Oscar Merida - Web Security 2016 From php[architect] Magazine [2016, PDF, EPUB, MOBI, ENG]

Страницы:  1
Ответить
 

Mikrobuzzz

Стаж: 17 лет 5 месяцев

Сообщений: 334

Mikrobuzzz · 24-Сен-16 15:26 (8 лет 9 месяцев назад, ред. 24-Сен-16 15:32)

Web Security 2016 From php[architect] Magazine
Год издания: 2016
Автор: Oscar Merida
Издательство: [php]architect
ISBN:
  1. print: 978-1-940111-41-4
  2. PDF: 978-1-940111-42-1
  3. epub: 978-1-940111-43-8
  4. mobi: 978-1-940111-44-5
Язык: Английский
Формат: PDF, EPUB, MOBI
Качество: Издательский макет или текст (eBook)
Интерактивное оглавление: Да
Описание:
Are you keeping up with modern security practices? This anthology collects articles rst published in php[architect] magazine. Each one touches on a security topic to help you harden and secure your PHP and web applications. Your users’ information is important, make sure you’re treating it with care.
This anthology includes:
  1. An overview of the attacks you should be familiar with and how to protect against exploits.
  2. Using a PHP-based Intrusion Detection System to monitor and reject requests that attempt to breach your site.
  3. How to protect against SQL Injection from user-supplied data by using prepared statements.
  4. A case study in how the Drupal security team keeps core and contributed modules safe.
  5. How to securely store passwords and understanding the techniques used to crack credentials.
  6. Using OAuth 2.0 to connect to web services and fetch information for your users without asking for a password.
  7. How web service security di ers from traditional web application security and advice for e ectively protecting one from malicious users.
  8. Identifying the right kind of cryptography to implement in your application and doing it correctly.
Примеры страниц
Оглавление
Chapter 1. Is Your Website Secure from Hackers?
  1. Authentication and Authorization
  2. Database Interaction
  3. Files and Resources
  4. CMS, Framework, and Other Components
  5. Final Note
  6. Additional resources
Chapter 2. Basic Intrusion Detection with Expose
  1. What Is an IDS and Why You Should Use One
  2. Advantages, Limitations, and Disadvantages of Expose
  3. Expose Installation Run Through
  4. Logging, Alerting, and Thresholds
  5. Next Steps
  6. Conclusion
Chapter 3. DeLoreans, Data, and Hacking Sites
  1. Introduction
  2. What Is SQLi?
  3. Identifying Potential SQL Injection
  4. “Hacking” Your Own Sites
  5. Prepared Statements
  6. Conclusion
Chapter 4. Drupal Security: How Open Source Strengths Manage Software Vulnerabilities
  1. Drupal 8
  2. Keeping a Drupal Site Secure
  3. Drupal Security Team
  4. Software Vulnerabilities
  5. Reporting a Drupal Security Issue
  6. Handling Drupal Security Issues
  7. Security Advisory
  8. The Drupal Security Team Welcomes New Members
  9. Open Source
Chapter 5. Mastering OAuth 2.0
  1. Let’s Jump In
  2. Preparing for OAuth
  3. Integrating with Instagram
  4. A Brief History of Web Authorization
  5. What is OAuth 2.0?
  6. Toward a More Secure Web
Chapter 6. Keep Your Passwords Hashed and Salted
  1. Introduction
  2. Rule One: No Plain Text
  3. What is Hashing?
  4. How to Use Hashes
  5. Techniques Crackers Employ to Break Hashes
  6. Salting Passwords
  7. Use Proper Salt
  8. Hashing Algorithms
  9. Better Algorithms
  10. Hashing in PHP
  11. Password-Related Functions in Modern PHP
  12. Summary
Chapter 7. Learn from the Enemy: Securing Your Web Services, Part One
  1. It Happens
  2. Web Services are Different
  3. Learn from the Master
  4. Looking Forward
  5. Additional Reading
Chapter 8. Security Architecture: Securing your Web Services, Part Two
  1. Web Service Security
  2. Your Security Architecture
  3. Security Implementation
Chapter 9. Implementing Cryptography
  1. Use the Encryption Library
  2. Randomness
  3. Using Randomness
  4. The Session Token
  5. Encrypting and Decrypting a String
  6. Involving Experts
  7. Additional Reading
Download
Rutracker.org не распространяет и не хранит электронные версии произведений, а лишь предоставляет доступ к создаваемому пользователями каталогу ссылок на торрент-файлы, которые содержат только списки хеш-сумм
Как скачивать? (для скачивания .torrent файлов необходима регистрация)
[Профиль]  [ЛС] 
 
Ответить
Loading...
Error