Web Application Security is a Stack: How to CYA (Cover Your Apps) Completely

This book is intended for application developers, system administrators and operators, as well as networking professionals who need a comprehensive top-level view of web application security in order to better defend and protect both the ‘web’ and the ‘application’ against potential attacks. This book examines the most common, fundamental attack vectors and shows readers the defence techniques used to combat them.

1125324068
Web Application Security is a Stack: How to CYA (Cover Your Apps) Completely

This book is intended for application developers, system administrators and operators, as well as networking professionals who need a comprehensive top-level view of web application security in order to better defend and protect both the ‘web’ and the ‘application’ against potential attacks. This book examines the most common, fundamental attack vectors and shows readers the defence techniques used to combat them.

19.99 In Stock
Web Application Security is a Stack: How to CYA (Cover Your Apps) Completely

Web Application Security is a Stack: How to CYA (Cover Your Apps) Completely

by Lori Mac Vittie
Web Application Security is a Stack: How to CYA (Cover Your Apps) Completely

Web Application Security is a Stack: How to CYA (Cover Your Apps) Completely

by Lori Mac Vittie

eBook

$19.99 

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers

LEND ME® See Details

Overview

This book is intended for application developers, system administrators and operators, as well as networking professionals who need a comprehensive top-level view of web application security in order to better defend and protect both the ‘web’ and the ‘application’ against potential attacks. This book examines the most common, fundamental attack vectors and shows readers the defence techniques used to combat them.


Product Details

ISBN-13: 9781849287067
Publisher: IT Governance Publishing
Publication date: 02/17/2015
Series: Fundamentals Series , #1
Sold by: Barnes & Noble
Format: eBook
Pages: 71
File size: 542 KB

About the Author

Lori MacVittie has extensive development and technical architecture experience in both high-tech and enterprise organisations, in addition to network and systems administration expertise. Prior to joining F5, Lori was an award-winning technology editor at Network Computing Magazine. She holds a BS in information and computing science from the University of Wisconsin at Green Bay, and an MS in computer science from Nova Southeastern University. She is technical editor and member of the steering committee for CloudNOW, a non-profit consortium of the leading women in Cloud computing.


Lori Mac Vittie has extensive development and technical architecture experience in both high-tech and enterprise organisations , in addition to network and systems administration expertise. Prior to joining F5, Lori was an award-winning technology editor at Network Computing Magazine. She holds a BS in information and computing science from the University of Wisconsin at Green Bay, and an MS in computer science from Nova Southeastern University. She is technical editor and member of the steering committee for CloudNOW, a non-profit consortium of the leading women in Cloud computing.

Table of Contents

1: Introduction

2: Attack Surface

3: Threat Vectors

4: Threat Mitigation

5: Conclusion

From the B&N Reads Blog

Customer Reviews