Securing PHP Apps

A Practical Guide

Paperback Engels 2016 9781484221198
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

Secure your PHP-based web applications with this compact handbook. You'll get clear, practical and actionable details on how to secure various parts of your PHP web application. You'll also find scenarios to handle and improve existing legacy issues.

Is your PHP app truly secure? Let's make sure you get home on time and sleep well at night. Learn the security basics that a senior developer usually acquires over years of experience, all condensed down into one quick and easy handbook. Do you ever wonder how vulnerable you are to being hacked? Do you feel confident about storing your users' sensitive information? Imagine feeling confident in the integrity of your software when you store your users' sensitive data. No more fighting fires with lost data, no more late nights, your application is secure.

Well, this short book will answer your questions and give you confidence in being able to secure your and other PHP web apps.What You'll Learn
Never trust your users - escape all inputHTTPS/SSL/BCA/JWH/SHA and other random letters: some of them actually matterHow to handle password encryption and storage for everyoneWhat are authentication, access control, and safe file handing and how to implement themWhat are safe defaults, cross site scripting and other popular hacks Who This Book Is For

Experienced PHP coders, programmers, developers.

Specificaties

ISBN13:9781484221198
Taal:Engels
Bindwijze:paperback
Uitgever:Apress

Lezersrecensies

Wees de eerste die een lezersrecensie schrijft!

Inhoudsopgave

<div>Constructor</div><div>Format</div><div>Errata</div><div>Sample Code</div><div>About the Author</div><div>Chapter 1 - Never Trust Your Users. Sanitize ALL Input!</div><div>SQL Injection</div><div>Mass Assignment</div><div>Typecasting</div><div>Sanitizing Output<div>Chapter Two - HTTPS/SSL/BCA/JWH/SHA and Other Random Letters; Some of Them Actually Matter.</div><div>What is HTTPS</div><div>Limitations</div><div>When to use HTTPS</div><div>Implementing HTTPS</div><div>Paths</div><div>Chapter 3 - Password Encryption and Storage for Everyone</div><div>The Small Print</div><div>What is a Hash?</div>Popular Attacks</div><div>A Pinch of Salt</div><div>Hashing Algorithms</div><div>Storage</div><div>Validation</div><div>Putting It All Together</div><div>Brute Force Protection</div><div>Upgrading Legacy Systems</div><div>Resources</div><div>Chapter 4 - Authentication, Access Control, and Safe File Handing</div><div>Authentication</div><div>Access Control</div><div>Validating Redirects</div><Chapter 5 - Safe Defaults, Cross Site Scripting, and Other Popular Hacks</div><div>Never Trust Yourself - Use Safe Defaults</div><div>Never Trust Dynamic Typing. It’s Not Your Friend.</div><div>Cross Site Scripting</div><div>Attack Entry Points</div><div>Cross Site Request Forgery</div><div>Multiple Form Submits</div><div>Race Conditions</div><div>Outdated Libraries / External Programs</div><div>Destructor</div><div>About the Author</div><div>Security Audit / Consulting</div>

Managementboek Top 100

Rubrieken

    Personen

      Trefwoorden

        Securing PHP Apps