Cargando…

Safety of web applications : risks, encryption and handling vulnerabilities with PHP /

Safety of Web Applications: Risks, Encryption and Handling Vulnerabilities with PHP explores many areas that can help computer science students and developers integrate security into their applications. The Internet is not secure, but it's very friendly as a tool for storing and manipulating da...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Quinton, �Eric (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: London : Oxford : ISTE Press ; Elsevier, 2017.
Colección:Computer engineering series (London, England)
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Ii 4500
001 SCIDIR_ocn982377517
003 OCoLC
005 20231120112225.0
006 m o d
007 cr cnu|||unuuu
008 170414s2017 enka ob 001 0 eng d
010 |a  2017275380 
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d N$T  |d IDEBK  |d EBLCP  |d OCLCF  |d OPELS  |d YDX  |d COO  |d VGM  |d OTZ  |d MERER  |d OCLCQ  |d D6H  |d U3W  |d AU@  |d OCLCQ  |d LVT  |d OCLCQ  |d S2H  |d OCLCO  |d VT2  |d OCLCO  |d OCLCQ  |d SFB  |d INARC  |d OCLCQ  |d OCLCO 
019 |a 1235825941  |a 1392127826 
020 |a 9780081023624  |q (electronic bk.) 
020 |a 0081023626  |q (electronic bk.) 
020 |z 9781785482281 
020 |a 1785482289  |q hardcover 
020 |a 9781785482281 
035 |a (OCoLC)982377517  |z (OCoLC)1235825941  |z (OCoLC)1392127826 
050 4 |a TK5105.59 
072 7 |a COM  |x 043050  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
100 1 |a Quinton, �Eric,  |e author. 
245 1 0 |a Safety of web applications :  |b risks, encryption and handling vulnerabilities with PHP /  |c �Eric Quinton. 
264 1 |a London :  |b ISTE Press ;  |a Oxford :  |b Elsevier,  |c 2017. 
300 |a 1 online resource :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Computer engineering 
504 |a Includes bibliographical references and index. 
588 0 |a Online resource; title from PDF title page (EBSCO, viewed April 18, 2017). 
520 |a Safety of Web Applications: Risks, Encryption and Handling Vulnerabilities with PHP explores many areas that can help computer science students and developers integrate security into their applications. The Internet is not secure, but it's very friendly as a tool for storing and manipulating data. Customer confidence in Internet software is based on it's ability to prevent damage and attacks, but secure software is complicated, depending on several factors, including good risk estimation, good code architecture, cyphering, web server configuration, coding to prevent the most common attacks, and identification and rights allocation. 
505 0 |a Front Cover -- Safety of Web Applications: Risks, Encryption and Handling Vulnerabilities with PHP -- Copyright -- Contents -- Preface -- 1. Why Do Web Applications Need to be Secure? -- 1.1. What is a web application? -- 1.2. What is computer security? -- 1.3. Examples of damage caused by security failures -- 2. Estimating Risk -- 2.1. What is risk? -- 2.2. How can we protect ourselves from risk? -- 2.3. Determining the target -- 2.4. Determining the impact -- 2.5. Which causes or scenarios should be considered? -- 2.6. How should this study be performed in a company setting? -- 3. Encryption and Web Server Configuration -- 3.1. Examples of different web servers -- 3.2. Introduction to concepts in encryption -- 3.3. Generating and managing encryption certificates -- 3.4. Implementing the HTTPS protocol -- 3.5. Improving the security of the Apache server -- 3.6. In summary -- 4. Threats and Protecting Against Them -- 4.1. The threats associated with web-based environments -- 4.2. The top 10 most frequent attacks in 2013 -- 4.3. Other countermeasures -- 4.4. Implementing a resource controller -- 5. Managing User Logins and Assigning Permissions -- 5.1. Managing user logins -- 5.2. Managing permissions -- 5.3. In summary -- 6. Using the MVC Model to Structure the Application -- 6.1. Why does the application structure matter? -- 6.2. What is the MVC model? -- 6.3. Conclusion -- 7. Implementing a Suitable Technical Platform and Testing the Application -- 7.1. Designing a suitable technical architecture -- 7.2. Testing the security of the application -- 7.3. What options do we have if implementing security measures for an application seems an impossible task? -- Bibliography -- Index -- Back Cover. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Web sites  |x Security measures. 
650 0 |a PHP (Computer program language) 
650 6 |a R�eseaux d'ordinateurs  |x S�ecurit�e  |x Mesures.  |0 (CaQQLa)201-0263812 
650 6 |a Sites Web  |0 (CaQQLa)201-0288387  |x S�ecurit�e  |0 (CaQQLa)201-0373949  |x Mesures.  |0 (CaQQLa)201-0373949 
650 6 |a PHP (Langage de programmation)  |0 (CaQQLa)201-0327135 
650 7 |a COMPUTERS  |x Security  |x Networking.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a PHP (Computer program language)  |2 fast  |0 (OCoLC)fst01049847 
650 7 |a Web sites  |x Security measures  |2 fast  |0 (OCoLC)fst01173267 
830 0 |a Computer engineering series (London, England) 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9781785482281  |z Texto completo