication, authorization, and session management, along with browser, database, and file security--all supported by true stories from industry. You'll also get best practices for vulnerability detection and secure development, as well as a chapter that covers essential security fundamentals. This book's templates, checklists, and examples are designed to help you get started right away. Web Application Security: A Beginner's Guide features: Lingo--Common security terms defined so that you're in the know on the job IMHO--Frank and relevant opinions based on the authors' years of industry experience Budget Note--Tips for getting security technologies and processes into your organization's budget In Actual Practice--Exceptions to the rules of security explained in real-world contexts Your Plan--Customizable checklists you can use on the job now Into Action--Tips on how, why, and when to apply new skills and techniques at work

Anbieter: Orell Fuessli CH
Stand: 09.12.2019
Zum Angebot
Ajax: The Complete Reference
67,90 CHF *
ggf. zzgl. Versand

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, The Definitive Guide to Ajax Web Application Development Evolve from the click-and-wait programming pattern to the latest Web 2.0 paradigm using this comprehensive guide to Ajax. Written by Web development expert Thomas Powell, the book lays out every feature of Ajax alongside detailed explanations and real-world code examples. Ajax: The Complete Reference explains how to create and test Ajax-enabled Web applications using the XMLHttpRequest object as well as alternative JavaScript-based communication mechanisms. You'll explore a variety of sample applications featuring emerging user-interface conventions and build applications that address real-world networking and security issues. A robust communication library is developed throughout the book that enables you to architect flexible Ajax applications. The latest technologies such as Web services, Flash-Ajax integration, client-side templates, Comet, and Offline Access are also covered. Discover the future of Web development today! Work with traditional JavaScript communication approaches like iframes Explore all the quirks and details in the XMLHttpRequest object Handle disparate data formats, including XML, JSON, CSV, YAML, and more Deal with networking issues, including timeouts, retries, response ordering, and a variety of server and content errors Simplify JavaScript programming using open-source Ajax libraries like YUI Secure Ajax applications using authentication, obfuscation, and encryption Implement common Ajax UI patterns such as auto suggest, click-to-edit, and drag-and-drop Solve troubling Ajax architecture problems, including back button, history, and bookmarking issues Learn Ajax's role in Web 2.0 and Web services Explore push style communication using Comet and Flash Discover the future of offline Web application access and operation

Anbieter: Orell Fuessli CH
Stand: 09.12.2019
Zum Angebot
Rails Crash Course: A No-Nonsense Guide to Rail...
33,90 CHF *
ggf. zzgl. Versand

Rails is a robust, flexible development platform that lets you build complex websites quickly. Major websites like Twitter and GitHub run Rails under the hood, and if you know just enough HTML and CSS to be dangerous, Rails Crash Course will teach you to harness Rails for your own projects and create web applications that are fast, stable, and secure. In Part I, you’ll learn Ruby and Rails fundamentals and then dive straight into models, controllers, views, and deployment. As you work through the basics, you’ll learn how to: - Craft persistent models with Active Record - Build view templates with Embedded Ruby - Use Git to roll back to previous versions of your code base - Deploy applications to Heroku In Part II, you’ll take your skills to the next level as you build a social networking app with more advanced Ruby tools, such as modules and metaprogramming, and advanced data modeling techniques within Rails’s Active Record. You’ll learn how to: - Implement an authentication system to identify authorized users - Write your own automated tests and refactor your code with confidence - Maximize performance with the asset pipeline and turbolinks - Secure your app against SQL injection and cross-site scripting - Set up a server and deploy applications with Capistrano Each chapter is packed with hands-on examples and exercises to reinforce what you’ve learned. Whether you’re completely new to Ruby or you’ve been mucking around for a bit, Rails Crash Course will take you from the basics to shipping your first Rails application, fast.

Anbieter: Orell Fuessli CH
Stand: 09.12.2019
Zum Angebot
Security with Noisy Data
175,90 CHF *
ggf. zzgl. Versand

Noisy data appear very naturally in applications where the authentication is based on physical identifiers. This book provides a self-contained overview of the techniques and applications of security based on noisy data. It covers both the theory of authentication based on noisy data and shows it in practice as a key tool for prevention of counterfeiting. Biometrics and physical unclonable functions are discussed extensively. Key new technologies discussed include: -Algorithms to derive secure keys form noisy data in particular from Physical Unclonable Functions and Biometrics, - also the theory which proves that those algorithms are secure is made accessible; Practical Implementations of the above mentioned algorithms; - Techniques that give insight in the security of those systems in practice; An overview and detailed description of new applications that become possible by using these new algorithms. This book can serve as a starting point for PhD students entering the field and will also benefit professionals. TOC:Preface (Bart Preneel).- Introduction.- Part I: Theory of Security with Noisy Data.- Unbreakable Keys from Random Noise.- Fuzzy Commitment.- A Communication-Theretical View on Secret Extraction.- Fuzzy Extractors.- Robust and Reuseable Fuzzy Extractors.- Fuzzy Identities and Attribute-Based Encryption.- Unconditionally Secure Multi-Party Computation from Noisy Resources.- Computationally Secure Authentication with Noisy Data.- Part II: Applications of Security with Noisy Data.- Privacy enhancements for Inexact Biometric Templates.- Protection of Biometric Information.- On the Amount of Entropy in PUFs.- Entropy Estimation for Optical PUFs Based on Context-Tree Weighting Methods.- Controlled Physical Random Functions.- Experimental Hardware for Coating PUFs and Optical PUFs.- Secure Key Storage with PUFs.- Anti-Counterfeiting.- References.- Index.

Anbieter: Orell Fuessli CH
Stand: 09.12.2019
Zum Angebot