Blue Cotton Shirt
Green Cotton Shirt White Silk Shirt ….
">
Blue Cotton Shirt
Green Cotton Shirt White Silk Shirt ….
">
Download presentation
Presentation is loading. Please wait.
1
Maintaining State in a Stateless System
Use your script to write data to a temporary file on the server and to start each time by reading any data in that file Use JavaScript to process activities in a given session and send results to server at end only Hide data in forms and send it back and forth Keep everything in a database Use Servlets GETS TRICKY!!
2
Hidden Fields … <FORM NAME="Form1">
<INPUT TYPE= "HIDDEN" NAME= "Shirt1" VALUE="25"> <INPUT TYPE= "CHECKBOX" NAME= "Check1">Blue Cotton Shirt <br> <INPUT TYPE= "HIDDEN" NAME= "Shirt2" VALUE="26"> <INPUT TYPE= "CHECKBOX" NAME= "Check2" >Green Cotton Shirt <INPUT TYPE= "HIDDEN" NAME= "Shirt3" VALUE="27"> <INPUT TYPE= "CHECKBOX" NAME= "Check3">White Silk Shirt …. <P> <INPUT TYPE="submit" NAME="Go" VALUE="Register!"> <INPUT TYPE="RESET" VALUE="Reset!"> </FORM>
3
1-Tier Architecture Processing
Main Frame
4
1-Tier Architecture Processing
1-Ask for file Client Files 2-File 4-return file File Server
5
Two Tiers Web Server Web Client User HTTP request
Response to HTTP request Web Server Web Client
6
Tier 2 Tier 3 Tier 1 2 HTTP request 1 HTTP request 3 TCP/IP internet 4
DBMS Web Server Tier 2 Tier 3 Web Client Tier 1
7
Operating Systems For Web Servers
Microsoft Windows NT Server Microsoft Windows 2000 Advanced Server Microsoft.NET Server Linux Solaris
8
Web Server Software Apache HTTP Server
Microsoft Internet Information Server (IIS) Sun ONE (iPlanet, Netscape) Web Server
9
A catalog display Shopping cart capabilities Transaction processing
10
Middleware Application integration Web services Integration with ERP software Supply chain management software Customer relationship management software Content management software Knowledge management Software
11
E-commerce Software Intershop Enfinity
WebSphere Commerce Professional Edition Microsoft Commerce Server 2002
12
Back Doors And Trojan Horses
13
Virus Protection Install anti-virus software – McAfee, Norton, Dr. Solomon, Symantec Downloading of plug-ins from the internet be avoided Downloading of plug-ins should be done from the vendor’s official website Newly obtained disks, programs or files should be scanned for viruses before use Installation of a firewall may also reduce the risk of virus infiltration
14
Outside Attacks On A Network
Eavesdropping/Sniffing/Snooping – ability to monitor network traffic using some kind of network-monitoring software Password Attacks – attacker is able to gain access to the network and gather information such as valid users, computer names, resources – can lead to modification, deletion or rerouting of network data IP Address Spoofing – attacker assumes a legal IP address and gain access to the network Man-in-the–middle attacks – attacker is able to monitor, capture and control data between sending and receiving devices
15
Firewalls A combination of hardware and software that sits between the internet and the internal network Protects a network from outside attack A firewall examines data leaving and entering the internal network and is able to filter the data according to the specified rules
16
Internet Fire wall Organization network
17
Types of Firewalls Packet Filter Firewall Circuit-Level Firewall
Application-Gateway Firewall
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.