วันเสาร์ที่ 22 กันยายน พ.ศ. 2555

Pro PHP Security: From Application Security Principles to the Implementation of XSS Defenses (Expert's Voice in Open Source)

Pro PHP Security: From Application Security Principles to the Implementation of XSS Defenses (Expert's Voice in Open Source) Review






Buy From Amazon.com







PHP security, just like PHP itself, has advanced. Updated for PHP 5.3, the second edition of this authoritative PHP security book covers foundational PHP security topics like SQL injection, XSS, user authentication, and secure PHP development. Chris Snyder and Tom Myer also delve into recent developments like mobile security, the impact of JavaScript, and the advantages of recent PHP hardening efforts.

Pro PHP Security, Second Edition
will serve as your complete guide for taking defensive and proactive security measures within your PHP applications. Beginners in secure programming will find a lot of material on secure PHP development, the basics of encryption, secure protocols, as well as how to reconcile the demands of server-side and web application security.

What you’ll learn

  • Secure PHP development principles
  • PHP web application security
  • User and file security
  • Mobile security
  • Encryption and secure protocols
  • Dealing with JavaScript

Who this book is for

Pro PHP Security appeals to all intermediate and advanced PHP programmers who need to keep websites safe. It also contains material of interest to all who are concerned with web application security.

Table of Contents

  1. Why Is Secure Programming a Concern?
  2. Validating and Sanitizing User Input
  3. Preventing SQL Injection
  4. Preventing Cross-Site Scripting
  5. Preventing Remote Execution
  6. Enforcing Security for Temporary Files
  7. Preventing Session Hijacking
  8. Securing REST Services
  9. Using CAPTCHAs
  10. User Authentication, Authorization, and Logging
  11. Preventing Data Loss
  12. Safe Execution of System and Remote Procedure Calls
  13. Securing Unix
  14. Securing Your Database
  15. Using Encryption
  16. Securing Network Connections: SSL and SSH
  17. Final Recommendations




Buy From Amazon.com

  • rss
  • Del.icio.us
  • Digg
  • Twitter
  • StumbleUpon
  • Reddit
  • Share this on Technorati
  • Post this to Myspace
  • Share this on Blinklist
  • Submit this to DesignFloat

0 ความคิดเห็น:

แสดงความคิดเห็น