fumble 发表于 2025-3-21 19:36:16

书目名称Secure Web Application Development影响因子(影响力)<br>        http://impactfactor.cn/if/?ISSN=BK0863326<br><br>        <br><br>书目名称Secure Web Application Development影响因子(影响力)学科排名<br>        http://impactfactor.cn/ifr/?ISSN=BK0863326<br><br>        <br><br>书目名称Secure Web Application Development网络公开度<br>        http://impactfactor.cn/at/?ISSN=BK0863326<br><br>        <br><br>书目名称Secure Web Application Development网络公开度学科排名<br>        http://impactfactor.cn/atr/?ISSN=BK0863326<br><br>        <br><br>书目名称Secure Web Application Development被引频次<br>        http://impactfactor.cn/tc/?ISSN=BK0863326<br><br>        <br><br>书目名称Secure Web Application Development被引频次学科排名<br>        http://impactfactor.cn/tcr/?ISSN=BK0863326<br><br>        <br><br>书目名称Secure Web Application Development年度引用<br>        http://impactfactor.cn/ii/?ISSN=BK0863326<br><br>        <br><br>书目名称Secure Web Application Development年度引用学科排名<br>        http://impactfactor.cn/iir/?ISSN=BK0863326<br><br>        <br><br>书目名称Secure Web Application Development读者反馈<br>        http://impactfactor.cn/5y/?ISSN=BK0863326<br><br>        <br><br>书目名称Secure Web Application Development读者反馈学科排名<br>        http://impactfactor.cn/5yr/?ISSN=BK0863326<br><br>        <br><br>

秘传 发表于 2025-3-21 23:06:46

http://reply.papertrans.cn/87/8634/863326/863326_2.png

混合物 发表于 2025-3-22 01:07:08

http://reply.papertrans.cn/87/8634/863326/863326_3.png

表两个 发表于 2025-3-22 08:00:47

Installing and Configuring Services,Now that we have explored how HTTP and HTTPS work, we can look at how to set up a web server and associated services in a secure way. We will start by looking at service architecture design: how trust boundaries impact on protocol choices. Web frameworks make it easier to write safe code, and we will take a look at some common options.

价值在贬值 发表于 2025-3-22 11:22:54

APIs and Endpoints,In this chapter, we will begin looking at coding web applications, starting with designing our endpoints: URLs and APIs. These are the building blocks of a web application. HTTP leaves a number of choices to us: what request method to use, what response code to return, what format to use for the request and response body.

induct 发表于 2025-3-22 13:44:03

http://reply.papertrans.cn/87/8634/863326/863326_6.png

Frenetic 发表于 2025-3-22 18:47:58

http://reply.papertrans.cn/87/8634/863326/863326_7.png

AGOG 发表于 2025-3-22 22:15:14

http://reply.papertrans.cn/87/8634/863326/863326_8.png

FORGO 发表于 2025-3-23 04:02:59

OAuth2,In the last chapter, we looked at authentication and authorization. A widely used authorization protocol is OAuth2. It is a large topic with many use cases and options, so we have given it its own chapter.

疾驰 发表于 2025-3-23 06:13:55

Third-Party and Supply Chain Security,In this chapter, we turn to security topics beyond writing code but that nonetheless affect our application security: developers and their devices, third-party components, and supply chain security.
页: [1] 2 3 4 5 6
查看完整版本: Titlebook: Secure Web Application Development; A Hands-On Guide wit Matthew Baker Book 2022 Matthew Baker 2022 web applications.security.python.autho