- Häftad (Paperback / softback)
- Antal sidor
- No Starch Press,US
- 234 x 178 x 15 mm
- Antal komponenter
- 431 g
Du kanske gillar
The Culture Map
Web Security For Developers
Real Threats, Practical Defense289
Finns även som
- Skickas inom 5-8 vardagar.
- Gratis frakt inom Sverige över 159 kr för privatpersoner.
Every website today is vulnerable to attack and a compromised website can ruin a company's reputation. Web Security Basics for Developers covers everything a web developer needs to know about web security. Readers will learn who attackers are and what they have at their disposal, how the Internet and websites operate, and various ways websites get attacked. Author Malcolm McDonald explores common attacks like SQL injection and cross-site scripting, as well as common vulnerabilities like information leakage, offering real-world examples and code samples.
Laddas ned direkt289
KundrecensionerHar du läst boken? Sätt ditt betyg »
Fler böcker av Malcolm McDonald
Recensioner i media
"Reads easily and provides essential knowledge to aspiring web developers." -Help Net Security "You can frame the usefulness of this book several ways: It's well suited to those who are transitioning from development to security. It's also another great security beginner-level read, providing introductions to an array of pen testing tools that will help you do your job better. And finally, it's a terrific resource for developers looking to build more secure applications." -Britt Kemp, Bishop Fox Labs
Malcolm McDonald has been writing code for nearly 20 years. Realizing there was a lack of direct, practical learning material on the internet on web security, he created www.hacksplaining.com, an online security training program for web developers.
Chapter 1: Let's Hack a Website Chapter 2: How the Internet Works Chapter 3: How Browsers Work Chapter 4: How Web Servers Work Chapter 5: How Programmers Work Chapter 6: Injection Attacks Chapter 7: Cross-Site Scripting Attacks Chapter 8: Cross-Site Request Forgery Attacks Chapter 9: Comprising Authentication Chapter 10: Session Hijacking Chapter 11: Permissions Chapter 12: Information Leaks Chapter 13: Encryption Chapter 14: Third-Party Code Chapter 15: XML Attacks Chapter 16: Don't Be an Accessory Chapter 17: Denial-of-Service Attacks