Документация
HTML CSS PHP PERL другое

Chapter 17. Securing Your Web Applications: Software and Hardware Security

 
Previous
Table of Contents
Next

Chapter 17. Securing Your Web Applications: Software and Hardware Security

In the previous chapter, we began our discussion of securing web applications by looking at the definition of security and identifying key threats we would face. We then developed a broad approach to dealing with security, first by looking at how to secure the code we write in PHP and SQL. We will continue the discussion by looking at how we secure our software and hardware.

In this chapter, we will

  • Continue our systematic approach to dealing with security by moving through the configuration of web servers, database software, and operating systems

  • Look at ways to protect our networks from attacks

  • Discuss planning for disasters and disaster recovery


Previous
Table of Contents
Next
© 2000- NIV