Web Security for Developers : Real Threats, Practical Defense

個数:1
紙書籍版価格
¥6,087
  • 電子書籍

Web Security for Developers : Real Threats, Practical Defense

  • 著者名:McDonald, Malcolm
  • 価格 ¥4,450 (本体¥4,046)
  • No Starch Press(2020/06/30発売)
  • ポイント 40pt (実際に付与されるポイントはご注文内容確認画面でご確認下さい)
  • 言語:ENG
  • ISBN:9781593279943
  • eISBN:9781593279950

ファイル: /

Description

Website security made easy. This book covers the most common ways websites get hacked and how web developers can defend themselves.

The world has changed. Today, every time you make a site live, you're opening it up to attack.

A first-time developer can easily be discouraged by the difficulties involved with properly securing a website. But have hope: an army of security researchers is out there discovering, documenting, and fixing security flaws. Thankfully, the tools you'll need to secure your site are freely available and generally easy to use.

Web Security for Developers will teach you how your websites are vulnerable to attack and how to protect them. Each chapter breaks down a major security vulnerability and explores a real-world attack, coupled with plenty of code to show you both the vulnerability and the fix.

You'll learn how to:

  • Protect against SQL injection attacks, malicious JavaScript, and cross-site request forgery
  • Add authentication and shape access control to protect accounts
  • Lock down user accounts to prevent attacks that rely on guessing passwords, stealing sessions,
  • or escalating privileges
  • Implement encryption
  • Manage vulnerabilities in legacy code
  • Prevent information leaks that disclose vulnerabilities
  • Mitigate advanced attacks like malvertising and denial-of-service

  • As you get stronger at identifying and fixing vulnerabilities, you'll learn to deploy disciplined, secure code and become a better programmer along the way.

    Table of Contents

    Chapter 1: Let’s Hack a Website
    Chapter 2: How the Internet Works
    Chapter 3: How Browsers Work
    Chapter 4: How Web Servers Work
    Chapter 5: How Programmers Work
    Chapter 6: Injection Attacks
    Chapter 7: Cross-Site Scripting Attacks
    Chapter 8: Cross-Site Request Forgery Attacks
    Chapter 9: Comprising Authentication
    Chapter 10: Session Hijacking
    Chapter 11: Permissions
    Chapter 12: Information Leaks
    Chapter 13: Encryption
    Chapter 14: Third-Party Code
    Chapter 15: XML Attacks
    Chapter 16: Don’t Be an Accessory
    Chapter 17: Denial-of-Service Attacks

    最近チェックした商品