Campagne de collecte 15 septembre 2024 – 1 octobre 2024 C'est quoi, la collecte de fonds?

Grokking Web Application Security

Grokking Web Application Security

Malcolm McDonald
5.0 / 5.0
3 comments
Avez-vous aimé ce livre?
Quelle est la qualité du fichier téléchargé?
Veuillez télécharger le livre pour apprécier sa qualité
Quelle est la qualité des fichiers téléchargés?
When you launch an application on the web, every hacker in the world has access to it. Are you sure your web apps can stand up to the most sophisticated attacks?
 
Trying to teach yourself about web security from the internet can feel like walking into a huge disorganized library—one where you can never find what you need, and the wrong advice might endanger your application! You need a single, all-in-one guide to securing your apps against all the attacks they can and will face. You need Grokking Web Application Security.
 
This brilliantly illustrated and clearly written guide delivers detailed coverage on:
• Browser security, including sandboxing, the same-origin policy, and cookie security
• Securing web servers with input validation, escaping of output, and defense in depth
• A development process that prevents security bugs
• Browser vulnerabilities, from cross-site scripting and cross-site request forgery, to clickjacking
• Network vulnerabilities, such as man-in-the-middle attacks, SSL-stripping, and DNS poisoning
• Authentication vulnerabilities, such as brute forcing of credentials with single sign-on or multi-factor authentication
• Authorization vulnerabilities, such as broken access control and session jacking
• How to use encryption in web applications
• Injection attacks, command execution attacks, and remote code execution attacks
• Malicious payloads that can be used to attack XML parsers and file upload functions
 
Grokking Web Application Security teaches you how to build web apps that are ready and resilient to any attack. It’s laser-focused on what the working programmer needs to know about web security. In it, you’ll find practical recommendations for both common and not-so-common vulnerabilities—everything from SQL injection to cross-site scripting inclusion attacks. You’ll learn what motivates hackers, discover the latest tools for identifying issues, and set up a development lifecycle that catches problems early.
Catégories:
Année:
2024
Edition:
1
Editeur::
Manning Publications
Langue:
english
Pages:
336
ISBN 10:
1633438260
ISBN 13:
9781633438262
Fichier:
PDF, 44.41 MB
IPFS:
CID , CID Blake2b
english, 2024
Lire en ligne
La conversion en est effectuée
La conversion en a échoué

Mots Clefs