|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_ocn930602015 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
151130s2015 caua o 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d OCLCO
|d IDEBK
|d N$T
|d TEFOD
|d OCLCO
|d GL4
|d YDXCP
|d OCLCQ
|d OCLCO
|d OCLCF
|d OCLCO
|d CDX
|d EBLCP
|d NRC
|d DEBBG
|d OCLCQ
|d OCLCA
|d OCL
|d NJT
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 928990510
|a 931159481
|a 932588029
|a 935919806
|
020 |
|
|
|a 1491928719
|
020 |
|
|
|a 9781491928714
|
020 |
|
|
|a 9781491928707
|
020 |
|
|
|a 1491928700
|
020 |
|
|
|z 9781491928646
|
020 |
|
|
|z 1491928646
|
029 |
1 |
|
|a DEBBG
|b BV043967876
|
029 |
1 |
|
|a DEBSZ
|b 485783649
|
029 |
1 |
|
|a GBVCP
|b 882847678
|
035 |
|
|
|a (OCoLC)930602015
|z (OCoLC)928990510
|z (OCoLC)931159481
|z (OCoLC)932588029
|z (OCoLC)935919806
|
037 |
|
|
|a CL0500000677
|b Safari Books Online
|
050 |
|
4 |
|a QA76.76.A65
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Mueller, John,
|d 1958-
|e author.
|
245 |
1 |
0 |
|a Security for web developers :
|b using JavaScript, HTML, and CSS /
|c John Paul Mueller.
|
250 |
|
|
|a First edition.
|
264 |
|
1 |
|a Sebastopol, CA :
|b O'Reilly Media,
|c 2015.
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Online resource; title from cover page (Safari, viewed November 23, 2015).
|
500 |
|
|
|a Includes index.
|
505 |
0 |
|
|a Copyright; Table of Contents; Preface; About This Book; What You Need to Know; Development Environment Considerations; Icons Used in This Book; Conventions Used in This Book; Where to Get More Information; Using Code Examples; Safari® Books Online; How to Contact Us; Acknowledgments; Part I. Developing a Security Plan; Chapter 1. Defining the Application Environment; Specifying Web Application Threats; Understanding Software Security Assurance (SSA); Considering the OSSAP; Defining SSA Requirements; Categorizing Data and Resources; Performing the Required Analysis.
|
505 |
8 |
|
|a Delving into Language-Specific IssuesDefining the Key HTML Issues; Defining the Key CSS Issues; Defining the Key JavaScript Issues; Considering Endpoint Defense Essentials; Preventing Security Breaches; Detecting Security Breaches; Remediating Broken Software; Dealing with Cloud Storage; Using External Code and Resources; Defining the Use of Libraries; Defining the Use of APIs; Defining the Use of Microservices; Accessing External Data; Allowing Access by Others; Chapter 2. Embracing User Needs and Expectations; Developing a User View of the Application.
|
505 |
8 |
|
|a Considering Bring Your Own Device (BYOD) IssuesUnderstanding Web-Based Application Security; Considering Native App Issues; Using Custom Browsers; Verifying Code Compatibility Issues; Handling Nearly Continuous Device Updates; Devising Password Alternatives; Working with Passphrases; Using Biometric Solutions; Relying on Key Cards; Relying on USB Keys; Implementing a Token Strategy; Focusing on User Expectations; Making the Application Easy to Use; Making the Application Fast; Creating a Reliable Environment; Keeping Security in Perspective; Chapter 3. Getting Third-Party Assistance.
|
505 |
8 |
|
|a Discovering Third-Party Security SolutionsConsidering Cloud Security Solutions; Understanding Data Repositories; Dealing with File Sharing Issues; Considering Cloud Storage; Choosing Between Product Types; Working with Libraries; Accessing APIs; Considering Microservices; Part II. Applying Successful Coding Practices; Chapter 4. Developing Successful Interfaces; Assessing the User Interface; Creating a Clear Interface; Making Interfaces Flexible; Providing User Aids; Defining the Accessibility Issues; Providing Controlled Choices; Choosing a User Interface Solution Level.
|
505 |
8 |
|
|a Implementing Standard HTML ControlsWorking with CSS Controls; Creating Controls Using JavaScript; Validating the Input; Allowing Specific Input Only; Looking for Sneaky Inputs; Requesting New Input; Using Both Client-Side and Server-Side Validation; Expecting the Unexpected; Chapter 5. Building Reliable Code; Differentiating Reliability and Security; Defining the Roles of Reliability and Security; Avoiding Security Holes in Reliable Code; Focusing on Application Functionality; Developing Team Protocols; Creating a Lessons Learned Feedback Loop; Considering Issues of Packaged Solutions.
|
520 |
|
|
|a "As a web developer, you may not want to spend time making your web app secure, but it definitely comes with the territory. This practical guide provides you with the latest information on how to thwart security threats at several levels, including new areas such as microservices. You'll learn how to help protect your app no matter where it runs, from the latest smartphone to an older desktop, and everything in between. Author John Paul Mueller delivers specific advice as well as several security programming examples for developers with a good knowledge of CSS3, HTML5, and JavaScript. In five separate sections, this book shows you how to protect against viruses, DDoS attacks, security breaches, and other nasty intrusions: create a security plan for your organization that takes the latest devices and user needs into account; develop secure interfaces, and safely incorporate third-party code from libraries, APIs, and microservices; use sandboxing techniques, in-house and third-party testing techniques, and learn to think like a hacker; implement a maintenance cycle by determining when and how to update your application software; and learn techniques for efficiently tracking security threats as well as training requirements that your organization can use."--Publisher's description
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Application software
|x Security measures.
|
650 |
|
0 |
|a Web sites
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Logiciels d'application
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sites Web
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Web sites
|x Security measures
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Mueller, John, 1958-
|t Security for web developers.
|b First edition.
|d Sebastopol, CA : O'Reilly Media, 2015
|z 9781491928646
|z 1491928646
|w (OCoLC)908375600
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781491928684/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Coutts Information Services
|b COUT
|n 33152050
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL4333783
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1099368
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis33152050
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 12727129
|
994 |
|
|
|a 92
|b IZTAP
|