O'Reilly logo

Network Security Architectures by Sean Convery

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8. Common Application Design Considerations

This chapter covers the following topics:

 

I don't want to insist on it, Dave, but I am incapable of making an error.

 
 --Arthur C. Clarke, 2001: A Space Odyssey, 1968
 

The Answer to the Great Question . . . Of Life, the Universe and Everything . . . Is . . . Forty-two.

 
 --Douglas Adams, The Hitch Hiker's Guide to the Galaxy, 1979

Although this book will certainly not go into great detail on application security, in certain cases application security relies on the network for its overall security strategy. This chapter presents best practices for the deployment of e-mail, DNS, HTTP/HTTPS, and FTP. A short discussion on instant messaging ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required