
Web Security for Developers Real Threats, Practical Defense
by McDonald, MalcolmBuy New
Buy Used
Rent Book
Rent Digital
How Marketplace Works:
- This item is offered by an independent seller and not shipped from our warehouse
- Item details like edition and cover design may differ from our description; see seller's comments before ordering.
- Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
- Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
- Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.
Summary
The world has changed. Today, every time you make a site live, you're opening it up to attack.
A first-time developer can easily be discouraged by the difficulties involved with properly securing a website. But have hope: an army of security researchers is out there discovering, documenting, and fixing security flaws. Thankfully, the tools you'll need to secure your site are freely available and generally easy to use.
Web Security for Developers will teach you how your websites are vulnerable to attack and how to protect them. Each chapter breaks down a major security vulnerability and explores a real-world attack, coupled with plenty of code to show you both the vulnerability and the fix.
You'll learn how to:
• Protect against SQL injection attacks, malicious JavaScript, and cross-site request forgery
• Add authentication and shape access control to protect accounts
• Lock down user accounts to prevent attacks that rely on guessing passwords, stealing sessions,
• or escalating privileges
• Implement encryption
• Manage vulnerabilities in legacy code
• Prevent information leaks that disclose vulnerabilities
• Mitigate advanced attacks like malvertising and denial-of-service
As you get stronger at identifying and fixing vulnerabilities, you'll learn to deploy disciplined, secure code and become a better programmer along the way.
Author Biography
Table of Contents
Chapter 2: How the Internet Works
Chapter 3: How Browsers Work
Chapter 4: How Web Servers Work
Chapter 5: How Programmers Work
Chapter 6: Injection Attacks
Chapter 7: Cross-Site Scripting Attacks
Chapter 8: Cross-Site Request Forgery Attacks
Chapter 9: Comprising Authentication
Chapter 10: Session Hijacking
Chapter 11: Permissions
Chapter 12: Information Leaks
Chapter 13: Encryption
Chapter 14: Third-Party Code
Chapter 15: XML Attacks
Chapter 16: Don’t Be an Accessory
Chapter 17: Denial-of-Service Attacks
An electronic version of this book is available through VitalSource.
This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.
By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.
Digital License
You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.
More details can be found here.
A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.
Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.
Please view the compatibility matrix prior to purchase.