000 02982nam a22004455i 4500
001 u370915
003 SIRSI
005 20160812080059.0
007 cr nn 008mamaa
008 110729s2010 xxu| s |||| 0|eng d
020 _a9781430233190
_9978-1-4302-3319-0
040 _cMX-MeUAM
050 4 _aQA75.5-76.95
082 0 4 _a004
_223
100 1 _aSnyder, Chris.
_eauthor.
245 1 0 _aPro PHP Security
_h[recurso electrónico] :
_bFrom Application Security Principles to the Implementation of XSS Defenses /
_cby Chris Snyder, Thomas Myer, Michael Southwell.
250 _aSecond Edition.
264 1 _aBerkeley, CA :
_bApress :
_bImprint: Apress,
_c2010.
300 _aXVIII, 368 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aThe Importance of Security -- Why Is Secure Programming a Concern? -- Practicing Secure PHP Programming -- Validating and Sanitizing User Input -- Preventing SQL Injection -- Preventing Cross-Site Scripting -- Preventing Remote Execution -- Enforcing Security for Temporary Files -- Preventing Session Hijacking -- Securing REST Services -- Practicing Secure Operations -- Using CAPTCHAs -- User Authentication, Authorization, and Logging -- Preventing Data Loss -- Safe Execution of System and Remote Procedure Calls -- Creating a Safe Environment -- Securing Unix -- Securing Your Database -- Using Encryption -- Securing Network Connections: SSL and SSH -- Final Recommendations.
520 _aPHP security, just like PHP itself, has advanced. Updated for PHP 5.3, the second edition of this authoritative PHP security book covers foundational PHP security topics like SQL injection, XSS, user authentication, and secure PHP development. Chris Snyder and Tom Myer also delve into recent developments like mobile security, the impact of JavaScript, and the advantages of recent PHP hardening efforts. Pro PHP Security, Second Edition will serve as your complete guide for taking defensive and proactive security measures within your PHP applications. Beginners in secure programming will find a lot of material on secure PHP development, the basics of encryption, secure protocols, as well as how to reconcile the demands of server-side and web application security.
650 0 _aComputer science.
650 0 _aData encryption (Computer science).
650 1 4 _aComputer Science.
650 2 4 _aComputer Science, general.
650 2 4 _aData Encryption.
700 1 _aMyer, Thomas.
_eauthor.
700 1 _aSouthwell, Michael.
_eauthor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9781430233183
856 4 0 _zLibro electrónico
_uhttp://148.231.10.114:2048/login?url=http://link.springer.com/book/10.1007/978-1-4302-3319-0
596 _a19
942 _cLIBRO_ELEC
999 _c198795
_d198795