Normal view MARC view ISBD view

Secure web application development : a hands-on guide with Python and Django

By: Baker, Matthew.
Publisher: New York : Apress, 2022Description: xxi, 462 p. ; ill., 23 cm.ISBN: 9781484285954.Subject(s): Computer networks | Security measures | Web applications Development | Django | Cyberattacks | API keys | Billion Laughs attack | Content serurity policy | Django authorization | Elastalert | Google Authenticator | HTTP | JSON Web Tol Linux | OAuth2 | Reverse proxy | Session cookies | Trust boundary | Vagrant | Web Authentication API | XML external entities(XXE)DDC classification: 005.8 Summary: Cyberattacks are becoming more commonplace and the Open Web Application Security Project (OWASP), estimates 94% of sites have flaws in their access control alone. Attacks evolve to work around new defenses, and defenses must evolve to remain effective. Developers need to understand the fundamentals of attacks and defenses in order to comprehend new techniques as they become available. This book teaches you how to write secure web applications. The focus is highlighting how hackers attack applications along with a broad arsenal of defenses. This will enable you to pick appropriate techniques to close vulnerabilities while still providing users with their needed functionality.
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Call number Status Date due Barcode
Books 005.8 BAK (Browse shelf) Available 034172

Includes bibliographical references and index.

Cyberattacks are becoming more commonplace and the Open Web Application Security Project (OWASP), estimates 94% of sites have flaws in their access control alone. Attacks evolve to work around new defenses, and defenses must evolve to remain effective. Developers need to understand the fundamentals of attacks and defenses in order to comprehend new techniques as they become available. This book teaches you how to write secure web applications. The focus is highlighting how hackers attack applications along with a broad arsenal of defenses. This will enable you to pick appropriate techniques to close vulnerabilities while still providing users with their needed functionality.

There are no comments for this item.

Log in to your account to post a comment.

Powered by Koha