192899427x.pdf; 192899427x.pdf; Cover; Table of Contents; Foreword; Chapter 1 Applying Security Principles to Your E-Business; Chapter 2 DDoS Attacks: Intent, Tools, and Defense; Chapter 3 Secure Web Site Design; Chapter 4 Designing and Implementing Security Policies; Chapter 5 Implementing a Secure E-Commerce Web Site; Chapter 6 Securing Financial Transactions; Chapter 7 Hacking Your Own Site; Chapter 8 Disaster Recovery Planning: The Best Defense; Chapter 9 Handling Large Volumes of Network Traffic; Chapter 10 Incident Response, Forensics, and the Law
Summary
This guide provides computer architects and engineers the information they need to design and implement security measures. It uses forensics-based analysis to give the reader insight into the mind of a hacker