Ways to improve performance of your server in ModSecurity 2.5
A typical HTTP request
To get a better picture of the possible delay incurred when using a web application firewall, it helps to understand the...
CISSP: Security Measures for Access Control
Knowledge requirements
A candidate appearing for the CISSP exam should have knowledge in the following areas that relate to access control:
Control access by applying concepts,...
Telecommunications and Network Security Concepts for CISSP Exam
Transport layer
The transport layer in the TCP/IP model does two things: it packages the data given out by applications to a format that is...
Public Key Infrastructure (PKI) and other Concepts in Cryptography for CISSP Exam
Public key infrastructure
Public Key Infrastructure (PKI) is a framework that enables integration of various services that are related to cryptography.
The aim of PKI is...
Preventing SQL Injection Attacks on your Joomla Websites
Introduction
Mark Twain once said, "There are only two certainties in life-death and taxes." Even in web security there are two certainties: It's not "if...
Preventing Remote File Includes Attack on your Joomla Websites
PHP is an open-source server-side scripting language. It is the basis of many web applications. It works very nicely with database platforms such as...