๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Identity and data security for web development: best practices

โœ Scribed by LeBlanc, Jonathan;Messerschmidt, Tim


Publisher
O'Reilly Media
Year
2016
Tongue
English
Leaves
203
Edition
First edition
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


"Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don't understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical guide, you'll learn how and why everyone working on a system needs to ensure that users and data are protected. Authors Jonathan LeBlanc and Tim Messerschmidt provide a deep dive into the concepts, technology, and programming methodologies necessary to build a secure interface for data and identity-without compromising usability. You'll learn how to plug holes in existing systems, protect against viable attack vectors, and work in environments that sometimes are naturally insecure. Understand the state of web and application security today Design security password encryption, and combat password attack vectors Create digital fingerprints to identify users through browser, device, and paired device detection Build secure data transmission systems through OAuth and OpenID Connect Use alternate methods of identification for a second factor of authentication Harden your web applications against attack Create a secure data transmission system using SSL/TLS, and synchronous and asynchronous cryptography."--from Publisher.;Introduction -- Password encryption, hashing, and salting -- Identity security fundamentals -- Securing the login with OAuth 2 and OpenID connect -- Alternate methods of identification -- Hardening web applications -- Data transmission security.

โœฆ Table of Contents


Introduction --
Password encryption, hashing, and salting --
Identity security fundamentals --
Securing the login with OAuth 2 and OpenID connect --
Alternate methods of identification --
Hardening web applications --
Data transmission security.

โœฆ Subjects


Business enterprises--Computer networks--Security measures;Computer networks--Security measures;Electronic information resources--Access control;Web site development;Business enterprises -- Computer networks -- Security measures;Computer networks -- Security measures;Electronic information resources -- Access control


๐Ÿ“œ SIMILAR VOLUMES


Identity and data security for web devel
โœ LeBlanc, Jonathan;Messerschmidt, Tim ๐Ÿ“‚ Library ๐Ÿ“… 2016 ๐Ÿ› O'Reilly Media ๐ŸŒ English

"Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don't understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical g

Identity and Data Security for Web Devel
โœ Jonathan LeBlanc, Tim Messerschmidt ๐Ÿ“‚ Library ๐Ÿ“… 2016 ๐Ÿ› O'Reilly Media ๐ŸŒ English

Balancing usability and security when building a website or app can be incredibly difficult. This practical book teaches you a results-driven approach for accomplishing both without compromising either. Not only will you learn what to be aware of when building your systems, but also how to build a s

Identity and Data Security for Web Devel
โœ Jonathan LeBlanc, Tim Messerschmidt ๐Ÿ“‚ Library ๐Ÿ“… 2016 ๐Ÿ› O'Reilly Media ๐ŸŒ English

Balancing usability and security when building a website or app can be incredibly difficult. This practical book teaches you a results-driven approach for accomplishing both without compromising either. Not only will you learn what to be aware of when building your systems, but also how to build a s

Collaborative Web development: strategie
โœ Burdman, Jessica ๐Ÿ“‚ Library ๐Ÿ“… 1999 ๐Ÿ› Addison-Wesley Professional ๐ŸŒ English

In Collaborative Web Development, author Jessica Burdman shares the successful secrets of managing a web project, including collaboration, communication, and budgeting. The book provides many case studies of both successful and unsuccessful Web sites, and will help web-project managers pick and mana

Core Security Patterns: Best Practices a
โœ Christopher Steel, Ramesh Nagappan, Ray Lai ๐Ÿ“‚ Library ๐Ÿ“… 2005 ๐Ÿ› Prentice Hall ๐ŸŒ English

For Web architects, developers, and project managers, this manual on internet applications and services security demonstrates security design for J2EE enterprise applications, Web services, identity management, service provisioning, and personal identification solutions. It provides 23 patterns and