找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Secure Web Application Development; A Hands-On Guide wit Matthew Baker Book 2022 Matthew Baker 2022 web applications.security.python.autho

[復(fù)制鏈接]
查看: 53414|回復(fù): 54
樓主
發(fā)表于 2025-3-21 19:36:16 | 只看該作者 |倒序?yàn)g覽 |閱讀模式
書目名稱Secure Web Application Development
副標(biāo)題A Hands-On Guide wit
編輯Matthew Baker
視頻videohttp://file.papertrans.cn/864/863326/863326.mp4
概述Provides both theoretical and practical approaches concerning web application security.Teaches readers how hackers attack applications as well as defense best practices.Delivers readers with a complet
圖書封面Titlebook: Secure Web Application Development; A Hands-On Guide wit Matthew Baker Book 2022 Matthew Baker  2022 web applications.security.python.autho
描述Cyberattacks are becoming more commonplace and?the Open Web Application Security Project (OWASP), estimates 94% of sites have flaws in their access control alone.? Attacks evolve to work around new defenses, and defenses?must evolve to remain effective.? Developers need to understand the fundamentals of attacks and defenses?in order to comprehend new techniques as they become available. This book teaches you how to write secure web applications..The focus is highlighting how hackers attack applications along with a broad arsenal of defenses.? This will enable you to pick appropriate techniques to close vulnerabilities while still providing users with their needed functionality..Topics covered include:.A framework for deciding what needs to be protected and how strongly.Configuring services such as databases and web servers.Safe use of HTTP methods such as GET, POST, etc, cookies and use of HTTPS.Safe REST APIs.Server-side attacks and defenses?such as injection and cross-site scripting.Client-side attacks and defenses?such as cross-site request forgery.Security techniques such as CORS, CSP.Password management, authentication and authorization, including OAuth2.Best practices for dan
出版日期Book 2022
關(guān)鍵詞web applications; security; python; authorisation techniques; OAuth2; CORS; content security policy; SQL in
版次1
doihttps://doi.org/10.1007/978-1-4842-8596-1
isbn_softcover978-1-4842-8595-4
isbn_ebook978-1-4842-8596-1
copyrightMatthew Baker 2022
The information of publication is updating

書目名稱Secure Web Application Development影響因子(影響力)




書目名稱Secure Web Application Development影響因子(影響力)學(xué)科排名




書目名稱Secure Web Application Development網(wǎng)絡(luò)公開度




書目名稱Secure Web Application Development網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Secure Web Application Development被引頻次




書目名稱Secure Web Application Development被引頻次學(xué)科排名




書目名稱Secure Web Application Development年度引用




書目名稱Secure Web Application Development年度引用學(xué)科排名




書目名稱Secure Web Application Development讀者反饋




書目名稱Secure Web Application Development讀者反饋學(xué)科排名




單選投票, 共有 0 人參與投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用戶組沒有投票權(quán)限
沙發(fā)
發(fā)表于 2025-3-21 23:06:46 | 只看該作者
板凳
發(fā)表于 2025-3-22 01:07:08 | 只看該作者
地板
發(fā)表于 2025-3-22 08:00:47 | 只看該作者
Installing and Configuring Services,Now that we have explored how HTTP and HTTPS work, we can look at how to set up a web server and associated services in a secure way. We will start by looking at service architecture design: how trust boundaries impact on protocol choices. Web frameworks make it easier to write safe code, and we will take a look at some common options.
5#
發(fā)表于 2025-3-22 11:22:54 | 只看該作者
APIs and Endpoints,In this chapter, we will begin looking at coding web applications, starting with designing our endpoints: URLs and APIs. These are the building blocks of a web application. HTTP leaves a number of choices to us: what request method to use, what response code to return, what format to use for the request and response body.
6#
發(fā)表于 2025-3-22 13:44:03 | 只看該作者
7#
發(fā)表于 2025-3-22 18:47:58 | 只看該作者
8#
發(fā)表于 2025-3-22 22:15:14 | 只看該作者
9#
發(fā)表于 2025-3-23 04:02:59 | 只看該作者
OAuth2,In the last chapter, we looked at authentication and authorization. A widely used authorization protocol is OAuth2. It is a large topic with many use cases and options, so we have given it its own chapter.
10#
發(fā)表于 2025-3-23 06:13:55 | 只看該作者
Third-Party and Supply Chain Security,In this chapter, we turn to security topics beyond writing code but that nonetheless affect our application security: developers and their devices, third-party components, and supply chain security.
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-1-17 22:17
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
陆良县| 乐清市| 津南区| 巩义市| 井研县| 乳源| 牡丹江市| 海林市| 辽阳县| 吴江市| 岐山县| 台南县| 三门县| 彭泽县| 兰坪| 三明市| 公主岭市| 聂拉木县| 轮台县| 滁州市| 铜梁县| 抚顺县| 治县。| 札达县| 清河县| 龙泉市| 大丰市| 兴国县| 义乌市| 郴州市| 阿克| 高淳县| 商丘市| 吉首市| 宕昌县| 黔西| 昔阳县| 珲春市| 遂平县| 宣汉县| 平南县|