Cargando…

Secure Programming with Java /

Secure design is essential to building and deploying secure Java programs. But, even the best of designs can result in insecure programs if developers are not aware of the numerous potential security pitfalls in Java programming. This course begins with a detailed explanation of common programming e...

Descripción completa

Detalles Bibliográficos
Autor principal: Poston, Howard (Autor, VerfasserIn.)
Autor Corporativo: Safari, an O'Reilly Media Company (Contribuidor, MitwirkendeR.)
Formato: Video
Idioma:Inglés
Publicado: [Erscheinungsort nicht ermittelbar] : EC-Council, 2020
Edición:1st edition.
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cgm a22000007i 4500
001 OR_on1268119488
003 OCoLC
005 20231017213018.0
006 m o c
007 cr uuu---uuuuu
007 vz czazuu
008 210914s2020 mau--- o vleng d
040 |a GBVCP  |b ger  |e rda  |c GBVCP  |d OCLCQ 
035 |a (OCoLC)1268119488 
049 |a UAMI 
100 1 |a Poston, Howard,  |e VerfasserIn.  |4 aut 
245 1 0 |a Secure Programming with Java /  |c Poston, Howard. 
250 |a 1st edition. 
264 1 |a [Erscheinungsort nicht ermittelbar] :  |b EC-Council,  |c 2020 
264 2 |a Boston, MA :  |b Safari 
300 |a 1 online resource (1 video file, circa 5 hr., 57 min.) 
336 |a zweidimensionales bewegtes Bild  |b tdi  |2 rdacontent/ger 
337 |a Computermedien  |b c  |2 rdamedia/ger 
338 |a Online-Ressource  |b cr  |2 rdacarrier/ger 
500 |a Online resource; Title from title screen (viewed December 30, 2020). 
520 |a Secure design is essential to building and deploying secure Java programs. But, even the best of designs can result in insecure programs if developers are not aware of the numerous potential security pitfalls in Java programming. This course begins with a detailed explanation of common programming errors encountered in Java. Further, it takes you through security issues intrinsic to Java programming languages and associated libraries. Later, you will gather insights on poor programming practices that lead to vulnerable code and how to code securely and maintain secure development practices throughout the software development life cycle. In this course, you will gain knowledge on input validation defences that can be used to protect against common application vulnerabilities, as well as learn to conduct application security testing for web applications to assess vulnerabilities. In addition, you will learn how to secure Java applications by using the Spring Security framework, a powerful and highly customizable authentication and access-control framework. By the end of this course, you will be able to drive the development of a holistic application security program in Java. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
710 2 |a Safari, an O'Reilly Media Company.,  |e MitwirkendeR.  |4 ctb 
856 4 0 |u https://learning.oreilly.com/videos/~/200220BCRV/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
936 |a BATCHLOAD 
994 |a 92  |b IZTAP