|
|
|
|
LEADER |
00000cam a2200000Ii 4500 |
001 |
OR_on1040037745 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
180613s2017 caua ob 000 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d STF
|d TOH
|d OCLCF
|d MERER
|d OCLCQ
|d DEBBG
|d CEF
|d CNCEN
|d G3B
|d UAB
|d CZL
|d OCLCO
|d OCLCQ
|
020 |
|
|
|z 9781491958384
|
035 |
|
|
|a (OCoLC)1040037745
|
037 |
|
|
|a CL0500000971
|b Safari Books Online
|
050 |
|
4 |
|a TK5105.875.I6
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Scott, Adam D.,
|e author.
|
245 |
1 |
0 |
|a Building web apps that respect a user's privacy and security /
|c Adam D. Scott.
|
246 |
3 |
|
|a Building web applications that respect a user's privacy and security
|
250 |
|
|
|a First edition.
|
264 |
|
1 |
|a Sebastopol, CA :
|b O'Reilly Media,
|c [2017]
|
264 |
|
4 |
|c ©2017
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
|
|
|a Description based on online resource; title from title page (Safari, viewed June 12, 2018).
|
504 |
|
|
|a Includes bibliographical references.
|
520 |
|
|
|a A recent survey from the Pew Research Center found that few Americans are confident about the security or privacy of their data--particularly when it comes to the use of online tools. As a web developer, you represent the first line of defense in protecting your user's data and privacy. This report explores several techniques, tools, and best practices for developing and maintaining web apps that provide the privacy and security that every user needs--and deserves. Each individual now produces more data every day than people in earlier generations did throughout their lifetimes. Every time we click, tweet, or visit a site, we leave a digital trace. As web developers, we're responsible for shaping the experiences of users' online lives. By making ethical, user-centered choices, we can create a better Web for everyone. Learn how web tracking works, and how you can provide users with greater privacy controls Explore HTTPS and learn how to use this protocol to encrypt user connections Use web development frameworks that provide baked-in security support for protecting user data Learn methods for securing user authentication, and for sanitizing and validating user input Provide exports that allow users to reclaim their data if and when you close your service This is the third report in the Ethical Web Development series from author Adam Scott. Previous reports in this series include Building Web Apps for Everyone and Building Web Apps That Work Everywhere .
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Web applications.
|
650 |
|
0 |
|a Application software
|x Development.
|
650 |
|
0 |
|a Web sites
|x Access control.
|
650 |
|
0 |
|a Privacy, Right of.
|
650 |
|
6 |
|a Applications Web.
|
650 |
|
6 |
|a Logiciels d'application
|x Développement.
|
650 |
|
6 |
|a Sites Web
|x Accès
|x Contrôle.
|
650 |
|
7 |
|a Application software
|x Development.
|2 fast
|0 (OCoLC)fst00811707
|
650 |
|
7 |
|a Privacy, Right of.
|2 fast
|0 (OCoLC)fst01077444
|
650 |
|
7 |
|a Web applications.
|2 fast
|0 (OCoLC)fst01895855
|
650 |
|
7 |
|a Web sites
|x Access control.
|2 fast
|0 (OCoLC)fst01766542
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781492042921/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|