Developers need to ensure that users and data are protected in web applications. In this best practices guide, Jonathan LeBlanc and Tim Messerschmidt look at the concepts, technology, and programming methodologies necessary to build a secure interface for data and identity - without compromising usability.
<ASIN:1491937017>
Authors: Jonathan LeBlanc and Tim Messerschmidt Publisher: O'Reilly Date: June 2016 Pages: 204 ISBN: 978-1491937013 Print: 1491937017 Kindle: B01GP09AS6 Audience: Web developers Level: Advanced Category: Web design and development
You'll learn how to plug holes in existing systems, protect against viable attack vectors, and work in environments that sometimes are naturally insecure.
- Understand the state of web and application security today
- Design security password encryption, and combat password attack vectors
- Create digital fingerprints to identify users through browser, device, and paired device detection
- Build secure data transmission systems through OAuth and OpenID Connect
- Use alternate methods of identification for a second factor of authentication
- Harden your web applications against attack
- Create a secure data transmission system using SSL/TLS, and synchronous and asynchronous cryptography
Follow @bookwatchiprog on Twitter or subscribe to I Programmer's Books RSS feed for each day's new addition to Book Watch and for new reviews.
To have new titles included in Book Watch contact: BookWatch@i-programmer.info
Software Architecture In Practice
Author: Len Bass, Dr. Paul Clements and Rick Kazman Publisher: Addison-Wesley Professional Pages: 464 ISBN: 978-0136886099 Print: 0136886094 Kindle: B094CPJ96B Audience: Software architects Rating: 4.5 Reviewer: Kay Ewbank
This is the fourth edition of a book widely regarded as a classic since its firs [ ... ]
|
Reliable Source: Lessons from a Life in Software Engineering
Author: James Bonang Date: January 2022 Pages: 608 Kindle: B09QCBVJ9V Audience: General interest Rating: 5 Reviewer: Kay Ewbank
This book combines a fun read with interesting insights into how to write reliable programs.
| More Reviews |
|