<< ePub Addison Wesley - Securing PHP Web Applications
Addison Wesley - Securing PHP Web Applications
This spot is not verified, the name of the sender has not been confirmed
Category Image
FormatePub
Source
Language
Genre
TypeBook
Date 1 decade, 4 years
Size n/a
 
Website https://nzbindex.nl/search/?q=Addison+Wesley+-+Securing+PHP+Web+Applications
 
Sender Martijn_2
Tag securing php web applications
 
Searchengine Search
 
Number of spamreports 0

Post Description

Hackers specifically target PHP Web applications. Why? Because they know many of these apps are written by programmers with little or no experience or training in software security. Don&#146;t be victimized. Securing PHP Web Applications will help you master the specific techniques, skills, and best practices you need to write rock-solid PHP code and harden the PHP software you&#146;re already using.

Drawing on more than fifteen years of experience in Web development, security, and training, Tricia and William Ballad show how security flaws can find their way into PHP code, and they identify the most common security mistakes made by PHP developers. The authors present practical, specific solutions&#150;techniques that are surprisingly easy to understand and use, no matter what level of PHP programming expertise you have.

Securing PHP Web Applications covers the most important aspects of PHP code security, from error handling and buffer overflows to input validation and filesystem access. The authors explode the myths that discourage PHP programmers from attempting to secure their code and teach you how to instinctively write more secure code without compromising your software&#146;s performance or your own productivity.

Coverage includes

Designing secure applications from the very beginning&#150;and plugging holes in applications you can&#146;t rewrite from scratch
Defending against session hijacking, fixation, and poisoning attacks that PHP can&#146;t resist on its own
Securing the servers your PHP code runs on, including specific guidance for Apache, MySQL, IIS/SQL Server, and more
Enforcing strict authentication and making the most of encryption
Preventing dangerous cross-site scripting (XSS) attacks
Systematically testing yourapplications for security, including detailed discussions of exploit testing and PHP test automation
Addressing known vulnerabilities in the third-party applications you&#146;re already running

Comments # 0