Pro PHP Security: From Application Security Principles to the Implementation of XSS Defenses

Pro PHP Security: From Application Security Principles to the Implementation of XSS Defenses

Pro PHP Security: From Application Security Principles to the Implementation of XSS Defenses

Pro PHP Security: From Application Security Principles to the Implementation of XSS Defenses

eBook2nd ed. (2nd ed.)

$52.49  $69.99 Save 25% Current price is $52.49, Original price is $69.99. You Save 25%.

Available on Compatible NOOK Devices and the free NOOK Apps.
WANT A NOOK?  Explore Now

Related collections and offers


Overview

PHP security, just like PHP itself, has advanced. Updated for PHP 5.3, the second edition of this authoritative PHP security book covers foundational PHP security topics like SQL injection, XSS, user authentication, and secure PHP development. Chris Snyder and Tom Myer also delve into recent developments like mobile security, the impact of JavaScript, and the advantages of recent PHP hardening efforts.

Pro PHP Security, Second Edition will serve as your complete guide for taking defensive and proactive security measures within your PHP applications. Beginners in secure programming will find a lot of material on secure PHP development, the basics of encryption, secure protocols, as well as how to reconcile the demands of server-side and web application security.


Product Details

ISBN-13: 9781430233190
Publisher: Apress
Publication date: 07/29/2011
Sold by: Barnes & Noble
Format: eBook
Pages: 368
File size: 1 MB

About the Author

Chris Snyder is a software engineer at the Fund for the City of New York, where he helps develop next-generation websites and services for nonprofit organizations. He is a member of the executive board of New York PHP, and has been looking for new ways to build scriptable, linked, multimedia content since he saw his first Hypercard stack in 1988.

Table of Contents

The Importance of Security.- Why Is Secure Programming a Concern?.- Practicing Secure PHP Programming.- Validating and Sanitizing User Input.- Preventing SQL Injection.- Preventing Cross-Site Scripting.- Preventing Remote Execution.- Enforcing Security for Temporary Files.- Preventing Session Hijacking.- Securing REST Services.- Practicing Secure Operations.- Using CAPTCHAs.- User Authentication, Authorization, and Logging.- Preventing Data Loss.- Safe Execution of System and Remote Procedure Calls.- Creating a Safe Environment.- Securing Unix.- Securing Your Database.- Using Encryption.- Securing Network Connections: SSL and SSH.- Final Recommendations.
From the B&N Reads Blog

Customer Reviews