語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Safety of web applications = risks, ...
~
Quinton, Éric,
FindBook
Google Book
Amazon
博客來
Safety of web applications = risks, encryption and handling vulnerabilities with PHP /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Safety of web applications/ Éric Quinton.
其他題名:
risks, encryption and handling vulnerabilities with PHP /
作者:
Quinton, Éric,
出版者:
London :ISTE Press ; : 2017.,
面頁冊數:
1 online resource :ill.
內容註:
Front Cover -- Safety of Web Applications: Risks, Encryption and Handling Vulnerabilities with PHP -- Copyright -- Contents -- Preface -- 1. Why Do Web Applications Need to be Secure? -- 1.1. What is a web application? -- 1.2. What is computer security? -- 1.3. Examples of damage caused by security failures -- 2. Estimating Risk -- 2.1. What is risk? -- 2.2. How can we protect ourselves from risk? -- 2.3. Determining the target -- 2.4. Determining the impact -- 2.5. Which causes or scenarios should be considered? -- 2.6. How should this study be performed in a company setting? -- 3. Encryption and Web Server Configuration -- 3.1. Examples of different web servers -- 3.2. Introduction to concepts in encryption -- 3.3. Generating and managing encryption certificates -- 3.4. Implementing the HTTPS protocol -- 3.5. Improving the security of the Apache server -- 3.6. In summary -- 4. Threats and Protecting Against Them -- 4.1. The threats associated with web-based environments -- 4.2. The top 10 most frequent attacks in 2013 -- 4.3. Other countermeasures -- 4.4. Implementing a resource controller -- 5. Managing User Logins and Assigning Permissions -- 5.1. Managing user logins -- 5.2. Managing permissions -- 5.3. In summary -- 6. Using the MVC Model to Structure the Application -- 6.1. Why does the application structure matter? -- 6.2. What is the MVC model? -- 6.3. Conclusion -- 7. Implementing a Suitable Technical Platform and Testing the Application -- 7.1. Designing a suitable technical architecture -- 7.2. Testing the security of the application -- 7.3. What options do we have if implementing security measures for an application seems an impossible task? -- Bibliography -- Index -- Back Cover.
標題:
Computer networks - Security measures. -
電子資源:
https://www.sciencedirect.com/science/book/9781785482281
ISBN:
9780081023624 (electronic bk.)
Safety of web applications = risks, encryption and handling vulnerabilities with PHP /
Quinton, Éric,
Safety of web applications
risks, encryption and handling vulnerabilities with PHP /[electronic resource] :Éric Quinton. - London :ISTE Press ;2017. - 1 online resource :ill. - Computer engineering. - Computer engineering series (London, England).
Includes bibliographical references and index.
Front Cover -- Safety of Web Applications: Risks, Encryption and Handling Vulnerabilities with PHP -- Copyright -- Contents -- Preface -- 1. Why Do Web Applications Need to be Secure? -- 1.1. What is a web application? -- 1.2. What is computer security? -- 1.3. Examples of damage caused by security failures -- 2. Estimating Risk -- 2.1. What is risk? -- 2.2. How can we protect ourselves from risk? -- 2.3. Determining the target -- 2.4. Determining the impact -- 2.5. Which causes or scenarios should be considered? -- 2.6. How should this study be performed in a company setting? -- 3. Encryption and Web Server Configuration -- 3.1. Examples of different web servers -- 3.2. Introduction to concepts in encryption -- 3.3. Generating and managing encryption certificates -- 3.4. Implementing the HTTPS protocol -- 3.5. Improving the security of the Apache server -- 3.6. In summary -- 4. Threats and Protecting Against Them -- 4.1. The threats associated with web-based environments -- 4.2. The top 10 most frequent attacks in 2013 -- 4.3. Other countermeasures -- 4.4. Implementing a resource controller -- 5. Managing User Logins and Assigning Permissions -- 5.1. Managing user logins -- 5.2. Managing permissions -- 5.3. In summary -- 6. Using the MVC Model to Structure the Application -- 6.1. Why does the application structure matter? -- 6.2. What is the MVC model? -- 6.3. Conclusion -- 7. Implementing a Suitable Technical Platform and Testing the Application -- 7.1. Designing a suitable technical architecture -- 7.2. Testing the security of the application -- 7.3. What options do we have if implementing security measures for an application seems an impossible task? -- Bibliography -- Index -- Back Cover.
Safety of Web Applications: Risks, Encryption and Handling Vulnerabilities with PHP explores many areas that can help computer science students and developers integrate security into their applications. The Internet is not secure, but it's very friendly as a tool for storing and manipulating data. Customer confidence in Internet software is based on it's ability to prevent damage and attacks, but secure software is complicated, depending on several factors, including good risk estimation, good code architecture, cyphering, web server configuration, coding to prevent the most common attacks, and identification and rights allocation.
ISBN: 9780081023624 (electronic bk.)
LCCN: 2017275380Subjects--Topical Terms:
579161
Computer networks
--Security measures.Index Terms--Genre/Form:
542853
Electronic books.
LC Class. No.: TK5105.59
Dewey Class. No.: 005.8
Safety of web applications = risks, encryption and handling vulnerabilities with PHP /
LDR
:03414cmm a2200289 a 4500
001
2246135
006
m o d
007
cr cnu|||unuuu
008
211223s2017 enka gob 001 0 eng d
010
$a
2017275380
020
$a
9780081023624 (electronic bk.)
020
$a
0081023626 (electronic bk.)
020
$a
9781785482281 (hardback)
020
$a
1785482289 (hardback)
035
$a
(OCoLC)982377517
035
$a
ocn982377517
040
$a
N$T
$b
eng
$c
N$T
$d
N$T
$d
IDEBK
$d
EBLCP
$d
OCLCF
$d
OPELS
$d
YDX
$d
COO
$d
VGM
$d
OTZ
$d
MERER
$d
OCLCQ
$d
D6H
$d
U3W
$d
AU@
$d
OCLCQ
$d
LVT
$d
OCLCQ
$d
S2H
$d
OCLCO
$d
VT2
041
0
$a
eng
050
4
$a
TK5105.59
082
0 4
$a
005.8
$2
23
100
1
$a
Quinton, Éric,
$e
author.
$3
3509198
245
1 0
$a
Safety of web applications
$h
[electronic resource] :
$b
risks, encryption and handling vulnerabilities with PHP /
$c
Éric Quinton.
260
$a
London :
$b
ISTE Press ;
$a
Oxford :
$b
Elsevier,
$c
2017.
300
$a
1 online resource :
$b
ill.
490
1
$a
Computer engineering
504
$a
Includes bibliographical references and index.
505
0
$a
Front Cover -- Safety of Web Applications: Risks, Encryption and Handling Vulnerabilities with PHP -- Copyright -- Contents -- Preface -- 1. Why Do Web Applications Need to be Secure? -- 1.1. What is a web application? -- 1.2. What is computer security? -- 1.3. Examples of damage caused by security failures -- 2. Estimating Risk -- 2.1. What is risk? -- 2.2. How can we protect ourselves from risk? -- 2.3. Determining the target -- 2.4. Determining the impact -- 2.5. Which causes or scenarios should be considered? -- 2.6. How should this study be performed in a company setting? -- 3. Encryption and Web Server Configuration -- 3.1. Examples of different web servers -- 3.2. Introduction to concepts in encryption -- 3.3. Generating and managing encryption certificates -- 3.4. Implementing the HTTPS protocol -- 3.5. Improving the security of the Apache server -- 3.6. In summary -- 4. Threats and Protecting Against Them -- 4.1. The threats associated with web-based environments -- 4.2. The top 10 most frequent attacks in 2013 -- 4.3. Other countermeasures -- 4.4. Implementing a resource controller -- 5. Managing User Logins and Assigning Permissions -- 5.1. Managing user logins -- 5.2. Managing permissions -- 5.3. In summary -- 6. Using the MVC Model to Structure the Application -- 6.1. Why does the application structure matter? -- 6.2. What is the MVC model? -- 6.3. Conclusion -- 7. Implementing a Suitable Technical Platform and Testing the Application -- 7.1. Designing a suitable technical architecture -- 7.2. Testing the security of the application -- 7.3. What options do we have if implementing security measures for an application seems an impossible task? -- Bibliography -- Index -- Back Cover.
520
$a
Safety of Web Applications: Risks, Encryption and Handling Vulnerabilities with PHP explores many areas that can help computer science students and developers integrate security into their applications. The Internet is not secure, but it's very friendly as a tool for storing and manipulating data. Customer confidence in Internet software is based on it's ability to prevent damage and attacks, but secure software is complicated, depending on several factors, including good risk estimation, good code architecture, cyphering, web server configuration, coding to prevent the most common attacks, and identification and rights allocation.
650
0
$a
Computer networks
$x
Security measures.
$3
579161
650
0
$a
Web sites
$x
Security measures.
$3
542677
650
0
$a
PHP (Computer program language)
$3
624145
650
7
$a
COMPUTERS
$x
Security
$x
Networking.
$2
bisacsh
$3
3508467
655
0
$a
Electronic books.
$2
lcsh
$3
542853
830
0
$a
Computer engineering series (London, England)
$3
2148402
856
4 0
$u
https://www.sciencedirect.com/science/book/9781785482281
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9406630
電子資源
11.線上閱覽_V
電子書
EB TK5105.59
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入