|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-1-4842-0148-0 |
003 |
DE-He213 |
005 |
20220124155920.0 |
007 |
cr nn 008mamaa |
008 |
141226s2014 xxu| s |||| 0|eng d |
020 |
|
|
|a 9781484201480
|9 978-1-4842-0148-0
|
024 |
7 |
|
|a 10.1007/978-1-4842-0148-0
|2 doi
|
050 |
|
4 |
|a QA76.625
|
072 |
|
7 |
|a UMW
|2 bicssc
|
072 |
|
7 |
|a COM060160
|2 bisacsh
|
072 |
|
7 |
|a UMW
|2 thema
|
082 |
0 |
4 |
|a 006.76
|2 23
|
100 |
1 |
|
|a Lepofsky, Ron.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
4 |
|a The Manager's Guide to Web Application Security
|h [electronic resource] :
|b A Concise Guide to the Weaker Side of the Web /
|c by Ron Lepofsky.
|
250 |
|
|
|a 1st ed. 2014.
|
264 |
|
1 |
|a Berkeley, CA :
|b Apress :
|b Imprint: Apress,
|c 2014.
|
300 |
|
|
|a XX, 232 p. 11 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
520 |
|
|
|a The Manager's Guide to Web Application Security is a concise, information-packed guide to application security risks every organization faces, written in plain language, with guidance on how to deal with those issues quickly and effectively. Often, security vulnerabilities are difficult to understand and quantify because they are the result of intricate programming deficiencies and highly technical issues. Author and noted industry expert Ron Lepofsky breaks down the technical barrier and identifies many real-world examples of security vulnerabilities commonly found by IT security auditors, translates them into business risks with identifiable consequences, and provides practical guidance about mitigating them. The Manager's Guide to Web Application Security describes how to fix and prevent these vulnerabilities in easy-to-understand discussions of vulnerability classes and their remediation. For easy reference, the information is also presented schematically in Excel spreadsheets available to readers for free download from the publisher's digital annex. The book is current, concise, and to the point-which is to help managers cut through the technical jargon and make the business decisions required to find, fix, and prevent serious vulnerabilities.
|
650 |
|
0 |
|a Internet programming.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
1 |
4 |
|a Web Development.
|
650 |
2 |
4 |
|a Cryptology.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9781484201497
|
776 |
0 |
8 |
|i Printed edition:
|z 9781484201503
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-1-4842-0148-0
|z Texto Completo
|
912 |
|
|
|a ZDB-2-CWD
|
912 |
|
|
|a ZDB-2-SXPC
|
950 |
|
|
|a Professional and Applied Computing (SpringerNature-12059)
|
950 |
|
|
|a Professional and Applied Computing (R0) (SpringerNature-43716)
|