官术网_书友最值得收藏!

What This Book Covers

Chapter 1 : This foundational chapter gets the reader ready by reviewing terminology, understanding hosting companies, and how to select them. It also deals with learning to architect Joomla! correctly at first, including where to download Joomla! from, its important settings, permissions and trip-ups, and lastly setting up metrics for security.

Chapter 2 : Once you have your site planned, setting up a test and development environment allows you to make sure each extension will work with the others as planned. This chapter gives the reader a methodology to effectively set up and use a test/dev environment, with a review of a great tool, Lighthouse, for software development project management.

Chapter 3 : There are a few key tools every Joomla! administrator should have in his or her security arsenal. This chapter covers the tools used to protect your site.

Chapter 4 : What is a vulnerability? It is anything that can be used against you to harm your site. This chapter introduces some common vulnerabilities and how they work.

Chapter 5 : Specific attacks such as SQL Injections are discussed here with live examples of code used to attack sites, kiddie scripts, and other more advanced attacks.

Chapter 6 : Do you ever wonder what tools the bad guys use? This chapter covers some of the commonly available tools, and how they are used against you.

Chapter 7 : This chapter details out the two important safeguards to your infrastructure. It offers a detailed view with code samples of each of these critical files.

Chapter 8 : Without a doubt, log files are the first and the best indication of a coming attack. Yet many administrators do not know how to interpret these critical files, or worse yet, ignore them. This chapter will teach the reader how to read log files and take care of them for forensic purposes.

Chapter 9 : SSL is the guardian of e-commerce on the Internet. In this chapter, you will learn how SSL works, where to obtain a certificate, and how to implement it in your Joomla! site.

Chapter 10 : Even the best laid plans go astray. If a site is actually hit, you have an incident to handle. This chapter will educate you on some best practices for handling the incident in an effective manner.

Appendix : Looking for that one bit of information? This chapter is a concise reference to highly important items of security information that will be important to your daily efforts in protecting your site.

主站蜘蛛池模板: 霍城县| 铜鼓县| 清远市| 武穴市| 成安县| 永川市| 高青县| 离岛区| 蛟河市| 湖北省| 蒲城县| 奉贤区| 广宁县| 靖远县| 尼勒克县| 崇义县| 吉首市| 昌都县| 苗栗市| 清苑县| 赤城县| 霸州市| 梨树县| 阳城县| 太仆寺旗| 寿宁县| 大邑县| 德江县| 邵东县| 定结县| 化州市| 吉安市| 藁城市| 柞水县| 萍乡市| 杭锦旗| 潼关县| 绍兴市| 克拉玛依市| 通海县| 柘荣县|