找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Secure Web Application Development; A Hands-On Guide wit Matthew Baker Book 2022 Matthew Baker 2022 web applications.security.python.autho

[复制链接]
查看: 53277|回复: 54
发表于 2025-3-21 19:36:16 | 显示全部楼层 |阅读模式
书目名称Secure Web Application Development
副标题A Hands-On Guide wit
编辑Matthew Baker
视频video
概述Provides both theoretical and practical approaches concerning web application security.Teaches readers how hackers attack applications as well as defense best practices.Delivers readers with a complet
图书封面Titlebook: Secure Web Application Development; A Hands-On Guide wit Matthew Baker Book 2022 Matthew Baker  2022 web applications.security.python.autho
描述Cyberattacks are becoming more commonplace and the Open Web Application Security Project (OWASP), estimates 94% of sites have flaws in their access control alone.  Attacks evolve to work around new defenses, and defenses must evolve to remain effective.  Developers need to understand the fundamentals of attacks and defenses in order to comprehend new techniques as they become available. This book teaches you how to write secure web applications..The focus is highlighting how hackers attack applications along with a broad arsenal of defenses.  This will enable you to pick appropriate techniques to close vulnerabilities while still providing users with their needed functionality..Topics covered include:.A framework for deciding what needs to be protected and how strongly.Configuring services such as databases and web servers.Safe use of HTTP methods such as GET, POST, etc, cookies and use of HTTPS.Safe REST APIs.Server-side attacks and defenses such as injection and cross-site scripting.Client-side attacks and defenses such as cross-site request forgery.Security techniques such as CORS, CSP.Password management, authentication and authorization, including OAuth2.Best practices for dan
出版日期Book 2022
关键词web applications; security; python; authorisation techniques; OAuth2; CORS; content security policy; SQL in
版次1
doihttps://doi.org/10.1007/978-1-4842-8596-1
isbn_softcover978-1-4842-8595-4
isbn_ebook978-1-4842-8596-1
copyrightMatthew Baker 2022
The information of publication is updating

书目名称Secure Web Application Development影响因子(影响力)




书目名称Secure Web Application Development影响因子(影响力)学科排名




书目名称Secure Web Application Development网络公开度




书目名称Secure Web Application Development网络公开度学科排名




书目名称Secure Web Application Development被引频次




书目名称Secure Web Application Development被引频次学科排名




书目名称Secure Web Application Development年度引用




书目名称Secure Web Application Development年度引用学科排名




书目名称Secure Web Application Development读者反馈




书目名称Secure Web Application Development读者反馈学科排名




单选投票, 共有 0 人参与投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用户组没有投票权限
发表于 2025-3-21 23:06:46 | 显示全部楼层
发表于 2025-3-22 01:07:08 | 显示全部楼层
发表于 2025-3-22 08:00:47 | 显示全部楼层
Installing and Configuring Services,Now that we have explored how HTTP and HTTPS work, we can look at how to set up a web server and associated services in a secure way. We will start by looking at service architecture design: how trust boundaries impact on protocol choices. Web frameworks make it easier to write safe code, and we will take a look at some common options.
发表于 2025-3-22 11:22:54 | 显示全部楼层
APIs and Endpoints,In this chapter, we will begin looking at coding web applications, starting with designing our endpoints: URLs and APIs. These are the building blocks of a web application. HTTP leaves a number of choices to us: what request method to use, what response code to return, what format to use for the request and response body.
发表于 2025-3-22 13:44:03 | 显示全部楼层
发表于 2025-3-22 18:47:58 | 显示全部楼层
发表于 2025-3-22 22:15:14 | 显示全部楼层
发表于 2025-3-23 04:02:59 | 显示全部楼层
OAuth2,In the last chapter, we looked at authentication and authorization. A widely used authorization protocol is OAuth2. It is a large topic with many use cases and options, so we have given it its own chapter.
发表于 2025-3-23 06:13:55 | 显示全部楼层
Third-Party and Supply Chain Security,In this chapter, we turn to security topics beyond writing code but that nonetheless affect our application security: developers and their devices, third-party components, and supply chain security.
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-6-20 04:39
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表