|
|
|
|
LEADER |
00000cgm a22000007i 4500 |
001 |
OR_on1268119488 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o c |
007 |
cr uuu---uuuuu |
007 |
vz czazuu |
008 |
210914s2020 mau--- o vleng d |
040 |
|
|
|a GBVCP
|b ger
|e rda
|c GBVCP
|d OCLCQ
|
035 |
|
|
|a (OCoLC)1268119488
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Poston, Howard,
|e VerfasserIn.
|4 aut
|
245 |
1 |
0 |
|a Secure Programming with Java /
|c Poston, Howard.
|
250 |
|
|
|a 1st edition.
|
264 |
|
1 |
|a [Erscheinungsort nicht ermittelbar] :
|b EC-Council,
|c 2020
|
264 |
|
2 |
|a Boston, MA :
|b Safari
|
300 |
|
|
|a 1 online resource (1 video file, circa 5 hr., 57 min.)
|
336 |
|
|
|a zweidimensionales bewegtes Bild
|b tdi
|2 rdacontent/ger
|
337 |
|
|
|a Computermedien
|b c
|2 rdamedia/ger
|
338 |
|
|
|a Online-Ressource
|b cr
|2 rdacarrier/ger
|
500 |
|
|
|a Online resource; Title from title screen (viewed December 30, 2020).
|
520 |
|
|
|a Secure design is essential to building and deploying secure Java programs. But, even the best of designs can result in insecure programs if developers are not aware of the numerous potential security pitfalls in Java programming. This course begins with a detailed explanation of common programming errors encountered in Java. Further, it takes you through security issues intrinsic to Java programming languages and associated libraries. Later, you will gather insights on poor programming practices that lead to vulnerable code and how to code securely and maintain secure development practices throughout the software development life cycle. In this course, you will gain knowledge on input validation defences that can be used to protect against common application vulnerabilities, as well as learn to conduct application security testing for web applications to assess vulnerabilities. In addition, you will learn how to secure Java applications by using the Spring Security framework, a powerful and highly customizable authentication and access-control framework. By the end of this course, you will be able to drive the development of a holistic application security program in Java.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
710 |
2 |
|
|a Safari, an O'Reilly Media Company.,
|e MitwirkendeR.
|4 ctb
|
856 |
4 |
0 |
|u https://learning.oreilly.com/videos/~/200220BCRV/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
936 |
|
|
|a BATCHLOAD
|
994 |
|
|
|a 92
|b IZTAP
|