Secure web application development : a hands-on guide with Python and Django / Matthew Baker.
2022
TK5105.59 .B37 2022
Linked e-resources
Linked Resource
Online Access
Concurrent users
Unlimited
Authorized users
Authorized users
Document Delivery Supplied
Can lend chapters, not whole ebooks
Details
Title
Secure web application development : a hands-on guide with Python and Django / Matthew Baker.
Author
Baker, Matthew, author.
Edition
[First edition].
ISBN
9781484285961 electronic book
1484285964 electronic book
9781484285954
1484285956
1484285964 electronic book
9781484285954
1484285956
Published
New York, NY : Apress, [2022]
Language
English
Description
1 online resource (471 pages) : illustrations
Item Number
10.1007/978-1-4842-8596-1 doi
Call Number
TK5105.59 .B37 2022
Dewey Decimal Classification
005.8
Summary
Cyberattacks are becoming more commonplace and the Open Web Application Security Project (OWASP), estimates 94% of sites have flaws in their access control alone. Attacks evolve to work around new defenses, and defenses must evolve to remain effective. Developers need to understand the fundamentals of attacks and defenses in order to comprehend new techniques as they become available. This book teaches you how to write secure web applications. The focus is highlighting how hackers attack applications along with a broad arsenal of defenses. This will enable you to pick appropriate techniques to close vulnerabilities while still providing users with their needed functionality.
Bibliography, etc. Note
Includes bibliographical references and index.
Access Note
Access limited to authorized users.
Source of Description
Description based on online resource; title from digital title page (viewed on November 10, 2022).
Available in Other Form
Print version: 9781484285954
Linked Resources
Online Access
Record Appears in
Online Resources > Ebooks
All Resources
All Resources
Table of Contents
1. Introduction
2. The Hands-On Environment
3. Threat Modelling
4. Transport and Encryption
5. Installing and Configuring Services
6. APIs and Endpoints
7. Cookies and User Input
8. Cross-Site Requests
9. Password Management.-10. Authentication and Authorization
11. OAuth2
12. Logging and Monitoring
13. Third-Party and Supply Chain Security
14. Further Resources.
2. The Hands-On Environment
3. Threat Modelling
4. Transport and Encryption
5. Installing and Configuring Services
6. APIs and Endpoints
7. Cookies and User Input
8. Cross-Site Requests
9. Password Management.-10. Authentication and Authorization
11. OAuth2
12. Logging and Monitoring
13. Third-Party and Supply Chain Security
14. Further Resources.