Iron-Clad Java
Autor Jim Manico, August Detlefsenen Limba Engleză Paperback – 16 oct 2014
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
Proven Methods for Building Secure Java-Based Web Applications
Develop, deploy, and maintain secure Java applications using the expert techniques and open source libraries described in this Oracle Press guide. Iron-Clad Java presents the processes required to build robust and secure applications from the start and explains how to eliminate existing security bugs. Best practices for authentication, access control, data protection, attack prevention, error handling, and much more are included. Using the practical advice and real-world examples provided in this authoritative resource, you'll gain valuable secure software engineering skills.- Establish secure authentication and session management processes
- Implement a robust access control design for multi-tenant web applications
- Defend against cross-site scripting, cross-site request forgery, and clickjacking
- Protect sensitive data while it is stored or in transit
- Prevent SQL injection and other injection attacks
- Ensure safe file I/O and upload
- Use effective logging, error handling, and intrusion detection methods
- Follow a comprehensive secure software development lifecycle
Preț: 227.09 lei
Preț vechi: 316.28 lei
-28% Nou
Puncte Express: 341
Preț estimativ în valută:
43.46€ • 45.72$ • 35.98£
43.46€ • 45.72$ • 35.98£
Carte tipărită la comandă
Livrare economică 16-22 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780071835886
ISBN-10: 0071835881
Pagini: 304
Dimensiuni: 188 x 231 x 18 mm
Greutate: 0.52 kg
Editura: McGraw Hill Education
Colecția McGraw-Hill
Locul publicării:United States
ISBN-10: 0071835881
Pagini: 304
Dimensiuni: 188 x 231 x 18 mm
Greutate: 0.52 kg
Editura: McGraw Hill Education
Colecția McGraw-Hill
Locul publicării:United States
Cuprins
Chapter 1: Web Application Security Basics
Chapter 2. Authentication and Session Management
Chapter 3: Access Control
Chapter 4: Cross-Site Scripting Defense
Chapter 5: Cross-Site Request Forgery Defense and Clickjacking
Chapter 6: Protecting Sensitive Data
Chapter 7: SQL Injection and Other Injection Attacks
Chapter 8: Safe File Upload and File I/O
Chapter 9: Logging, Error Handling, and Intrusion Detection
Chapter 10: Secure Software Development Lifecycle
Appendix: Resources
Chapter 2. Authentication and Session Management
Chapter 3: Access Control
Chapter 4: Cross-Site Scripting Defense
Chapter 5: Cross-Site Request Forgery Defense and Clickjacking
Chapter 6: Protecting Sensitive Data
Chapter 7: SQL Injection and Other Injection Attacks
Chapter 8: Safe File Upload and File I/O
Chapter 9: Logging, Error Handling, and Intrusion Detection
Chapter 10: Secure Software Development Lifecycle
Appendix: Resources