CMS Security Handbook: The Comprehensive Guide for WordPress, Joomla, Drupal, and Plone - Tapa blanda

Canavan, Tom

 
9780470916216: CMS Security Handbook: The Comprehensive Guide for WordPress, Joomla, Drupal, and Plone

Sinopsis

Learn to secure Web sites built on open source CMSs Web sites built on Joomla!, WordPress, Drupal, or Plone facesome unique security threats. If you re responsible for oneof them, this comprehensive security guide, the first of its kind,offers detailed guidance to help you prevent attacks, developsecure CMS-site operations, and restore your site if an attack doesoccur. You ll learn a strong, foundational approach to CMSoperations and security from an expert in the field. * More and more Web sites are being built on open source CMSs,making them a popular target, thus making you vulnerable tonew forms of attack * This is the first comprehensive guide focused on securing themost common CMS platforms: Joomla!, WordPress, Drupal, andPlone * Provides the tools for integrating the Web site into businessoperations, building a security protocol, and developing a disasterrecovery plan * Covers hosting, installation security issues, hardening serversagainst attack, establishing a contingency plan, patchingprocesses, log review, hack recovery, wireless considerations, andinfosec policy CMS Security Handbook is an essential reference foranyone responsible for a Web site built on an open source CMS.

"Sinopsis" puede pertenecer a otra edición de este libro.

Acerca del autor

Tom Canavan is a computer industry professional whose career goes from the mainframe era to the cloud. He is recognized as one of the very few top security experts in the CMS space, and was a keynote speaker and featured presenter at CMS Expo 2010 on CMS security.

De la contraportada

Protect your business. Protect your customers. Here's how:

Websites built on open source Content Management Systems (CMSs) are uniquely vulnerable. If you are responsible for maintaining one, or if you are the executive or business owner in charge of approving IT budgets, you need to know what's in this book. Here's the lowdown on very real security threats, how attacks are carried out, what security measures you need to take, and how to compile a disaster recovery plan. Don't wait. Your business may depend on the action you take.

  • Learn what to look for in a hosting company

  • Examine your website through the eyes of a hacker

  • Explore the many tools that help you assess system vulnerabilities

  • Discover ways to prevent problems before they start

  • Know what steps you can take to protect your server from attack

  • Create a workable disaster recovery plan

  • Develop an IT security policy that can be implemented and followed

"Sobre este título" puede pertenecer a otra edición de este libro.