Red Hat NETSCAPE ENTERPRISE SERVER 6.0 - PROGRAMMER GUIDE TO SERVLETS User's Guide Page 30

  • Download
  • Add to my manuals
  • Print
  • Page
    / 328
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 29
Chapter 1: Security Risks
1-8
Resource to be protected Possible threat
IJServer log file Tampering of data recorded in the file
Exploitation of information recorded in files
Damage to files
Log file for JServlet environment Tampering of data recorded in the file
Exploitation of information recorded in files
Damage to files
Log file for EJB environment Tampering of data recorded in the file
Exploitation of information recorded in files
Damage to files
Log in the database Tampering of data recorded
Exploitation of information recorded
Damage to data
Data in the database Tampering of data recorded
Exploitation of information recorded
Damage to data
Definition file for the Interstage HTTP
Server
Tampering of data recorded in the file
Exploitation of information recorded in files
Damage to files
Definition file for the InfoProvider Pro Tampering of data recorded in the file
Exploitation of information recorded in files
Damage to files
IJServer environment definition file Tampering of data recorded in the file
Exploitation of information recorded in files
Damage to files
Definition file for Servlet execution
environment
Tampering of data recorded in the file
Exploitation of information recorded in files
Damage to files
Definition file for EJB execution
environment
Tampering of data recorded in the file
Exploitation of information recorded in files
Damage to files
ear, war, jar, and rar deployment files Damage to files
Page view 29
1 2 ... 25 26 27 28 29 30 31 32 33 34 35 ... 327 328

Comments to this Manuals

No comments