Securing PHP web applications /
"Hackers specifically target PHP Web applications. Why? Because they know many of these apps are written by programmers with little or no experience or training in software security. Don't be victimized. Securing PHP Web Applications will help you master the specific techniques, skills, an...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Upper Saddle River, N.J. :
Addison-Wesley,
©2009.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Part I: Web Development Is a Blood Sport--Don't Wander onto the Field without a Helmet Chapter 1: Security Is a Server Issue and Other Myths Part II: Is That Hole Really Big Enough to Drive a Truck Through? Chapter 2: Error HandlingChapter 3: System Calls Part III: What's in a Name? More than You Expect Chapter 4: Buffer Overflows and Variable Sanitation Chapter 5: Input Validation Chapter 6: Filesystem Access: Accessing the Filesystem for Fun and Profit Part IV: "Aw, Come On, Man, You Can Trust Me" Chapter 7: Authentication Chapter 8: Encryption Chapter 9: Session Security Chapter 10: Cross-Site Scripting Part V: Locking Up for the Night Chapter 11: Securing Apache and MySQL Chapter 12: Securing IIS and SQL Server Chapter 13: Securing PHP on the Server Chapter 14: Introduction to Automated Testing Chapter 15: Introduction to Exploit Testing Part VI: "Don't Get Hacked" Is Not a Viable Security Policy Chapter 16: Plan A: Designing a Secure Application from the Beginning Chapter 17: Plan B: Plugging the Holes in Your Existing Application Epilogue Appendix A Glossary Index.