Internet Security: How to Defend Against Attackers on the Web, Second Edition

Internet Security: How to Defend Against Attackers on the Web, Second Edition

Mike Harwood
ISBN-13: 978-1-284-09055-0
400 pages
© 2016

Learn More
Request a Review Copy

  • Description
  • Applied Labs
  • Table of Contents
  • Course Objectives
  • Resources

The Second Edition of Internet Security: How to Defend Against Attackers on the Web (formerly titled Security Strategies in Web Applications and Social Networking) provides an in-depth look at how to secure mobile users as customer-facing information migrates from mainframe computers and application servers to Web-enabled applications. Written by an industry expert, the book explores the evolutionary changes that have occurred in data processing and computing, personal and business communications, and social interactions and networking on the Internet. It goes on to review all the risks, threats, and vulnerabilities associated with Web-enabled applications accessible via the Internet. Using examples and exercises, the Second Edition incorporates hands-on activities to prepare readers to successfully secure Web-enabled applications.

New and Key Features of the Second Edition

  • NEW! – Includes a new Chapter 4, Securing Mobile Communications
  • Addresses the latest Web security issues and solutions from administrator, developer, and user perspectives
  • Examines mobile device and connectivity security
  • Tips, Notes, FYIs, and Warnings appear throughout the text and provide helpful information related to the subject at hand
  • Chapter Assessments, at the end of each chapter, allow readers to test their understanding of key material from the chapter with solutions provided at the back of the book.

This title is available with Virtual Security Cloud Labs – delivered in a first-of-its-kind cloud computing environment- that provides a fully immersive mock IT infrastructure enabling hands-on-experiential learning. An integrated lab manual is available to assist you with these labs.

Lab #1: Evaluating Web Server Vulnerabilities
Lab #2: Obtaining Personally Identifiable Information Through Internet Research
Lab #3: Performing a Post-Mortem Review of a Data Breach Incident
Lab #4: Exploiting Known Web Vulnerabilities on a Live Web Server
Lab #5: Applying OWASP to a Web Security Assessment
Lab #6: Applying Regulatory Compliance Standards
Lab #7: Performing Dynamic and Static Quality Control Testing
Lab #8: Performing an IT and Web Application Security Assessment
Lab #9: Recognizing Risks and Threats Associated with Emerging Technologies
Lab #10: Implementing a Security Development Lifecycle (SDL) Plan
Chapter 1: From Mainframe to Client-Server to World Wide Web
Chapter 2: Security Considerations for SMB’s
Chapter 3: Security Considerations for Home and Personal Online Use
Chapter 4: Securing Mobile Communications
Chapter 5: Mitigating Risk When Connecting to the Internet
Chapter 6: Mitigating Web Site Risks, Threats, and Vulnerabilities
Chapter 7: Introducing the Web Application Security Consortium (WASC)
Chapter 8: Securing Web Applications
Chapter 9: Mitigating Web Application Vulnerabilities
Chapter 10: Maintaining PCI DSS Compliance for E-commerce Web Sites
Chapter 11: Testing and Quality Assurance for Production Web Sites
Chapter 12: Performing a Web Site Vulnerability and Security Assessment
Chapter 13: Securing End-Point Device Communications
Chapter 14: Securing Personal and Business Communications
Chapter 15: Web Application Security Organizations, Education, Training, and Certification
  1. Analyze the impact of the Internet and Web applications on the business world.
  2. Analyze the evolution of social media and social networking.
  3. Compare and contrast Web-based risks.
  4. Analyze common Web site attacks, weaknesses, and security best practices.
  5. Describe the attributes and qualities of secure coding practices.
  6. Analyze the role and importance of audit and compliance to Web application security.
  7. Analyze the role and importance of quality assurance testing for Web applications.
  8. Explain the value and importance of vulnerability and security assessments for Web applications.
  9. Evaluate next-generation challenges in securing Web applications and data.
  10. Construct a comprehensive lifecycle approach to Web application security.

Instructor Resources include:

  • PowerPoint Lectures
  • Instructor’s Guide
  • Test and Quiz Items
  • Sample Syllabus
  • Case Scenarios/Handouts
  • Handouts
  • Projects
  • Study Guide
  • Time on Task
  • Content Map