|
|
|
|
LEADER |
00000cam a2200000Ii 4500 |
001 |
OR_ocn941101200 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
160226s2016 xx a ob 000 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d KSU
|d DEBBG
|d DEBSZ
|d OCLCF
|d CEF
|d OCLCQ
|d UAB
|d RDF
|d DST
|d OCLCO
|d OCLCQ
|
020 |
|
|
|a 1680500856
|
020 |
|
|
|a 9781680500851
|
020 |
|
|
|z 9781680500851
|
029 |
1 |
|
|a DEBBG
|b BV043968959
|
029 |
1 |
|
|a DEBSZ
|b 485794713
|
029 |
1 |
|
|a GBVCP
|b 876244770
|
035 |
|
|
|a (OCoLC)941101200
|
037 |
|
|
|a CL0500000718
|b Safari Books Online
|
050 |
|
4 |
|a QA76.73.J39
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Düüna, Karl,
|e author.
|
245 |
1 |
0 |
|a Secure your Node.js web application :
|b keep attackers out and users happy /
|c Karl Düüna.
|
250 |
|
|
|a Version: P1.0 (January 2016).
|
264 |
|
1 |
|a [Place of publication not identified] :
|b Pragmatic Bookshelf,
|c 2016.
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Online resource; title from title page (Safari, viewed February 24, 2016).
|
504 |
|
|
|a Includes bibliographical references.
|
520 |
|
|
|a Cyber-criminals have your web applications in their crosshairs. They search for and exploit common security mistakes in your web application to steal user data. Learn how you can secure your Node.js applications, database and web server to avoid these security holes. Discover the primary attack vectors against web applications, and implement security best practices and effective countermeasures. Coding securely will make you a stronger web developer and analyst, and you'll protect your users. Bake security into your code from the start. See how to protect your Node.js applications at every point in the software development life cycle, from setting up the application environment to configuring the database and adding new functionality. You'll follow application security best practices and analyze common coding errors in applications as you work through the real-world scenarios in this book. Protect your database calls from database injection attacks and learn how to securely handle user authentication within your application. Configure your servers securely and build in proper access controls to protect both the web application and all the users using the service. Defend your application from denial of service attacks. Understand how malicious actors target coding flaws and lapses in programming logic to break in to web applications to steal information and disrupt operations. Work through examples illustrating security methods in Node.js. Learn defenses to protect user data flowing in and out of the application. By the end of the book, you'll understand the world of web application security, how to avoid building web applications that attackers consider an easy target, and how to increase your value as a programmer. What You Need: In this book we will be using mainly Node.js. The book covers the basics of JavaScript and Node.js. Since most Web applications have some kind of a database backend, examples in this book work with some of the more popular databases, including MySQL, MongoDB, and Redis.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
630 |
0 |
0 |
|a Node.js.
|
630 |
0 |
7 |
|a Node.js.
|2 fast
|0 (OCoLC)fst01915815
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Web applications
|x Security measures.
|
650 |
|
0 |
|a Application software
|x Security measures.
|
650 |
|
0 |
|a Application software
|x Development.
|
650 |
|
0 |
|a Web applications
|x Development.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Applications Web
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Logiciels d'application
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Logiciels d'application
|x Développement.
|
650 |
|
6 |
|a Applications Web
|x Développement.
|
650 |
|
7 |
|a Application software
|x Development.
|2 fast
|0 (OCoLC)fst00811707
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781680501780/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|