|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_on1107052684 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
190702s2019 cau ob 000 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d OCLCF
|d CZL
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|
020 |
|
|
|z 9781492052784
|
035 |
|
|
|a (OCoLC)1107052684
|
037 |
|
|
|a CL0501000057
|b Safari Books Online
|
050 |
|
4 |
|a TK5105.59
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Sloper, Gary,
|e author.
|
245 |
1 |
0 |
|a Protecting your web applications :
|b solutions and strategies to combat cybersecurity threats /
|c Gary Sloper and Ken Hess.
|
250 |
|
|
|a First edition.
|
264 |
|
1 |
|a Sebastopol, CA :
|b O'Reilly Media,
|c [2019]
|
264 |
|
4 |
|c ©2019
|
300 |
|
|
|a 1 online resource (1 volume)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Online resource; title from title page (Safari, viewed July 1, 2019).
|
504 |
|
|
|a Includes bibliographical references.
|
520 |
|
|
|a Websites, applications, and online services are critical business assets, but these services are also among the most vulnerable to attack. When cyberthreats succeed, your company can quickly drop customers, lose revenue, and suffer brand damage. This practical ebook explores today's major threat patterns and provides security professionals with strategies and techniques for preventing and protecting against a host of attacks. Gary Sloper, a vice president at Oracle Dyn, and industry journalist Ken Hess examine current dangers to cloud-based everything-as-a-service (XaaS) offerings--a threat landscape as big and diverse as the internet itself. You'll learn how attackers have become successful and explore current remedies to counteract their efforts. This ebook also looks at the future of web application protection according to industry experts. Get an overview of today's top cyberthreats and their impact on businesses Protect web applications from evolving threats using an integrated approach Use industry guidelines to help prevent injection, XSS, and session hijacking attacks Learn why companies are moving threat protection to third-party entities and the cloud Build layered security with firewalls, multifactor authentication, AI, secure programming, and data analytics.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a World Wide Web
|x Security measures.
|
650 |
|
0 |
|a Web sites
|x Security measures.
|
650 |
|
0 |
|a Computer crimes.
|
650 |
|
0 |
|a Web applications.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Web
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sites Web
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Criminalité informatique.
|
650 |
|
6 |
|a Applications Web.
|
650 |
|
7 |
|a Computer crimes
|2 fast
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Web applications
|2 fast
|
650 |
|
7 |
|a Web sites
|x Security measures
|2 fast
|
650 |
|
7 |
|a World Wide Web
|x Security measures
|2 fast
|
700 |
1 |
|
|a Hess, Ken,
|e author.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781492052791/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|