RESEARCH AND BUILDING THE WEBSITE MONITORING SYSTEM FOR HUNG YEN UNIVERSITY OF TECHNOLOGY AND EDUCATION

  • Vu Xuan Thang Hung Yen University of Technology and Education
  • Dang Van Anh Hung Yen University of Technology and Education
  • Tran Do Thu Ha Hung Yen University of Technology and Education

Abstract

In the report we present the process of designing, installing and testing a comprehensive security solution for the website of Hung Yen University of Technology and Education. We can test attack techniques and anti-hacking websites on the Internet. Research on the use of rabbin fingerprints for the Hung Yen University of Technology and Education, which can be extended to other websites on the Internet

References

Hans Delfs and Helmut Knebl, “Introduction to Cryptoraphy”, 2nd Edition, Springer – 2007.

Miles Tracy, Wayne Jansen, Karen Scarfone, Theodore Winograd, “Guidelines on Securing Public Web Servers”, Version 2, NIST – September 2007.

Charles P. Pfleeger and Shari Lawrence, “Security in Computing”, 3rd Edition, Prentice Hall–2003.

William Stalling, “Cryptography and Network Security”, Prentice Hall – 1999.

Amanda Andress and Mandy Andress, Sams, “Surviving Security: How to Integrate People”, process, and technology, 2nd Edition, 2004.

E.L.Cashin, “Integerit file Verification System”, 2000.

Rocksoft, “Veracity- nothing can change without you knowing: Data Integrity Assurance”, 2003.

Selvitri F, “High Performance Issues in Web Search Engines”, 2004.

V.A.Narayana, P.Premchnd, IEEE International Advance Computing Conference (IACC2009), Patiala, India, “A Novel and Efficient Approach for Near Duplicate Page Detection in Web Crawling”, 6-7 March 2009.

A. Z. Broder, Springer-Verlag, “Some Applications of Rabin’s Fingerprinting Method”, 1993.

Rabin-Karp Algorithm, “Rolling Hash”, February 18, 2011.

Mark Ciampa (Course Technology, Cengage Learning), Security+ Guide to Network Security Fundamentals, Third Edition, 2009.

Published
2018-01-08