版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進行舉報或認領(lǐng)
文檔簡介
LAMPLAMP1.11.1.2.(2)2.2LAMPLAMPLinuxApacheMySQLPHP四個開源軟件構(gòu)成的開放資源2.2LAMPLAMPLinuxApacheMySQLPHP四個開源軟件構(gòu)成的開放資源Apache服務(wù)器,令其辨識不同的主機名。2.2.3Linux2.3LAMP(Linux+Apache+Mysql+Php)1.a(chǎn)ddingthe2.checktherevisetheDeletetheLinuxApache網(wǎng)絡(luò)服務(wù)器,MysqlPHPLinuxApache網(wǎng)絡(luò)服務(wù)器,MysqlPHPLAMP設(shè)計(論文)起止時間:201491920155301571112910121314(包括國內(nèi)外現(xiàn)狀、研究方向、進展情況、存在問題、參考依據(jù)等(包括國內(nèi)外現(xiàn)狀、研究方向、進展情況、存在問題、參考依據(jù)等1.1.發(fā)。ASPASP務(wù)器、MySQLPHPWeb應(yīng)用程掌握”特性,使得它的網(wǎng)絡(luò)開發(fā)更加有效[7]。LAMPLAMP得更加具有競爭力,更加能吸引客戶。開放源代碼的LAMP使用高性能的操作系統(tǒng)Linux)、高性能的網(wǎng)頁服務(wù)器Apache)、高性能的數(shù)據(jù)庫(MySQL)、高效率的編程語言(PHP)WebLAMPLinuxWindowsUnix具有先天的優(yōu)勢。一方面是LinuxLinux對硬件的要求較低,跨Windows網(wǎng)絡(luò)系統(tǒng)相比,Linux系統(tǒng)的網(wǎng)絡(luò)性能優(yōu)異,具有較好的穩(wěn)定性、高效性和安全性。Linux處在最底層,提供操作系統(tǒng)。靈活性和可定制化的特點使它能夠產(chǎn)生一種高度定制的平臺,讓其它組件在上面運行。Apache,PHPMySQLWindows(IISwebApache)上[8]。LinuxLAMP組合的基礎(chǔ),它的安全關(guān)系到整個系統(tǒng)的穩(wěn)定,只有保證LinuxUnixWindows、ApacheApache節(jié)點數(shù)Apache等其他服務(wù)器集成在一起。MySQL體積小,速PHP(HypertextPreprocessor,超文本預(yù)處理器的縮寫)是一種當今最為流行的有開源和免費的獨特優(yōu)勢[11]。PHPWebPHPHTMLPHPLinux+Apache+Mysql+Perl/PHP/PythonLinuxApacheWEB服務(wù)器、MySQLPHPhttp請求,都由LinuxApache服務(wù)器處理,如果請求靜態(tài)頁面,則將目錄下存放PHPPHPPHP面返回給客戶端[12]Internet的快速發(fā)展,電子商務(wù)的普及,網(wǎng)上購物已經(jīng)成為一種很普遍的早期安裝一個LAMP系統(tǒng)是比較復雜的,隨著面返回給客戶端[12]Internet的快速發(fā)展,電子商務(wù)的普及,網(wǎng)上購物已經(jīng)成為一種很普遍的早期安裝一個LAMP系統(tǒng)是比較復雜的,隨著Linux的普及現(xiàn)在安裝一個LAMPLinux發(fā)行版本(Redhat、Debian)安裝時可Apache、php、mysql等組件。LAMP(Linux、Apache、MySQLPHP/Perl)架構(gòu)的應(yīng)用程序不斷被強大而簡單的環(huán)境[13]。按照簡單的形式,基于LAMP的應(yīng)用程序是用PHP這LinuxApacheWebPHPURL戶機獲得信息,從而確定應(yīng)該執(zhí)行什么操作。PHPApache的一個擴展模塊進行安裝的,它不能獨立運行,必須依托于Apache服務(wù)器[14]。服務(wù)器會從MySQLHTML模板組合在一起,并將結(jié)果返回在內(nèi)的大部分數(shù)據(jù)庫[15]+PHP+MySQLLinuxMYSQLLinuxMYSQL數(shù)據(jù)庫,最后安裝PHPApache。PHPPHPPHPMySQL數(shù)據(jù)PHP語句時要注意的格式和語法。虞萍.虞萍.影響企業(yè)電子商務(wù)成功的網(wǎng)站因素研究[D].北京中國農(nóng)業(yè)大張慶壞.我國同城電子商務(wù)的發(fā)展機遇及前景[J].吉林工程技術(shù)師范學院齊晶.中國電子商務(wù)發(fā)展與規(guī)制研究[D].遼寧:遼寧大學鄭鎮(zhèn)耿.LAMP環(huán)境架設(shè)Apache虛擬主機站點[J].計算機光盤軟件與應(yīng)彭俊.LAMP的網(wǎng)址導航站的設(shè)計與實現(xiàn)[D].南昌:南昌大學王麗娜.基于LAMP的家樂電器網(wǎng)上商城的開發(fā)[D].大連:大連理工大薛鴻民.基于LAMP的售書網(wǎng)站的設(shè)計與實現(xiàn)[J].科技資訊Ramana,U.V.,Prabhakar,T.V.SomeExperimentswiththePerformanceofLAMPArchitecture[C].ComputerandInformationTechnology,2005.CIT2005.TheFifthInternationalConference,2005,P916–920.黃陽.LAMP架構(gòu)電商平臺方案設(shè)計[J].電子商務(wù).2013,10:44-何杭鋒.基于LAMP平臺的WEB服務(wù)器架構(gòu)[J].中國新技術(shù)新產(chǎn)ZaidmanA,DemeyerS.Automaticidentificationofkeyclassesinasoftwaresystemusingwebminingtechniques[J].ResearchandPractice.2008,20(6):387–417.張麥玲,王鴻銘.LAMPWEB服務(wù)器安全架構(gòu)[J].數(shù)字技術(shù)與應(yīng)蔣方純.LAMP開源軟件編程模式的配置與實現(xiàn)[J].深圳信息職業(yè)技術(shù)學肖萍.LAMP平臺的網(wǎng)站構(gòu)建與分析[J].信息網(wǎng)絡(luò)安全谷和啟.PHP+LINUX+APACHEAttaining原稿題目PerspectivesAttaining原稿題目PerspectivesonFreeand(野生轉(zhuǎn)移,并發(fā)缺陷和分布式系統(tǒng)故障(野生轉(zhuǎn)移,并發(fā)缺陷和分布式系統(tǒng)故障率的編程可以顛覆這些工具的目的,進一步比較平衡的討論,請參見五篇論文(Lipner2000;McGraw2000;Neumann2000;Schneider2000;andWittenetal.2000)LeeBadge組織和主持。這些貢獻基本上都是健全這里列出的優(yōu)點或缺點。Lipner探索了一些真正的好處和一些重大缺openish商業(yè)模式。Witten論文探討經(jīng)濟學、指標和模型。此外,NeumannNeumann2004DARPA的報告(Neumann2003年)ACM的檔案風險指數(shù)(Neumann2003b)ACM的檔案風險指數(shù)(Neumann2003b)戶和專家可以使他們仔細研讀代碼并發(fā)現(xiàn)弱點(Kerckhoffs1883年(2002Brown(Collar-Kotelly2002年還有一個相關(guān)的問題就是:有關(guān)被發(fā)現(xiàn)的漏洞信息是否需要公布。20032Slashdot的技術(shù)報告下載Anderson的重要途徑,并且它經(jīng)常的情況是,開放系統(tǒng)(或封閉的系統(tǒng))PerspectivesonFreeandOpenSource“IsPerspectivesonFreeandOpenSource“Isopensourcesoftwareinherentlybetterthanclosed-sourceproprietarysoftware?”Thisisaquestionthatisfrequentlyheard,withvariousintendedmeaningsof“better.”Asaparticularlydemandingcase,letusconsidercriticalapplicationswithstringentrequirementsforcertainattributessuchassecurity,reliability,faulttolerance,humansafety,andsurvivability,allinthefaceofawiderangeofrealisticadversities—including coordinatedattacks,andactsofGod.Inaddition,let’stossinoperationalrequirementsforextensiveinteroperability,evolvability,maintainability,andcleaninterfacedesignofthosesystems,whilestillsatisfyingthecriticalrequirements.Inthiscontext,weareinterestedindeveloping,operating,andusingcomputersystemsthatarerobustandeasilyTocuttothechase,theanswertothesimplequestionposedinthefirstsentenceissimpleinconcept,butdecidedlynotsosimpleinexecution:Opensourcesoftwareisnotintrinsicallybetterthanclosed-sourceproprietarysoftware.However,ithasthepotentialforbeingbetterifitsdevelopmentprocessaddressesmanyfactorsthatarenormallyexperiencedinmass-marketproprietarysoftware,suchastheWell-definedandthoroughlyevaluatedrequirementsforsystemandapplicationbehavior,includingfunctionalrequirements,behavioralrequirements,operationalrequirements,and—aboveall—arealisticrangeofsecurityandreliabilitySystemandnetworkarchitecturesthatexplicitlyaddresstheserequirements.Soundarchitecturescanleadtosignificantcostandqualitybenefitsthroughoutthedevelopmentandlatersystemevolution.Asystemdevelopmentapproachthatexplicitlyaddressestheserequirements,pervasivelyandconsistentlythroughoutthedevelopment.。Useofprogramminglanguagesthatareinherentlyabletoavoidmanyofthecharacteristicflaws(suchasbufferoverflows,typemismatches,wildtransfers,concurrencyflaws,anddistributed-systemglitches)thattypicallyariseinunstructured,untyped,anderror-pronelanguagesandthatseemtoprevailoverdecades,throughnewsystemreleasesandnewsystems.Intelligentuseofcompilersandotherdevelopmenttoolsthathelpinidentifyingeliminatingadditionalflaws.However,sloppyprogrammingcansubverttheintentthesetools,andthesetools,andthusgoodprogrammingpracticeisstillExtensivedisciplineonthepartofdesigners,implementers,andmanagersthroughouttheentiresoftwaredevelopmentprocess.Thisultimatelyrequiresbetterintegrationofarchitecture,security,reliability,soundprogrammingtechniques,andsoftwareengineeringintothemainstreamofoureducationalandtrainingprograms.Pervasiveattentiontomaintainingconsistencywiththestatedrequirementsthroughoutoperation,administration,andmaintenance,despiteongoingsystemiterations.Somecombinationofformalandinformalapproachescanbeveryhelpfulinthisregard.Conceptually,manyproblemscanbeavoidedthroughsuitablychosenarchitectures,programminglanguages,compilers,andotheranalysistools—althoughultimately,theabilitiesofdesignersandprogrammersarealimitingfactor.Theanswertotheinitiallyposedquestionshouldnotbesurprisingtoanyonewhohashadconsiderableexperienceindevelopingsoftwarethatmustsatisfystringentrequirements.However,notethatalthoughthesamedisciplinecouldbeusedbythedevelopersofclosed-sourcesoftware,marketplaceforcestendtomakethismuchmoredifficultthanintheopensourceworld.Inparticular,thereseemstobeanincreasingtendencyamongthemass-marketproprietarysoftwaredeveloperstorushtomarket,whethertheproductisreadyornot—inessence,lettingthecustomersbethebetatesters.Furthermore,effortstoreducecostsoftenseemtoresultinlowest-common-denominatorproducts.Indeed,satisfyingstringentrequirementsforsecurityandreliability(forexample)isgenerallynotagoalthatyieldsmaximumprofits.Thus,forpracticalreasons,Iconcludethattheopen-sourceparadigmhassignificantpotentialthatismuchmoredifficulttoattaininclosed-sourceproprietarysystems.Thepotentialbenefitsofnonproprietarynonclosed-sourcesoftwarealsoincludetheabilitytomoreeasilycarryoutopenpeerreviews,addnewfunctionalityeitherlocallyortothemainlineproducts,identifyflaws,andfixthemrapidly—forexample,throughcollaborativeeffortsinvolvingpeopleirrespectiveoftheirgeographicallocationsandcorporateallegiances.Ofcourse,therisksincludeincreasedopportunitiesforevil-doerstodiscoverflawsthatcanbeexploited,andtoinserttrapdoorsandTrojanhorsesintothecode.Thusasensibleenvironmentmusthavemechanismsforensuringreliableandsecuresoftwaredistributionandlocalsystemintegrity.Itmustalsomakegooduseofsystemarchitectures,publickeyauthentication,cryptographicintegrityseals,cryptography,andtrustworthydescriptionsoftheprovenanceofindividualcomponentsandwhocryptography,andtrustworthydescriptionsoftheprovenanceofindividualcomponentsandwhohasmodifiedthem.Furtherresearchisneededonsystemsthatcanbepredictablycomposedoutofevaluatedcomponentsorthatcansurmountsomeofthevulnerabilitiesofthecomponents.Westillneedtoavoiddesignflawsandimplementationbugs,andtowarrantiesonsystemstodayaremostlyveryweak.Westilllackseriousmarketincentives.However,despiteallthechallenges,thepotentialbenefitsofrobustopen-sourcesoftwareareworthyofconsiderablecollaborativeeffort.Forafurtherfairlybalanceddiscussionoftherelativeadvantagesanddisadvantageswithrespecttoimprovingsecurity,seefivepapers(Lipner2000;McGraw2000;Neumann2000;Schneider2000;andWittenetal.2000)presentedatthe2000IEEESymposiumonSecurityandPrivacy.ThesessionwasorganizedandchairedbyLeeBadger.Thesecontributionsallessentiallyamplifytheprosand/orconsoutlinedhere.Lipnerexploressomerealbenefitsandsomesignificantdrawbacks.McGrawstatesflatlythat“openish”softwarewillnotreallyimprovesecurity.Schneidernotesthat“thelion’sshareofthevulnerabilitiescausedbysoftwarebugsiseasilydealtwithbymeansotherthansourcecodeinspections.”Healsoconsidersinhospitabilitywithbusinessmodels.TheWittenpaperexploreseconomics,metrics,andmodels.Inaddition,Neumann’sWebdevelopmentforcriticalrequirements,withparticularattentiontotherequirements,systemandnetworkarchitectures,anddevelopmentpractices.Inparticular,seeNeumann2004forareportforDARPA(summarizedbrieflyinNeumann2003a)ontheimportanceofarchitecturesinattainingprincipledassuredlytrustworthycomposablesystemsandnetworks,withparticularemphasisonopensourcebutwithgeneralapplicabilityaswell.ThatreportispartoftheDARPACHATSprogramoncomposablehigh-assurancetrustedsystems,whichisseriouslyaddressingmanyofthepromisingaspectsofmakingopen-sourcesoftwaremuchmorerobust.Furthermore,seethearchivesoftheACMRisksForum,asummaryindex(Neumann2003b)tocountlesscasesofsystemsthatfailedtoliveuptotheirrequirements,andananalysisofmanyoftheseriskscasesandwhatneedstobedonetominimizetherisks(Neumann1995).Itisanobvioustruismthatweshouldbelearningnottomakethesamemistakessoconsistently.Itisanequallyobvioustruismthattheselessonsarenotbeinglearned—mostspecificallywithrespecttoreliability,survivability,interoperability,andmanyother“-PeopleintheopensourceandfreesoftwarecommunityoftenarguethatmakingsourcecodePeopleintheopensourceandfreesoftwarecommunityoftenarguethatmakingsourcecodeavailabletoallisgoodforsecurity.Usersandexpertscanporeoverthecodeandfindvulnerabilities:“tomanyeyes,allbugsareshallow,”asEricRaymond(2001,41)putsit.Thisideaisnotentirelynew.Intheworldofcryptography,ithasbeenstandardpracticesincethenineteenthcenturytoassumethattheopponentknowsthedesignofyoursystem,sotheonlywayyoucankeephimoutisbydenyinghimknowledgeofatemporaryvariable,thekey(Kerckhoffs1883).However,opendesignisnotanideathateveryoneaccepts,evennow.Opponentsoffreesoftwarearguethat“ifthesoftwareisinthepublicdomain,thenpotentialhackershavealsohadtheopportunitytostudythesoftwarecloselytodetermineitsvulnerabilities”(Brown2002).Thisissueisnowassumingeconomicandpoliticalimportance,astheantitrustsettlementbetweenMicrosoftandtheDepartmentofJusticecompelsMicrosofttomakealotofinformationaboutinterfacesavailabletoitscompetitors—butwiththeprovisionthatdatawhosedisclosuremightprejudicesecuritymaybewithheld(Collar-Kotelly2002).Unsurprisingly,Microsoftisnowdiscoveringthatmanymoreaspectsofitssystemsaresecurity-relevantthanhadpreviouslybeenthought.Thereisarelatedissue:whetherinformationaboutdiscoveredvulnerabilitiesmaybepublished.InFebruary2003,Citibankobtainedaninjunctionprohibitinganyreportingofsecurityvulnerabilitiesofautomatictellermachinesystemsdisclosedbymyselfandtwocolleaguesatatrialwhichwewereattendingasexpertwitnesses.Thiswascounterproductiveforthebank,asitcompelledustopublishourattacksinaninvitedtalkandatechnicalreportinthedaysjustbeforethegagginghearing.Wewereslashdottedandthetechnicalreportwasdownloadedover110,000times(AndersonandBond2003;BondandZielinski2003).Butthisisunlikelytobethelasttimethatgaggingordersareusedagainstsecurityvulnerabilities;ifanything,theDigitalMillenniumCopyrightActandtheproposedEuropeanUnionDirectiveontheenforcementofintellectualpropertyrightswillmakethemevenmorecommon.Sothereisgrowingpublicinterestinthequestionofwhetheropennessisofmorevaluetotheattackerorthedefender.Thisquestionismuchmoregeneralthanwhethersoftwaresourcecodeshouldbeavailabletousers.Awiderangeofsystemsandcomponentscanbeeithereasierormoredifficulttotest,inspect,andrepair,dependingontheavailabletoolsandaccess.Hardwaredevicescanoftenbereverseengineeredsurprisinglylittleeffort—althoughthecapitalresourcesneededtofabricateaclonemightbescarce.Thedifferencebetween“open”and“closed”mayalsobelegalratherthantechnical;iflawsprohib
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責。
- 6. 下載文件中如有侵權(quán)或不適當內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 中國政法大學《工程中的數(shù)值方法C》2023-2024學年第一學期期末試卷
- 鄭州西亞斯學院《現(xiàn)代通信原理》2023-2024學年第一學期期末試卷
- 長江工程職業(yè)技術(shù)學院《公共服務(wù)質(zhì)量管理》2023-2024學年第一學期期末試卷
- 消費級3D打印機打印精度改進
- 保險行業(yè)基礎(chǔ)講解模板
- 業(yè)務(wù)操作-房地產(chǎn)經(jīng)紀人《業(yè)務(wù)操作》名師預(yù)測卷4
- 開學晨會發(fā)言稿
- 二零二五年政府形象廣告服務(wù)合同規(guī)范
- 二零二五版國際學校外教引進與團隊建設(shè)協(xié)議3篇
- 2024-2025學年新疆烏魯木齊四十一中高二(上)期末數(shù)學試卷(含答案)
- 《道路交通安全法》課件完整版
- 向女朋友認錯保證書范文
- 五分數(shù)加法和減法(課件)-數(shù)學五年級下冊
- 2024年四川省綿陽市中考語文試卷(附真題答案)
- 設(shè)計材料與工藝課程 課件 第1章 產(chǎn)品設(shè)計材料與工藝概述
- 幼兒園反恐防暴技能培訓內(nèi)容
- 食品企業(yè)質(zhì)檢員聘用合同
- 中醫(yī)診所內(nèi)外部審計制度
- 自然辯證法學習通超星期末考試答案章節(jié)答案2024年
- 2024年國家危險化學品經(jīng)營單位安全生產(chǎn)考試題庫(含答案)
- 護理員技能培訓課件
評論
0/150
提交評論