Syndetics cover image
Image from Syndetics

Internet forensics : using digital evidence to solve computer crime / Robert Jones

By: Jones, RobertPublisher: California : O'Reilly Media, Inc., 2006Description: 226 p. 24 cm001: 10093ISBN: 059610006XSubject(s): Computer crime | Computer security | InternetDDC classification: 005.8 JON
Holdings
Item type Current library Collection Call number Copy number Status Date due Barcode
Book MAIN LIBRARY Book PRINT 005.8 JON (Browse shelf(Opens below)) 1 Available 081371

Enhanced descriptions from Syndetics:

Because it's so large and unregulated, the Internet is a fertile breeding ground for all kinds of scams and schemes. Usually it's your credit card number they're after, and they won't stop there. Not just mere annoyances, these scams are real crimes, with real victims. Now, thanks to Internet Forensics from O'Reilly, there's something you can do about it.

This practical guide to defending against Internet fraud gives you the skills you need to uncover the origins of the spammers, con artists, and identity thieves that plague the Internet. Targeted primarily at the developer community, Internet Forensics shows you how to extract the information that lies hidden in every email message, web page, and web server on the Internet. It describes the lengths the bad guys will go to cover their tracks, and offers tricks that you can use to see through their disguises. You'll also gain an understanding for how the Internet functions, and how spammers use these protocols to their devious advantage.

The book is organized around the core technologies of the Internet-email, web sites, servers, and browsers. Chapters describe how these are used and abused and show you how information hidden in each of them can be revealed. Short examples illustrate all the major techniques that are discussed. The ethical and legal issues that arise in the uncovering of Internet abuse are also addressed.

Not surprisingly, the audience for Internet Forensics is boundless. For developers, it's a serious foray into the world of Internet security; for weekend surfers fed up with spam, it's an entertaining and fun guide that lets them play amateur detective from the safe confines of their home or office.

Index

Table of contents provided by Syndetics

  • "Preface
  • 1 Getting Started with JBoss Why ""JBoss at Work""?
  • Why JBoss? The Example: JAW Motors
  • The Tools Installing JBoss Deploying Applications to JBoss Looking Ahead
  • 2 Web Applications
  • The Servlet Container Three-Tier Applications
  • Exploring the Presentation Tier Building the View Cars
  • Page Adding a Model and Controller Looking Ahead
  • 3 Building and Deploying an EAR WARs Versus EARs Application.xml
  • Common JAR Deploying the EAR Adding a DAO Using XDoclet Looking Ahead
  • 4 Databases and JBoss Persistence Options JDBC JNDI JNDI
  • References in web.xml JBoss DataSource
  • Descriptors JDBC Driver JARs Database Checklist
  • Accessing the Database Using Ant Creating JDBCCarDAO Looking Ahead
  • 5 Hibernate and JBoss
  • The Pros and Cons of ORMs
  • Hibernate Mapping Files Hibernate MBean Service Descriptor Creating a HAR Adding the HAR to the EAR Creating a JNDI lookup
  • Hibernate Checklist
  • HibernateCarDAO Adding a Car
  • Editing a Car
  • Deleting a Car
  • Looking Ahead
  • 6 Stateless Session Beans Issues with EJBs Should I Use EJB or Not?
  • Business Tier Enterprise JavaBeans Our Example Iteration 1-Introduce a Session Bean
  • Calling the Session Bean from the Controller Servlet EJB-Based JNDI
  • References in Web-Based Deployment Descriptors Session Bean
  • Types Session Beans
  • Remote Versus Local EJB Calls Local and Remote Interfaces
  • Home Interfaces Reviewing Iteration
  • 1 Testing Iteration 1 Iteration 2-Move Business Logic Out of the Controller Reviewing Iteration
  • 2 Testing Iteration 2 Iteration 3-Buy a Car The Accounting
  • DTO Developing the Hibernate
  • Accounting
  • DAO Adding buyCar( ) to the Inventory
  • FaçadeBean Reviewing Iteration 3 Testing Iteration 3 Final Thoughts on Session Beans Looking Ahead . . .
  • 7 Java Message Service (JMS) and Message-Driven Beans
  • Sending Messages with JMS Upgrade the Site: Running a Credit Check JMS Architecture
  • Overview JMS Messaging Models
  • Creating a Message
  • Sending the Message
  • Core JMS API Sending a JMS Message
  • JMS-Based JNDI
  • References in Web-Based Deployment Descriptors
  • Deploying JMS Destinations on JBoss JMS Checklist
  • Message-Driven Beans (MDBs) MDB Checklist
  • Testing the Credit Check Looking Ahead . . .
  • 8 JavaMail Running a Credit Check Sending Email Messages with JavaMail
  • Upgrading the MDB to Send an Email Message
  • Sending an Email Message JavaMail-Based JNDI
  • References in EJB Deployment Descriptors
  • Automating JavaMail-Based JNDI
  • References with XDoclet Deploying JavaMail on JBoss JavaMail
  • Checklist Testing the Credit Check Notification Email Looking Ahead . . .
  • 9 Security J2EE Security Web-Based Security Restricting Access with web.xml JAAS
  • Deploying a JAAS-Based Security Realm on JBoss
  • Testing Secure JSPs Protecting the Administrative Actions Web Security Checklist
  • Integrating Web Tier and EJB Tier Security
  • EJB Security
  • EJB Security Checklist Looking Ahead . . .
  • 10 Web Services Web Services
  • Architecture JBoss 4.x and Web Services
  • J2EE 1.4 and Web Services
  • Implementing J2EE 1.4 Web Services Service
  • Endpoint Interface (SEI) Modifying ejb-jar.xml webservices.xml
  • JAX-RPC Mapping File WSDL File Set the Web Service URL Modifying the Inventory
  • FacadeBean EJB Web Services Deployment Automating Web Services Deployment J2EE Web Services Checklist
  • Testing Web Services Deployment Web Services Client
  • Implementing a Web Service Client Web Service Client
  • Checklist Testing the Web Service Client Final Thoughts on J2EE 1.4 Web Services
  • Conclusion Congratulations!
  • A ClassLoaders and JBoss
  • B Logging and JBoss
  • C JAAS Tutorial
  • Index"

There are no comments on this title.

to post a comment.

Powered by Koha