Readers will first be educated on the most common vulnerabilities they are likely to encounter as a site administrator. >From this basis, we then transition into the proper way to write code to prevent attacks within the Drupal environment. Finally, readers will learn how to spot vulnerabilities in existing modules, how to find sites with these vulnerabilities, and then exploit one or more vulnerabilities to take control of a site. Understanding this mindset and being paranoid of it is the first step in keeping your site safe INDICE: include: Intro: That Horrible Sinking Feeling Part I: Anatomy of Vulnerabilities Chapter 1: Common Ways Drupal Gets Cracked Chapter 2: Vulnerabilities Outside Drupal Part 2: Protecting Against Vulnerabilities Chapter 3: Protecting With Drupal Configuration Chapter 4: The User and Permission System Chapter 5: Dangerous Input, Cleaning Output Chapter 6: Safety in the Theme Chapter 7: Drupal Access System Chapter 8: Protecting Your Server Part 3: Weaknesses in the Wild Chapter 9: Finding, Exploiting and Avoiding Vulnerabilities Chapter 10: Leveraging Community Resources
- ISBN: 978-0-470-42903-7
- Editorial: John Wiley & Sons
- Encuadernacion: Rústica
- Páginas: 240
- Fecha Publicación: 08/05/2009
- Nº Volúmenes: 1
- Idioma: Inglés
- Inicio /
- INFORMÁTICA /
- REDES