Find the standard you are looking for at Engineering360. Documents are available for purchase from the IHS Standards Store.

1 - 20 of 49 results

FAA - FO 1370.113 - WEB SECURITY MANAGEMENT POLICY Organization: FAA
Date: 2012-04-16
Description: This policy addresses: a. Implementing and maintaining security controls for web servers, such as those that provide Internet and email services; b.
NAVY - NAVAIR 5238.1 - (CIO(00-CIO)) NAVAL AIR SYSTEMS COMMAND POLICY AND GUIDELINES FOR WEB SITES, WEB APPLICATIONS, AND WEB SERVERS Organization: NAVY
Date: 2004-11-18
Description: To establish standard policy and guidelines regarding Web sites, Web applications and Web servers in compliance with Federal, Department of Defense (DoD) and Department of the Navy (DON) Information Technology (IT) mandates.
PACKT - MASTERING WINDOWS SERVER - MASTERING WINDOWS SERVER 2016 Organization: PACKT
Date: 2016-10-25
Description: Three important and crucial areas to cover in the Remote Access role -- DirectAccess, VPN, and the Web Application Proxy -- are also covered. You will then move into security functions and benefits that are available in Windows Server 2016.
PACKT - UBUNTU SERVER COOKBOOK - UBUNTU SERVER COOKBOOK Organization: PACKT
Date: 2016-06-30
Description: With its easy-to-use package management tools and availability of well-known packages, we can quickly set up our own services such as web servers and database servers using Ubuntu. This book will help you develop the skills required to set up high performance and secure services with open source tools.
PACKT - CENTOS 7 SERVER DEPLOYMEN - CENTOS 7 SERVER DEPLOYMENT COOKBOOK Organization: PACKT
Date: 2016-10-06
Description: What You Will Learn • See how to deploy CentOS easily and painlessly, even in multi-server environments • Configure various methods of remote access to the server so you don’t always have to be in the data center • Make changes to the default configuration of many services to harden them and increase the security of the system • Learn to manage DNS, emails and web servers • Protect yourself from threats by monitoring and logging network intrusion and system intrusion attempts, rootkits, and viruses • Take advantage of today’s powerful hardware by running multiple systems using virtualization In Detail CentOS is derived from Red Hat Enterprise Linux (RHEL) sources and is widely used as a Linux server.
PACKT - CENTOS 7 LINUX SERVER COO - CENTOS 7 LINUX SERVER COOKBOOK - SECOND EDITION Organization: PACKT
Date: 2016-01-29
Description: Further on, we cover advanced topics such as FTP services, building your own DNS server, running database servers, and providing mail and web services. Finally, you will get a deep understanding of SELinux and you will learn how to work with Docker operating-system virtualization and how to monitor your IT infrastructure with Nagios.
PACKT - LEARNING GO WEB DEVELOPME - LEARNING GO WEB DEVELOPMENT Organization: PACKT
Date: 2016-04-27
Description: Build frontend-to-backend web applications using the best practices of a powerful, fast, and easy-to-deploy server language About This Book • Build a fully-featured REST API to enable client-side single page apps • Utilize TLS to build reliable and secure sites • A quick guide that provides everything a developer needs to know to build end-to-end web applications in Go Who This Book Is For This book is intended for experienced programmers with minimal-to-moderate exposure to the Go language.
PACKT - KALI LINUX WEB PENETRATIO - KALI LINUX WEB PENETRATION TESTING COOKBOOK Organization: PACKT
Date: 2016-02-29
Description: What You Will Learn  • Set up a penetration testing laboratory in a secure way • Find out what information is useful to gather when performing penetration tests and where to look for it • Use crawlers and spiders to investigate an entire website in minutes • Discover security vulnerabilities in web applications in the web browser and using command-line tools • Improve your testing efficiency with the use of automated vulnerability scanners • Exploit vulnerabilities that require a complex setup, run custom-made exploits, and prepare for extraordinary scenarios • Set up Man in the Middle attacks and use them to identify and exploit security flaws within the communication between users and the web server • Create a malicious site that will find and exploit vulnerabilities in the user's web browser • Repair the most common web vulnerabilities and understand how to prevent them becoming a threat to a site's security  In Detail Web applications are a huge point of attack for malicious hackers and a critical area for security professionals and penetration testers to lock down and secure.
PACKT - WEB PENETRATION TESTING W - WEB PENETRATION TESTING WITH KALI LINUX - SECOND EDITION Organization: PACKT
Date: 2015-11-26
Description: What You Will Learn • Set up your lab with Kali Linux 2.0 • Identify the difference between hacking a web application and network hacking • Understand the different techniques used to identify the flavor of web applications • Expose vulnerabilities present in web servers and their applications using server-side attacks • Use SQL and cross-site scripting (XSS) attacks • Check for XSS flaws using the burp suite proxy • Find out about the mitigation techniques used to negate the effects of the Injection and Blind SQL attacks In Detail Kali Linux 2.0 is the new generation of the industry-leading BackTrack Linux penetration testing and security auditing Linux distribution.
LUL - S1739 - SECURITY PATCHING - ISSUE A1 Organization: LUL
Date: 2016-10-01
Description: This includes: a) user devices, including ‘thick’ and ‘thin’ desktop computers, portable devices such as laptops and mobile devices such as tablet computers and smartphones b) servers (physical and virtual), including file servers, application servers, web servers, database servers and any servers that manage network connections.
PACKT - WORDPRESS 3 ULTIMATE SECU - WORDPRESS 3 ULTIMATE SECURITY Organization: PACKT
Date: 2011-06-13
Description: Just as WordPress is used by a broad spectrum of website owners, with varying degrees of security know-how, so WordPress 3 Ultimate Security is written to be understood by security novices and web professionals alike. From site and server owners and administrators to members of their contributing team, this essential A to Z reference takes a complex and, let's face it, frankly dull subject and makes it accessible, encouraging, and sometimes even fun.
PACKT - SPRING SECURITY ESSENTIAL - SPRING SECURITY ESSENTIALS Organization: PACKT
Date: 2016-01-13
Description: We will also teach you about some up-to-date use cases such as building a security layer for RESTful web services and applications. The IDEs used and security servers involved are briefly explained, including the steps to install them.
PACKT - JOOMLA! WEB SECURITY - JOOMLA! WEB SECURITY Organization: PACKT
Date: 2008-10-15
Description: It starts out with the most basic of considerations such as choosing the right hosting sites then moves quickly into securing the Joomla! site and servers. This is a security handbook for Joomla! sites. It is an easy-to-use guide that will take you step by step into the world of secured websites.
PACKT - BUILDING A HOME SECU ARDU - BUILDING A HOME SECURITY SYSTEM WITH ARDUINO Organization: PACKT
Date: 2015-09-01
Description: It is used for a variety of different purposes and projects, from simple projects such as building a thermostat, to more advanced ones such as robotics, web servers, seismographs, home security systems and synthesizers. This book will demonstrate how the Arduino can be used to develop a highly connected home security system by mobilizing a network of sensors which can feed alerts back to an Arduino when alarms are triggered.
CEI CLC/TR 62541-2 - OPC UNIFIED ARCHITECTURE PART 2: SECURITY MODEL Organization: CEI
Date: 2012-10-01
Description: This part of IEC 62541 describes the OPC Unified Architecture (OPC UA) security model. It describes the security threats of the physical, hardware and software environments in which OPC UA is expected to run.
CENELEC - CLC/TR 62541-2 - OPC UNIFIED ARCHITECTURE - PART 2: SECURITY MODEL Organization: CENELEC
Date: 2010-08-01
Description: This part of IEC 62541 describes the OPC Unified Architecture (OPC UA) security model. It describes the security threats of the physical, hardware and software environments in which OPC UA is expected to run.
IEC TR 62541-2 - OPC UNIFIED ARCHITECTURE – PART 2: SECURITY MODEL - EDITION 2.0 Organization: IEC
Date: 2016-10-01
Description: These suggestions are generic in nature since the details would depend on the actual implementation of the OPC UA Applications and the choices made for the site security. It is assumed that the reader is familiar with Web Services and XML/SOAP.
PACKT - PHP ORACLE WEB DEVELOPMEN - PHP ORACLE WEB DEVELOPMENT: DATA PROCESSING, SECURITY, CACHING, XML, WEB SERVICES, AND AJAX Organization: PACKT
Date: 2007-07-30
Description: Through numerous examples, this book shows you how to build simple and efficient PHP applications on top of Oracle, efficiently distributing data processing between the Web/PHP server and Oracle Database server. Although this book covers only the most popular and up-to-date topic areas on the use of PHP in conjunction with Oracle, the author does not make any assumption about the skill level of the reader.
ITU-T M.3410 - GUIDELINES AND REQUIREMENTS FOR SECURITY MANAGEMENT SYSTEMS TO SUPPORT TELECOMMUNICATIONS MANAGEMENT - STUDY GROUP 4 Organization: ITU-T
Date: 2008-08-01
Description: The TSP's infrastructure spans, at a minimum: • Application servers (e.g., servers for mail, instant messaging, database, web, file, voice over IP (VoIP) and other applications); • Support servers (e.g., DNS [b-IETF RFC 2181], DHCP [b-IETF RFC 2131], NTP [b-IETF RFC 1305], backup, and other infrastructure support services); • Internetworking/transport components (e.g., multiplexers, switches, routers, transport gateways, application gateways, gateway controllers, packet-filters a.k.a. firewalls, content filters, access points, bridges, wired and wireless telephony devices and monitoring probes for QoS, and network activity, to name a few); • End user host systems (e.g., laptop systems, desktop systems, workstations, printers, etc.); and • Management systems (e.g., element management, network management, service management, and business management systems).
IETF RFC 5896 - GENERIC SECURITY SERVICE APPLICATION PROGRAM INTERFACE (GSS-API): DELEGATE IF APPROVED BY POLICY - UPDATES: 4120 Organization: IETF
Date: 2010-06-01
Description: Introduction Several GSS-API applications work in a multi-tiered architecture, where the server takes advantage of delegated user credentials to act on behalf of the user and contact additional servers. In effect, the server acts as an agent on behalf of the user. Examples include web applications that need to access e-mail or file servers, including CIFS file servers.

1 - 20 of 49 results