Chapter 8. Common Application Design Considerations
This chapter covers the following topics:
• DNS
• FTP
I don’t want to insist on it, Dave, but I am incapable of making an error. —Arthur C. Clarke, 2001: A Space Odyssey, 1968
The Answer to the Great Question . . . Of Life, the Universe and Everything . . . Is . . . Forty-two. —Douglas Adams, The Hitch Hiker’s Guide to the Galaxy, 1979
Although this book will certainly not go into great detail on application security, in certain cases application security relies on the network for its overall security strategy. This chapter presents best practices for the deployment of e-mail, DNS, HTTP/HTTPS, and FTP. A short discussion on instant ...
Get Network Security Architectures now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.