Chapter 8. Common Application Design Considerations

This chapter covers the following topics:

E-Mail

DNS

HTTP/HTTPS

FTP

Instant Messaging

Application Evaluation

I don’t want to insist on it, Dave, but I am incapable of making an error. —Arthur C. Clarke, 2001: A Space Odyssey, 1968

The Answer to the Great Question . . . Of Life, the Universe and Everything . . . Is . . . Forty-two. —Douglas Adams, The Hitch Hiker’s Guide to the Galaxy, 1979

Although this book will certainly not go into great detail on application security, in certain cases application security relies on the network for its overall security strategy. This chapter presents best practices for the deployment of e-mail, DNS, HTTP/HTTPS, and FTP. A short discussion on instant ...

Get Network Security Architectures now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.