Security for Web Developers
Using JavaScript, HTML, and CSS
Samenvatting
As a web developer, you may not want to spend time making your web app secure, but it definitely comes with the territory. This practical guide provides you with the latest information on how to thwart security threats at several levels, including new areas such as microservices. You’ll learn how to help protect your app no matter where it runs, from the latest smartphone to an older desktop, and everything in between.
Author John Paul Mueller delivers specific advice as well as several security programming examples for developers with a good knowledge of CSS3, HTML5, and JavaScript. In five separate sections, this book shows you how to protect against viruses, DDoS attacks, security breaches, and other nasty intrusions.
- Create a security plan for your organization that takes the latest devices and user needs into account
- Develop secure interfaces, and safely incorporate third-party code from libraries, APIs, and microservices
- Use sandboxing techniques, in-house and third-party testing techniques, and learn to think like a hacker
- Implement a maintenance cycle by determining when and how to update your application software
- Learn techniques for efficiently tracking security threats as well as training requirements that your organization can use
Specificaties
Inhoudsopgave
U kunt van deze inhoudsopgave een PDF downloaden
Part 1: Developing a Security Plan
1. Defining the Application Environment
2. Embracing User Needs and Expectations
Part 2: Applying Successful Coding Practices
4. Developing Successful Interfaces
5. Building Reliable Code
6. Incorporating Libraries
7. Using APIs with Care
8. Considering the Use of Microservices
Part 3: Creating Useful and Efficient Testing Strategies
9. Thinking Like a Hacker
10. Creating an API Safety Zone
11. Checking Libraries and APIs for Holes
12. Using Third-Party Testing
Part 4: Implementing a Maintenance Cycle
13. Clearly Defining Upgrade Cycles
14. Considering Update Options
15. Considering the Need for Reports
Part 5: Locating Security Resources
16. Tracking Current Security Threats
17. Getting Required Training
Index
Anderen die dit boek kochten, kochten ook
Net verschenen
Rubrieken
- aanbestedingsrecht
- aansprakelijkheids- en verzekeringsrecht
- accountancy
- algemeen juridisch
- arbeidsrecht
- bank- en effectenrecht
- bestuursrecht
- bouwrecht
- burgerlijk recht en procesrecht
- europees-internationaal recht
- fiscaal recht
- gezondheidsrecht
- insolventierecht
- intellectuele eigendom en ict-recht
- management
- mens en maatschappij
- milieu- en omgevingsrecht
- notarieel recht
- ondernemingsrecht
- pensioenrecht
- personen- en familierecht
- sociale zekerheidsrecht
- staatsrecht
- strafrecht en criminologie
- vastgoed- en huurrecht
- vreemdelingenrecht