O'Reilly logo

TICSA TruSecure™ ICSA Certified Security Associate Exam TU0-001 by Shawn Porter, Debra Littlejohn Shinder, Mike Chapple

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

IP Protocols and Services

The Application layer can be the most difficult layer to secure against hackers because you are at the mercy of different operating systems and applications. Add to this mix specialized software written for you by a software developer and you have the propensity for long hours researching and securing the software on your systems and servers. The next few sections outline a few of the major concerns at the Application level—mainly Internet services that your users might use and of which hackers might try to take advantage. Although the following information represents by no means the definitive works on these topics and is not the complete listing of potential points of contention, it constitutes a list of the major ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required