Cargando…

Secure your Node.js web application : keep attackers out and users happy /

Cyber-criminals have your web applications in their crosshairs. They search for and exploit common security mistakes in your web application to steal user data. Learn how you can secure your Node.js applications, database and web server to avoid these security holes. Discover the primary attack vect...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Düüna, Karl (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [Place of publication not identified] : Pragmatic Bookshelf, 2016.
Edición:Version: P1.0 (January 2016).
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ii 4500
001 OR_ocn941101200
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 160226s2016 xx a ob 000 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d KSU  |d DEBBG  |d DEBSZ  |d OCLCF  |d CEF  |d OCLCQ  |d UAB  |d RDF  |d DST  |d OCLCO  |d OCLCQ 
020 |a 1680500856 
020 |a 9781680500851 
020 |z 9781680500851 
029 1 |a DEBBG  |b BV043968959 
029 1 |a DEBSZ  |b 485794713 
029 1 |a GBVCP  |b 876244770 
035 |a (OCoLC)941101200 
037 |a CL0500000718  |b Safari Books Online 
050 4 |a QA76.73.J39 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Düüna, Karl,  |e author. 
245 1 0 |a Secure your Node.js web application :  |b keep attackers out and users happy /  |c Karl Düüna. 
250 |a Version: P1.0 (January 2016). 
264 1 |a [Place of publication not identified] :  |b Pragmatic Bookshelf,  |c 2016. 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Online resource; title from title page (Safari, viewed February 24, 2016). 
504 |a Includes bibliographical references. 
520 |a Cyber-criminals have your web applications in their crosshairs. They search for and exploit common security mistakes in your web application to steal user data. Learn how you can secure your Node.js applications, database and web server to avoid these security holes. Discover the primary attack vectors against web applications, and implement security best practices and effective countermeasures. Coding securely will make you a stronger web developer and analyst, and you'll protect your users. Bake security into your code from the start. See how to protect your Node.js applications at every point in the software development life cycle, from setting up the application environment to configuring the database and adding new functionality. You'll follow application security best practices and analyze common coding errors in applications as you work through the real-world scenarios in this book. Protect your database calls from database injection attacks and learn how to securely handle user authentication within your application. Configure your servers securely and build in proper access controls to protect both the web application and all the users using the service. Defend your application from denial of service attacks. Understand how malicious actors target coding flaws and lapses in programming logic to break in to web applications to steal information and disrupt operations. Work through examples illustrating security methods in Node.js. Learn defenses to protect user data flowing in and out of the application. By the end of the book, you'll understand the world of web application security, how to avoid building web applications that attackers consider an easy target, and how to increase your value as a programmer. What You Need: In this book we will be using mainly Node.js. The book covers the basics of JavaScript and Node.js. Since most Web applications have some kind of a database backend, examples in this book work with some of the more popular databases, including MySQL, MongoDB, and Redis. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
630 0 0 |a Node.js. 
630 0 7 |a Node.js.  |2 fast  |0 (OCoLC)fst01915815 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Web applications  |x Security measures. 
650 0 |a Application software  |x Security measures. 
650 0 |a Application software  |x Development. 
650 0 |a Web applications  |x Development. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Applications Web  |x Sécurité  |x Mesures. 
650 6 |a Logiciels d'application  |x Sécurité  |x Mesures. 
650 6 |a Logiciels d'application  |x Développement. 
650 6 |a Applications Web  |x Développement. 
650 7 |a Application software  |x Development.  |2 fast  |0 (OCoLC)fst00811707 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781680501780/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP