First, the website application attack and the defense
Second, information encryption technology and key security
Third, information filtering and anti-spam
Iv. risk control of e-commerce
V. Summary of Studies
in a twinkling, the This is the end of the reading notes for the technical architecture of large Web sites. The recent time is very tight, so this article does not describe the notes in detail (this article involves too much content, and all are security-related). Through this book, we learn from the high-performance, high-availability, scalability, scalability, security Five aspects of the architecture of each aspect of the classic technical solutions, although more theoretical, but still can be glimpse from, at a glance at the face of large-scale web site technology. Later, when I get my job done, I get the offer mono linux deploy asp.net MVC Project, with the help of nginx/jexus build Load balancer server, mssql database reading and writing, and so on, will also take time to learn to write a blog post to the blog park, to share with you garden friends.
Finally, thank you for the attention of the park friends, because this article my lazy lead to this article is relatively rough rotten system, so do not send to the blog home page of the impact of the overall level, everyone smiled and past it.
reprinted from http://www.cnblogs.com/edisonchou/
Reading notes 8 security architecture for websites