World Wide Web Journal: Volume 2, Issue 3This collection
of timely, in-depth articles frames web security as a matter of trust rather
than cryptography. It covers W3C's Digital Signature Initiative (DSI),
which breaks new ground in this area by binding machine-readable labels
to public key signatures. Other topics include medical records privacy
issues, signature legality, trust in Internet information systems, electronic
commerce, tips and tricks for secure web programming, and an interview
with Christine Varney, FTC Commissioner and specialist in Internet-related
commerce issues. Summer
1997, 282 p., 1-56592-329-4 |
Sendmail, 2nd Edition, covers
sendmail Version 8.8 from Berkeley and the standard versions available
on most systems. This cross-referenced edition offers an expanded tutorial,
solution-oriented examples, and new topics such as the #error delivery
agent, sendmail's exit values, MIME headers, and how to set up and use
the user database, mailertable, and smrsh.
1997, 1050 p., 1-56592-222-0, GBP 39,14 |
This beta edition of the definitive reference guide
to JavaScript, the HTML extension that gives web pages programming-language
capabilities, covers JavaScript as it is used in Netscape 3.0 and 2.0 and
in Microsoft Internet Explorer 3.0. Learn how JavaScript really works (and
when it doesn't). Use JavaScript to control web browser behavior, add dynamically
created text to web pages, interact with users through HTML forms, and
even control and interact with Java applets and Navigator plugins. By the
author of the bestselling Java in a Nutshell.
Beta edition 1996, 400 p., 1-56592-193-3, 25,00 GBP |
This second edition of the classic Practical UNIX Security
is a complete rewrite of the original book. It's packed with twice the
pages and offers even more practical information for UNIX users and administrators.
In it you'll find coverage of features of many types of UNIX systems, including
SunOS, Solaris, BSDI, AIX, HP-UX, Digital UNIX, Linux, and others. Contents
include UNIX and security basics, system administrator tasks, network security,
and appendices containing checklists and helpful summaries.
1996, 1004 p., 1-56592-148-8 |
Learn how to minimize the risks of the Web with this
comprehensive guide. It covers browser vulnerabilities, privacy concerns,
issues with Java, JavaScript, ActiveX, and plug-ins, digital certificates,
cryptography, web server security, blocking software, censorship technology,
and relevant civil and criminal issues.
1997, 506 p., 1-56592-269-7 |
This book tells you how to plan and build a virtual
private network, a collection of technologies that creates secure connections
or "tunnels" over regular Internet lines. It starts with general concerns
like costs and configuration and continues with detailed descriptions of
how to install and use VPN technologies that are available for Windows
NT and UNIX, such as PPTP and L2TP, the Altavista Tunnel, and the Cisco
PIX Firewall.
March 1998, 200 p., 1-56592-319-7 |