Web security for developers

real threats practical defense

Web security for developers

real threats practical defense
by Malcolm McDonald
Book - 2020

"Explores common attacks and vulnerabilities that web developers need to look out for. The first half of the book describes security concepts every developer should know ; the second half delves into individual vulnerabilities, such as SQL injection and cross-site scripting, offering real-world examples and code samples"--

Сохранить в:

Holdings -

Shadle

Barcode Status Material Type CallNumber
37413318768795 Доступно Non-fiction 005.87 MCDONAL
Библиографические подробности
Главный автор: McDonald, Malcolm (Computer programmer) (Автор)
Формат:
Язык:English
Опубликовано: San Francisco : No Starch Press, [2020]
Предметы:

MARC

LEADER 00000cam a2200000Ii 4500
001 707187
005 20210307082900.0
008 200708s2020 caua 001 0 eng
010 |a  2020006695 
020 |a 9781593279943  |q (paperback) 
020 |a 1593279949  |q (paperback) 
035 |a (OCoLC)1163927985 
040 |a DLC  |b eng  |e rda  |c OQX  |d OQX  |d OCLCO  |d NZAUC  |d OCLCF  |d DPL  |d OCLCO 
082 0 0 |a 005.8/7  |2 23 
092 0 |a 005.87 MCDONAL 
100 1 |a McDonald, Malcolm  |c (Computer programmer),  |e author. 
245 1 0 |a Web security for developers :  |b real threats, practical defense /  |c by Malcolm McDonald. 
264 1 |a San Francisco :  |b No Starch Press,  |c [2020] 
300 |a xxv, 189 pages :  |b illustrations ;  |c 24 cm 
336 |a text  |b txt  |2 rdacontent 
337 |a unmediated  |b n  |2 rdamedia 
338 |a volume  |b nc  |2 rdacarrier 
500 |a Includes index. 
520 |a "Explores common attacks and vulnerabilities that web developers need to look out for. The first half of the book describes security concepts every developer should know ; the second half delves into individual vulnerabilities, such as SQL injection and cross-site scripting, offering real-world examples and code samples"--  |c Provided by publisher. 
505 0 |a Let's hack a website -- Part 1: The basics: How the internet works -- how browsers work -- how web servers work -- how programmers work -- Part 2: The threats: Injection attacks -- cross-site scripting attacks -- cross-site request forgery attacks -- compromising authentication -- session hijacking -- permissions -- information leaks -- encryption -- third-party code -- XML attacks -- don't be an accessory -- denial-of-service attacks. 
650 0 |a Hacking. 
650 0 |a Computer networks  |x Security measures. 
949 |b 37413318768795  |c newanf  |d prta  |e 005.87 MCDONAL  |g sh  |h 30.00  |q 1626971 
998 |a 2020.10.15 
999 f f |i 88fdf376-190f-5780-b4d9-2a768a14f2e8  |s 89708c38-2e70-57bb-9a74-cdaf844d080e  |t 0 
952 f f |p Standard Circulation  |a City of Spokane  |b Spokane Public Library  |c Branches  |d Shadle  |t 0  |e 005.87 MCDONAL  |h Dewey Decimal classification  |i Non-fiction  |m 37413318768795