Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
PHP security, just like PHP itself, has advanced. Updated for PHP 5.3, the second edition of this authoritative PHP security book covers foundational PHP security topics like SQL injection, XSS, user authentication, and secure PHP development. Chris Snyder and Tom Myer also delve into recent developments like mobile security, the impact of JavaScript, and the advantages of recent PHP hardening efforts.
Pro PHP Security, Second Edition will serve as your complete guide for taking defensive and proactive security measures within your PHP applications. Beginners in secure programming…mehr
PHP security, just like PHP itself, has advanced. Updated for PHP 5.3, the second edition of this authoritative PHP security book covers foundational PHP security topics like SQL injection, XSS, user authentication, and secure PHP development. Chris Snyder and Tom Myer also delve into recent developments like mobile security, the impact of JavaScript, and the advantages of recent PHP hardening efforts.
Pro PHP Security, Second Edition will serve as your complete guide for taking defensive and proactive security measures within your PHP applications. Beginners in secure programming will find a lot of material on secure PHP development, the basics of encryption, secure protocols, as well as how to reconcile the demands of server-side and web application security.
Chris Snyder is a software engineer at the Fund for the City of New York, where he helps develop next-generation websites and services for nonprofit organizations. He is a member of the executive board of New York PHP, and has been looking for new ways to build scriptable, linked, multimedia content since he saw his first Hypercard stack in 1988.
Inhaltsangabe
The Importance of Security.- Why Is Secure Programming a Concern?.- Practicing Secure PHP Programming.- Validating and Sanitizing User Input.- Preventing SQL Injection.- Preventing Cross-Site Scripting.- Preventing Remote Execution.- Enforcing Security for Temporary Files.- Preventing Session Hijacking.- Securing REST Services.- Practicing Secure Operations.- Using CAPTCHAs.- User Authentication, Authorization, and Logging.- Preventing Data Loss.- Safe Execution of System and Remote Procedure Calls.- Creating a Safe Environment.- Securing Unix.- Securing Your Database.- Using Encryption.- Securing Network Connections: SSL and SSH.- Final Recommendations.
The Importance of Security.- Why Is Secure Programming a Concern?.- Practicing Secure PHP Programming.- Validating and Sanitizing User Input.- Preventing SQL Injection.- Preventing Cross-Site Scripting.- Preventing Remote Execution.- Enforcing Security for Temporary Files.- Preventing Session Hijacking.- Securing REST Services.- Practicing Secure Operations.- Using CAPTCHAs.- User Authentication, Authorization, and Logging.- Preventing Data Loss.- Safe Execution of System and Remote Procedure Calls.- Creating a Safe Environment.- Securing Unix.- Securing Your Database.- Using Encryption.- Securing Network Connections: SSL and SSH.- Final Recommendations.
The Importance of Security.- Why Is Secure Programming a Concern?.- Practicing Secure PHP Programming.- Validating and Sanitizing User Input.- Preventing SQL Injection.- Preventing Cross-Site Scripting.- Preventing Remote Execution.- Enforcing Security for Temporary Files.- Preventing Session Hijacking.- Securing REST Services.- Practicing Secure Operations.- Using CAPTCHAs.- User Authentication, Authorization, and Logging.- Preventing Data Loss.- Safe Execution of System and Remote Procedure Calls.- Creating a Safe Environment.- Securing Unix.- Securing Your Database.- Using Encryption.- Securing Network Connections: SSL and SSH.- Final Recommendations.
The Importance of Security.- Why Is Secure Programming a Concern?.- Practicing Secure PHP Programming.- Validating and Sanitizing User Input.- Preventing SQL Injection.- Preventing Cross-Site Scripting.- Preventing Remote Execution.- Enforcing Security for Temporary Files.- Preventing Session Hijacking.- Securing REST Services.- Practicing Secure Operations.- Using CAPTCHAs.- User Authentication, Authorization, and Logging.- Preventing Data Loss.- Safe Execution of System and Remote Procedure Calls.- Creating a Safe Environment.- Securing Unix.- Securing Your Database.- Using Encryption.- Securing Network Connections: SSL and SSH.- Final Recommendations.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Shop der buecher.de GmbH & Co. KG Bürgermeister-Wegele-Str. 12, 86167 Augsburg Amtsgericht Augsburg HRA 13309