|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_on1041857966 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
180625s2018 caua o 000 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d MERER
|d OCLCF
|d TOH
|d OCLCQ
|d STF
|d DEBBG
|d CEF
|d CNCEN
|d G3B
|d S9I
|d UAB
|d CZL
|d OCLCQ
|d OCLCO
|d OCLCQ
|
020 |
|
|
|a 1491999977
|
020 |
|
|
|a 9781491999974
|
020 |
|
|
|z 9781491999974
|
035 |
|
|
|a (OCoLC)1041857966
|
037 |
|
|
|a CL0500000974
|b Safari Books Online
|
050 |
|
4 |
|a QA76.73.J39
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Karande, Chetan,
|e author.
|
245 |
1 |
0 |
|a Patterns in Node package vulnerabilities :
|b essential findings for busy developers /
|c Chetan Karande.
|
250 |
|
|
|a First edition.
|
264 |
|
1 |
|a Sebastopol, CA :
|b O'Reilly Media,
|c [2018]
|
264 |
|
4 |
|c ©2018
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a data file
|
588 |
0 |
|
|a Online resource; title from title page (Safari, viewed June 22, 2018).
|
520 |
|
|
|a With more than 500 new Node.js packages arriving each day, npm is the world's largest reusable package registry and the Node ecosystem's greatest strength. But as the number of detected vulnerabilities continues to rise significantly, the packages themselves are becoming a liability. This ebook shows application developers and penetration testers practical strategies for evaluating and working with today's npm packages. Author Chetan Karande (Securing Node Applications) analyzes package vulnerabilities found by security researchers and the Node community, including common coding mistakes behind the most severe and frequently found problems. While the database is by no means comprehensive due to the flood of new packages, these known vulnerabilities still provide a valuable guide to help you conduct a manual code review of npm packages. You'll examine the top Node package vulnerabilities, including: Insecure access to the filesystem that leads to directory traversal and symlink attacks Pitfalls that often cause Node developers to inadvertently expose sensitive data Denial-of-service attacks that can prevent legitimate users from accessing your service Cross-site scripting (XSS), a prevalent web application security flaw and frequently occurring vulnerability in Node packages Injection vulnerabilities that enable attackers to obtain, corrupt, or destroy server contents.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
630 |
0 |
0 |
|a Node.js.
|
630 |
0 |
7 |
|a Node.js.
|2 fast
|0 (OCoLC)fst01915815
|
650 |
|
0 |
|a Web applications.
|
650 |
|
0 |
|a Application software
|x Development.
|
650 |
|
0 |
|a JavaScript (Computer program language)
|
650 |
|
6 |
|a Applications Web.
|
650 |
|
6 |
|a Logiciels d'application
|x Développement.
|
650 |
|
6 |
|a JavaScript (Langage de programmation)
|
650 |
|
7 |
|a Application software
|x Development.
|2 fast
|0 (OCoLC)fst00811707
|
650 |
|
7 |
|a JavaScript (Computer program language)
|2 fast
|0 (OCoLC)fst00982071
|
650 |
|
7 |
|a Web applications.
|2 fast
|0 (OCoLC)fst01895855
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781491999981/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|