- Paperback: 454 pages
- Publisher: Feisty Duck; 2 edition (July 15, 2017)
- Language: English
- ISBN-10: 1907117075
- ISBN-13: 978-1907117077
- Product Dimensions: 7.5 x 0.9 x 9.2 inches
- Shipping Weight: 1.8 pounds (View shipping rates and policies)
- Average Customer Review: 16 customer reviews
- Amazon Best Sellers Rank: #443,204 in Books (See Top 100 in Books)
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
ModSecurity Handbook, Second Edition 2nd Edition
Use the Amazon App to scan ISBNs and compare prices.
Frequently bought together
Customers who bought this item also bought
About the Author
Dr. Christian Folini is a partner at netnea AG in Berne, Switzerland. He holds a PhD in medieval history and enjoys defending castles across Europe. Unfortunately, defending medieval castles is not a big business these days, so Christian turned to defending web servers, which he thinks is equally challenging. With his background in humanities, Christian is able to bridge the gap between techies and nontechies. He has more than ten years of experience in this role, specializing in Apache/ModSecurity configuration, DDoS defense, and threat modeling. Christian is a frequent committer to the OWASP ModSecurity Core Rule Set, vice president of Swiss Cyber Experts (a public-private partnership), program chair of the Swiss Cyberstorm conference, and president of the Company of St. George, a well-known historical reenactment group.
Showing 1-8 of 16 reviews
There was a problem filtering reviews right now. Please try again later.
From my standpoint, the two most crucial parts of running ModSecurity are the configuration and the quality of the rules. The performance chapter was rewritten and contains heaps of helpful information to ensure that ModSecurity is run effectively. The rules writing section was also significantly updated and covers critical topics such as impedance mismatch, IP reputation, handling JSON requests and virtual patching.
As someone who develops a lot of virtual patches to protect various web apps, this book is a great resource even for advanced users and is very well written.
Information security is complex and searching for the magic bullet is a futile attempt. Therefore a robust, flexible and hard to use tools such as ModSecurity is so important. This is also why a true guide such as the Handbook is so needed.
Internet content tends to describe software’s feature and functions but misses on how to use the technology. The ModSecurity Handbook blends very well between the need to provide this detailed reference information and giving the reader guidelines and best practices on how to use ModSecurity to provide security.
Those guidelines are sometimes weaved into the functional description: stateful rule writing (i.e., persistent storage), writing rules using Lua, extending ModSecurity in C or inspecting XML payloads. However were the ModSecurity handbook really shines are those chapters that are wholly about guidance and best practices. I especially like the “Practical rule writing” chapter that guides the reader on how to use ModSecurity to protect web applications effectively and the all new to the second edition “Performance” chapter venturing into the yet uncharted territory of tuning rule sets to ensure protection is not sacrificed due to performance challenges.
Bottom line: if you value your web apps and want a secret security source, use ModSecurity. And if you use it, you need the Handbook, preferably the 2nd edition: Christian built on the first edition foundation updating to the latest software version and getting the handbook yet another step further with new and expanded topics.
For beginners, ModSecurity Handbook goes far beyond a user manual. It does not only contain a reference guide but, what is the most important, a pedagogical approach to teach ModSecurity concepts. It’s a must-have for all sysadmins beginning with the product.
Where the product manual focuses on using the “core rules” (the generic ones supposed to protect any application), this book teaches you how to implement real security by writing your own rules and, potentially, integrating with other products.
On top of that, this book details a lot of internal aspects of the product (like performance). As with the previous version, I learnt some new tips, even after 15 years using it!
Marc Stern, Cyber Security Consulting Director at Approach Belgium