By Ivan Ristic

Note: This publication is now out of print. loose electronic model (PDF, EPUB, Kindle, on-line) is accessible from the writer on

With greater than sixty seven% of net servers operating Apache, it's via some distance the main well-known net server platform on this planet. Apache has developed right into a robust approach that simply opponents different HTTP servers by way of performance, potency, and velocity. regardless of those outstanding services, although, Apache is simply a important instrument if it is a safe one.

To ascertain, directors fitting and configuring Apache nonetheless desire a sure-fire approach to safe it-whether it is operating a big e-commerce operation, company intranet, or simply a small pastime site.

Our new advisor, Apache Security, offers directors and site owners simply what they crave-a accomplished safety resource for Apache. effectively combining Apache management and net safety themes, Apache Security speaks to almost every body within the box. what is extra, it bargains a concise creation to the speculation of securing Apache, in addition to a wide point of view on server protection in general.

But this booklet is not just approximately thought. the genuine power of Apache Security lies in its wealth of fascinating and sensible recommendation, with many real-life examples and recommendations. directors and programmers will learn the way to:

  • install and configure Apache
  • prevent denial of provider (DoS) and different assaults
  • securely percentage servers
  • control logging and tracking
  • secure custom-written internet functions
  • conduct an internet safety evaluation
  • use mod_security and different security-related modules

and that is simply the top of the iceberg, as mainstream Apache clients also will achieve important info on personal home page and SSL/ TLS. essentially, Apache Security is packed and to the purpose, with lots of info for locking down this very hot and flexible net server.

Show description

Quick preview of Apache Security PDF

Similar Computing books

Emerging Trends in Image Processing, Computer Vision and Pattern Recognition (Emerging Trends in Computer Science and Applied Computing)

Rising tendencies in picture Processing, desktop imaginative and prescient, and trend attractiveness discusses the newest in tendencies in imaging technological know-how which at its center includes 3 intertwined computing device technological know-how fields, specifically: picture Processing, laptop imaginative and prescient, and trend attractiveness. there's major renewed curiosity in each one of those 3 fields fueled via vast facts and knowledge Analytic tasks together with yet no longer restricted to; purposes as diversified as computational biology, biometrics, biomedical imaging, robotics, safeguard, and information engineering.

Introduction to Cryptography with Coding Theory (2nd Edition)

With its conversational tone and useful concentration, this article mixes utilized and theoretical elements for a high-quality creation to cryptography and defense, together with the newest major developments within the box. Assumes a minimum history. the extent of math sophistication is corresponding to a direction in linear algebra.

Absolute C++ (5th Edition)

&>NOTE: You are deciding to buy a standalone product; MyProgrammingLab doesn't come packaged with this content material. if you happen to would like to buy either the actual textual content and MyProgrammingLab look for ISBN-10: 0132989921/ISBN-13: 9780132989923. That package includes ISBN-10: 013283071X/ISBN-13: 9780132830713 and ISBN-10: 0132846578/ISBN-13: 9780132846578.

Problem Solving with C++ (9th Edition)

Be aware: you're deciding to buy a standalone product; MyProgrammingLab doesn't come packaged with this content material. if you'd like to buy either the actual textual content and MyProgrammingLab  look for ISBN-10: 0133862216/ISBN-13: 9780133862218. That package deal comprises ISBN-10: 0133591743/ISBN-13: 9780133591743  and ISBN-10: 0133834417 /ISBN-13: 9780133834413.

Extra info for Apache Security

Show sample text content

Zero. 50. tar. gz. asc trying to make sure the signature at this aspect will lead to GnuPG complaining approximately now not having the suitable key to ensure the signature: $ gpg httpd-2. zero. 50. tar. gz. asc gpg: Signature made Tue 29 Jun 2004 01:14:14 AM BST utilizing DSA key identification DE885DD3 gpg: cannot fee signature: public key no longer came upon GnuPG supplies out the original key identification (DE885DD3), that are used to fetch the foremost from one of many key servers (for instance, pgpkeys. mit. edu): $ gpg --keyserver pgpkeys. mit. edu --recv-key DE885DD3 gpg: /home/ivanr/. gnupg/trustdb. gpg: trustdb created gpg: key DE885DD3: public key "Sander Striker " imported gpg: overall quantity processed: 1 gpg: imported: 1 This time, an try to payment the signature provides passable effects: $ gpg httpd-2. zero. 50. tar. gz. asc gpg: Signature made Tue 29 Jun 2004 01:14:14 AM BST utilizing DSA key identity DE885DD3 gpg: strong signature from "Sander Striker " gpg: aka "Sander Striker " gpg: aka "Sander Striker " gpg: aka "Sander Striker " gpg: checking the trustdb gpg: no eventually depended on keys discovered fundamental key fingerprint: 4C1E ADAD B4EF 5007 579C 919C 6635 B6C0 DE88 5DD3 At this aspect, we will be convinced the archive is real. at the Apache site, a dossier includes the general public keys of all Apache builders (http://www. apache. org/dist/httpd/KEYS). you should use it to import all their keys instantaneously yet I like to obtain keys from a third-party key server. you might want to forget about the suspicious taking a look message ("no eventually depended on keys found") in the meanwhile. it's regarding the idea that of net of belief (covered in bankruptcy 4). Downloading patches occasionally, the simplest model of Apache isn't really inside the latest model archive. while a major trojan horse or a safety challenge is found, Apache builders will repair it quick. yet getting a brand new revision of the software program free up takes time end result of the extra complete trying out overhead required. occasionally, an issue isn't really thought of severe sufficient to warrant an early subsequent unencumber. In such circumstances, resource code patches are made to be had for obtain at http://www. apache. org/dist/httpd/patches/. hence, the full resource code obtain technique contains downloading the newest reputable free up by way of a fee for and attainable obtain of non-compulsory patches. Static Binary or Dynamic Modules the following immense selection is whether or not to create a unmarried static binary, or to bring together Apache to exploit dynamically loadable modules. back, the tradeoff is whether or not to spend extra time in an effort to get extra defense. Static binary is reportedly swifter. a good way to squeeze the final little bit of functionality from your server, pick out this selection. yet, as is turning into swifter and quicker, the diversities among the 2 types will not make a distinction. A static server binary can't have a precompiled dynamic module backdoor extra to it. (If you're unexpected with the concept that of backdoors, see the sidebar Apache Backdoors.

Download PDF sample

Rated 5.00 of 5 – based on 22 votes