|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_on1096331823 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
190411s2018 cau o 000 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d OCLCF
|d CZL
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|
020 |
|
|
|z 9781492040262
|
029 |
1 |
|
|a AU@
|b 000069004280
|
035 |
|
|
|a (OCoLC)1096331823
|
037 |
|
|
|a CL0501000040
|b Safari Books Online
|
050 |
|
4 |
|a TK5105.875.I6
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Gates, Stephen,
|e author.
|
245 |
1 |
0 |
|a Securing web applications :
|b building a strategy for defense against malicious bots /
|c Stephen Gates and Allan Liska.
|
246 |
3 |
0 |
|a Building a strategy for defense against malicious bots
|
250 |
|
|
|a First edition.
|
264 |
|
1 |
|a Sebastopol, CA :
|b O'Reilly Media,
|c 2018.
|
300 |
|
|
|a 1 online resource (1 volume)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Online resource; title from title page (Safari, viewed April 10, 2019).
|
520 |
|
|
|a Most enterprise applications today live on the network edge, right where attackers are focusing increasing attention and activities to gain access to your data. This practical report helps analyze your company's vulnerabilities to common web application security threats, such as malicious bots, application exploits, API attacks, DDoS attacks, and server-based malware. You'll learn proactive steps to implement services and strategies designed to protect online enterprise applications at the user edge. Authors Stephen Gates, edge security evangelist and SME at Oracle Dyn, and Allan Liska, threat intelligence architect at Recorded Future, explore how advanced DNS services, web application firewall (WAF) services, bot management, API security, DDoS defenses, and malware protection solutions combine to protect your sites and applications from malicious attacks and bad actors. Understand the current web application threats landscape Prioritize availability, confidentiality, and integrity and manage associated security risks Explore the role of DNS in maintaining availability Learn how to approach cloud-based web application security Plan your strategy with a web application security checklist.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Web applications
|x Security measures.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Malware (Computer software)
|
650 |
|
6 |
|a Applications Web
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|
650 |
|
6 |
|a Logiciels malveillants.
|
650 |
|
7 |
|a Data protection
|2 fast
|
650 |
|
7 |
|a Malware (Computer software)
|2 fast
|
700 |
1 |
|
|a Liska, Allan,
|e author.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781492040279/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|