Web security for developers
real threats practical defense
Web security for developers
real threats practical defense
Book - 2020
"Explores common attacks and vulnerabilities that web developers need to look out for. The first half of the book describes security concepts every developer should know ; the second half delves into individual vulnerabilities, such as SQL injection and cross-site scripting, offering real-world examples and code samples"--
محفوظ في:
Holdings -
Shadle
| Barcode | Status | Material Type | CallNumber |
|---|---|---|---|
| 37413318768795 | متاح | Non-fiction | 005.87 MCDONAL |
| المؤلف الرئيسي: | |
|---|---|
| التنسيق: | كتاب |
| اللغة: | English |
| منشور في: |
San Francisco :
No Starch Press,
[2020]
|
| الموضوعات: |
MARC
| LEADER | 00000cam a2200000Ii 4500 | ||
|---|---|---|---|
| 001 | 707187 | ||
| 005 | 20210307082900.0 | ||
| 008 | 200708s2020 caua 001 0 eng | ||
| 010 | |a 2020006695 | ||
| 020 | |a 9781593279943 |q (paperback) | ||
| 020 | |a 1593279949 |q (paperback) | ||
| 035 | |a (OCoLC)1163927985 | ||
| 040 | |a DLC |b eng |e rda |c OQX |d OQX |d OCLCO |d NZAUC |d OCLCF |d DPL |d OCLCO | ||
| 082 | 0 | 0 | |a 005.8/7 |2 23 |
| 092 | 0 | |a 005.87 MCDONAL | |
| 100 | 1 | |a McDonald, Malcolm |c (Computer programmer), |e author. | |
| 245 | 1 | 0 | |a Web security for developers : |b real threats, practical defense / |c by Malcolm McDonald. |
| 264 | 1 | |a San Francisco : |b No Starch Press, |c [2020] | |
| 300 | |a xxv, 189 pages : |b illustrations ; |c 24 cm | ||
| 336 | |a text |b txt |2 rdacontent | ||
| 337 | |a unmediated |b n |2 rdamedia | ||
| 338 | |a volume |b nc |2 rdacarrier | ||
| 500 | |a Includes index. | ||
| 520 | |a "Explores common attacks and vulnerabilities that web developers need to look out for. The first half of the book describes security concepts every developer should know ; the second half delves into individual vulnerabilities, such as SQL injection and cross-site scripting, offering real-world examples and code samples"-- |c Provided by publisher. | ||
| 505 | 0 | |a Let's hack a website -- Part 1: The basics: How the internet works -- how browsers work -- how web servers work -- how programmers work -- Part 2: The threats: Injection attacks -- cross-site scripting attacks -- cross-site request forgery attacks -- compromising authentication -- session hijacking -- permissions -- information leaks -- encryption -- third-party code -- XML attacks -- don't be an accessory -- denial-of-service attacks. | |
| 650 | 0 | |a Hacking. | |
| 650 | 0 | |a Computer networks |x Security measures. | |
| 949 | |b 37413318768795 |c newanf |d prta |e 005.87 MCDONAL |g sh |h 30.00 |q 1626971 | ||
| 998 | |a 2020.10.15 | ||
| 999 | f | f | |i 88fdf376-190f-5780-b4d9-2a768a14f2e8 |s 89708c38-2e70-57bb-9a74-cdaf844d080e |t 0 |
| 952 | f | f | |p Standard Circulation |a City of Spokane |b Spokane Public Library |c Branches |d Shadle |t 0 |e 005.87 MCDONAL |h Dewey Decimal classification |i Non-fiction |m 37413318768795 |