Cargando…

Securing web applications : building a strategy for defense against malicious bots /

Most enterprise applications today live on the network edge, right where attackers are focusing increasing attention and activities to gain access to your data. This practical report helps analyze your company's vulnerabilities to common web application security threats, such as malicious bots,...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Gates, Stephen (Autor), Liska, Allan (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Sebastopol, CA : O'Reilly Media, 2018.
Edición:First edition.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_on1096331823
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 190411s2018 cau o 000 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d OCLCF  |d CZL  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
020 |z 9781492040262 
029 1 |a AU@  |b 000069004280 
035 |a (OCoLC)1096331823 
037 |a CL0501000040  |b Safari Books Online 
050 4 |a TK5105.875.I6 
049 |a UAMI 
100 1 |a Gates, Stephen,  |e author. 
245 1 0 |a Securing web applications :  |b building a strategy for defense against malicious bots /  |c Stephen Gates and Allan Liska. 
246 3 0 |a Building a strategy for defense against malicious bots 
250 |a First edition. 
264 1 |a Sebastopol, CA :  |b O'Reilly Media,  |c 2018. 
300 |a 1 online resource (1 volume) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Online resource; title from title page (Safari, viewed April 10, 2019). 
520 |a Most enterprise applications today live on the network edge, right where attackers are focusing increasing attention and activities to gain access to your data. This practical report helps analyze your company's vulnerabilities to common web application security threats, such as malicious bots, application exploits, API attacks, DDoS attacks, and server-based malware. You'll learn proactive steps to implement services and strategies designed to protect online enterprise applications at the user edge. Authors Stephen Gates, edge security evangelist and SME at Oracle Dyn, and Allan Liska, threat intelligence architect at Recorded Future, explore how advanced DNS services, web application firewall (WAF) services, bot management, API security, DDoS defenses, and malware protection solutions combine to protect your sites and applications from malicious attacks and bad actors. Understand the current web application threats landscape Prioritize availability, confidentiality, and integrity and manage associated security risks Explore the role of DNS in maintaining availability Learn how to approach cloud-based web application security Plan your strategy with a web application security checklist. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Web applications  |x Security measures. 
650 0 |a Data protection. 
650 0 |a Malware (Computer software) 
650 6 |a Applications Web  |x Sécurité  |x Mesures. 
650 6 |a Protection de l'information (Informatique) 
650 6 |a Logiciels malveillants. 
650 7 |a Data protection  |2 fast 
650 7 |a Malware (Computer software)  |2 fast 
700 1 |a Liska, Allan,  |e author. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781492040279/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP