Part IV. Security for Content Providers

This part of the book focuses on issues surrounding the content of the web server, rather than the mechanics of the web server’s operation.

Chapter 20 looks at techniques for controlling information to “private” areas of your web server.

Chapter 21 expands on the access control techniques described in Chapter 20 by discussing how you can use digital certificates for access control and secure messaging.

Chapter 22 shows how you can sign Windows binaries, including ActiveX controls and .EXE files, using Microsoft’s Authenticode technology.

Chapter 23 discusses the politics and the technology of controlling pornography on the Internet.

Chapter 24 explores the concept of data protection and discusses legislative and self-regulatory techniques for controlling the use of personal information.

Chapter 25 is a how-to guide for sending and receiving money over the Internet. For those interested in e-commerce history, this chapter also discusses a number of failed digital payment systems.

Chapter 26 discusses trademarks, copyright, and patents—all legal structures that can be used to protect information.

Get Web Security, Privacy & Commerce, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.