|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-1-4842-2120-4 |
003 |
DE-He213 |
005 |
20220124160024.0 |
007 |
cr nn 008mamaa |
008 |
160726s2016 xxu| s |||| 0|eng d |
020 |
|
|
|a 9781484221204
|9 978-1-4842-2120-4
|
024 |
7 |
|
|a 10.1007/978-1-4842-2120-4
|2 doi
|
050 |
|
4 |
|a QA76.625
|
072 |
|
7 |
|a UMW
|2 bicssc
|
072 |
|
7 |
|a COM060160
|2 bisacsh
|
072 |
|
7 |
|a UMW
|2 thema
|
082 |
0 |
4 |
|a 006.76
|2 23
|
100 |
1 |
|
|a Edmunds, Ben.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
0 |
|a Securing PHP Apps
|h [electronic resource] /
|c by Ben Edmunds.
|
250 |
|
|
|a 1st ed. 2016.
|
264 |
|
1 |
|a Berkeley, CA :
|b Apress :
|b Imprint: Apress,
|c 2016.
|
300 |
|
|
|a XIV, 52 p. 2 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
505 |
0 |
|
|a 1. Never Trust Your Users. Sanitize ALL Input! -- 2. HTTPS/SSL/BCA/JWH/SHA and Other Random Letters; Some of Them Actually Matter -- 3. Password Encryption and Storage for Everyone -- 4. Authentication, Access Control, and Safe File Handing -- 5. Safe Defaults, Cross Site Scripting, and Other Popular Hacks.
|
520 |
|
|
|a This is a quick read, at just over 100 pages. This is a handbook style guide to specific items you can act on. Is your PHP app truly secure? Let's make sure you get home on time and sleep well at night. Learn the security basics that a senior developer usually acquires over years of experience, all condensed down into one quick and easy handbook. Do you ever wonder how vulnerable you are to being hacked? Do you feel confident about storing your users sensitive information? Imagine feeling confident in the integrity of your software when you store your user's sensitive data. No more fighting fires with lost data, no more late nights, your application is secure. In this short book I'll give you clear, actionable details on how to secure various parts of your web application. You will also find scenarios to handle and improve existing legacy issues. What you'll learn Never trust your users - escape all input HTTPS/SSL/BCA/JWH/SHA and other random letters, some of them actually matter Password Encryption and Storage for Everyone Authentication, Access Control, and Safe File Handing Safe Defaults, Cross Site Scripting and other Popular Hacks.
|
650 |
|
0 |
|a Internet programming.
|
650 |
|
0 |
|a Computer programming.
|
650 |
|
0 |
|a Data protection.
|
650 |
1 |
4 |
|a Web Development.
|
650 |
2 |
4 |
|a Programming Techniques.
|
650 |
2 |
4 |
|a Data and Information Security.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9781484221198
|
776 |
0 |
8 |
|i Printed edition:
|z 9781484221211
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-1-4842-2120-4
|z Texto Completo
|
912 |
|
|
|a ZDB-2-CWD
|
912 |
|
|
|a ZDB-2-SXPC
|
950 |
|
|
|a Professional and Applied Computing (SpringerNature-12059)
|
950 |
|
|
|a Professional and Applied Computing (R0) (SpringerNature-43716)
|