找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Secure Web Application Development; A Hands-On Guide wit Matthew Baker Book 2022 Matthew Baker 2022 web applications.security.python.autho

[復制鏈接]
查看: 53418|回復: 54
樓主
發(fā)表于 2025-3-21 19:36:16 | 只看該作者 |倒序瀏覽 |閱讀模式
書目名稱Secure Web Application Development
副標題A Hands-On Guide wit
編輯Matthew Baker
視頻videohttp://file.papertrans.cn/864/863326/863326.mp4
概述Provides both theoretical and practical approaches concerning web application security.Teaches readers how hackers attack applications as well as defense best practices.Delivers readers with a complet
圖書封面Titlebook: Secure Web Application Development; A Hands-On Guide wit Matthew Baker Book 2022 Matthew Baker  2022 web applications.security.python.autho
描述Cyberattacks are becoming more commonplace and?the Open Web Application Security Project (OWASP), estimates 94% of sites have flaws in their access control alone.? Attacks evolve to work around new defenses, and defenses?must evolve to remain effective.? Developers need to understand the fundamentals of attacks and defenses?in order to comprehend new techniques as they become available. This book teaches you how to write secure web applications..The focus is highlighting how hackers attack applications along with a broad arsenal of defenses.? This will enable you to pick appropriate techniques to close vulnerabilities while still providing users with their needed functionality..Topics covered include:.A framework for deciding what needs to be protected and how strongly.Configuring services such as databases and web servers.Safe use of HTTP methods such as GET, POST, etc, cookies and use of HTTPS.Safe REST APIs.Server-side attacks and defenses?such as injection and cross-site scripting.Client-side attacks and defenses?such as cross-site request forgery.Security techniques such as CORS, CSP.Password management, authentication and authorization, including OAuth2.Best practices for dan
出版日期Book 2022
關鍵詞web applications; security; python; authorisation techniques; OAuth2; CORS; content security policy; SQL in
版次1
doihttps://doi.org/10.1007/978-1-4842-8596-1
isbn_softcover978-1-4842-8595-4
isbn_ebook978-1-4842-8596-1
copyrightMatthew Baker 2022
The information of publication is updating

書目名稱Secure Web Application Development影響因子(影響力)




書目名稱Secure Web Application Development影響因子(影響力)學科排名




書目名稱Secure Web Application Development網絡公開度




書目名稱Secure Web Application Development網絡公開度學科排名




書目名稱Secure Web Application Development被引頻次




書目名稱Secure Web Application Development被引頻次學科排名




書目名稱Secure Web Application Development年度引用




書目名稱Secure Web Application Development年度引用學科排名




書目名稱Secure Web Application Development讀者反饋




書目名稱Secure Web Application Development讀者反饋學科排名




單選投票, 共有 0 人參與投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用戶組沒有投票權限
沙發(fā)
發(fā)表于 2025-3-21 23:06:46 | 只看該作者
板凳
發(fā)表于 2025-3-22 01:07:08 | 只看該作者
地板
發(fā)表于 2025-3-22 08:00:47 | 只看該作者
Installing and Configuring Services,Now that we have explored how HTTP and HTTPS work, we can look at how to set up a web server and associated services in a secure way. We will start by looking at service architecture design: how trust boundaries impact on protocol choices. Web frameworks make it easier to write safe code, and we will take a look at some common options.
5#
發(fā)表于 2025-3-22 11:22:54 | 只看該作者
APIs and Endpoints,In this chapter, we will begin looking at coding web applications, starting with designing our endpoints: URLs and APIs. These are the building blocks of a web application. HTTP leaves a number of choices to us: what request method to use, what response code to return, what format to use for the request and response body.
6#
發(fā)表于 2025-3-22 13:44:03 | 只看該作者
7#
發(fā)表于 2025-3-22 18:47:58 | 只看該作者
8#
發(fā)表于 2025-3-22 22:15:14 | 只看該作者
9#
發(fā)表于 2025-3-23 04:02:59 | 只看該作者
OAuth2,In the last chapter, we looked at authentication and authorization. A widely used authorization protocol is OAuth2. It is a large topic with many use cases and options, so we have given it its own chapter.
10#
發(fā)表于 2025-3-23 06:13:55 | 只看該作者
Third-Party and Supply Chain Security,In this chapter, we turn to security topics beyond writing code but that nonetheless affect our application security: developers and their devices, third-party components, and supply chain security.
 關于派博傳思  派博傳思旗下網站  友情鏈接
派博傳思介紹 公司地理位置 論文服務流程 影響因子官網 吾愛論文網 大講堂 北京大學 Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經驗總結 SCIENCEGARD IMPACTFACTOR 派博系數 清華大學 Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網安備110108008328) GMT+8, 2026-1-18 00:10
Copyright © 2001-2015 派博傳思   京公網安備110108008328 版權所有 All rights reserved
快速回復 返回頂部 返回列表
大丰市| 济源市| 大方县| 扎兰屯市| 临泉县| 高碑店市| 孟津县| 中西区| 达州市| 凤凰县| 堆龙德庆县| 临朐县| 娱乐| 吴旗县| 安岳县| 如皋市| 股票| 京山县| 新营市| 闸北区| 湛江市| 湖州市| 鄂伦春自治旗| 原平市| 凌源市| 四川省| 和田市| 乌兰察布市| 霍城县| 尤溪县| 永福县| 玉山县| 浏阳市| 保靖县| 砚山县| 武功县| 抚宁县| 沛县| 张北县| 社会| 巧家县|