|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_on1349467700 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu|||unuuu |
008 |
221101s2022 nyua ob 001 0 eng d |
040 |
|
|
|a ORMDA
|b eng
|e rda
|e pn
|c ORMDA
|d GW5XE
|d YDX
|d EBLCP
|d OCLCF
|d UKAHL
|d OCLCQ
|d N$T
|d OCLCQ
|
019 |
|
|
|a 1349563450
|
020 |
|
|
|a 1484285964
|q electronic book
|
020 |
|
|
|a 9781484285961
|q (electronic bk.)
|
020 |
|
|
|z 9781484285954
|
020 |
|
|
|z 1484285956
|
024 |
7 |
|
|a 10.1007/978-1-4842-8596-1
|2 doi
|
029 |
1 |
|
|a AU@
|b 000072898648
|
035 |
|
|
|a (OCoLC)1349467700
|z (OCoLC)1349563450
|
037 |
|
|
|a 9781484285961
|b O'Reilly Media
|
050 |
|
4 |
|a TK5105.59
|b .B37 2022
|
072 |
|
7 |
|a UMW
|2 bicssc
|
072 |
|
7 |
|a COM060160
|2 bisacsh
|
072 |
|
7 |
|a UMW
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23/eng/20221101
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Baker, Matthew,
|e author.
|
245 |
1 |
0 |
|a Secure web application development :
|b a hands-on guide with Python and Django /
|c Matthew Baker.
|
250 |
|
|
|a [First edition].
|
264 |
|
1 |
|a New York, NY :
|b Apress,
|c [2022]
|
300 |
|
|
|a 1 online resource (471 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references and index.
|
520 |
|
|
|a Cyberattacks are becoming more commonplace and the Open Web Application Security Project (OWASP), estimates 94% of sites have flaws in their access control alone. Attacks evolve to work around new defenses, and defenses must evolve to remain effective. Developers need to understand the fundamentals of attacks and defenses in order to comprehend new techniques as they become available. This book teaches you how to write secure web applications. The focus is highlighting how hackers attack applications along with a broad arsenal of defenses. This will enable you to pick appropriate techniques to close vulnerabilities while still providing users with their needed functionality.
|
505 |
0 |
|
|a 1. Introduction -- 2. The Hands-On Environment -- 3. Threat Modelling -- 4. Transport and Encryption -- 5. Installing and Configuring Services -- 6. APIs and Endpoints -- 7. Cookies and User Input -- 8. Cross-Site Requests -- 9. Password Management.-10. Authentication and Authorization -- 11. OAuth2 -- 12. Logging and Monitoring -- 13. Third-Party and Supply Chain Security -- 14. Further Resources.
|
588 |
|
|
|a Description based on online resource; title from digital title page (viewed on November 10, 2022).
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
630 |
0 |
0 |
|a Django (Electronic resource)
|
630 |
0 |
7 |
|a Django (Electronic resource)
|2 fast
|0 (OCoLC)fst01780807
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Web applications
|x Development.
|
650 |
|
0 |
|a Python (Computer program language)
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Python (Computer program language)
|2 fast
|0 (OCoLC)fst01084736
|
655 |
|
0 |
|a Electronic books.
|
776 |
0 |
8 |
|i Print version:
|z 1484285956
|z 9781484285954
|w (OCoLC)1329421993
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781484285961/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH40987758
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL7127593
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 18199216
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 3435349
|
994 |
|
|
|a 92
|b IZTAP
|