Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 2 of 2 matches in All Departments
PHP security, just like PHP itself, has advanced. Updated for PHP 5.3, the second edition of this authoritative PHP security book coversfoundational PHP securitytopics like SQL injection, XSS, user authentication, and secure PHP development. Chris Snyder and Tom Myer also delve into recent developments like mobile security, the impact of JavaScript, and the advantages of recent PHP hardening efforts. Pro PHP Security, Second Edition will serve as your complete guide for taking defensive and proactive security measures within your PHP applications. Beginners in secure programming will find a lot of material on secure PHP development, the basics of encryption, secure protocols, as well as how to reconcile the demands of server-side and web application security. What you'll learn Secure PHP development principles PHP web application security User and file security Mobile security Encryption and secure protocols Dealing with JavaScript Who this book is for Pro PHP Security appeals to all intermediate and advanced PHP programmers who need to keep websites safe. It also contains material of interest to all who are concerned with web application security. Table of Contents Why Is Secure Programming a Concern? Validating and Sanitizing User Input Preventing SQL Injection Preventing Cross-Site Scripting Preventing Remote Execution Enforcing Security for Temporary Files Preventing Session Hijacking Securing REST Services Using CAPTCHAs User Authentication, Authorization, and Logging Preventing Data Loss Safe Execution of System and Remote Procedure Calls Securing Unix Securing Your Database Using Encryption Securing Network Connections: SSL and SSH Final Recommendations
"Pro PHP Security" is one of the first books devoted solely to PHP security. It will serve as your complete guide for taking defensive and proactive security measures within your PHP applications. (And the methods discussed are compatible with PHP versions 3, 4, and 5.) The knowledge you'll gain from this comprehensive guide will help you prevent attackers from potentially disrupting site operation or destroying data. And you'll learn about various security measures, for example, creating and deploying "captchas," validating e-mail, fending off SQL injection attacks, and preventing cross-site scripting attempts.
|
You may like...
|