"Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don't understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical g
Identity and data security for web development: best practices
โ Scribed by LeBlanc, Jonathan;Messerschmidt, Tim
- Publisher
- O'Reilly Media
- Year
- 2016
- Tongue
- English
- Leaves
- 203
- Edition
- First edition
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
"Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don't understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical guide, you'll learn how and why everyone working on a system needs to ensure that users and data are protected. Authors Jonathan LeBlanc and Tim Messerschmidt provide a deep dive into the concepts, technology, and programming methodologies necessary to build a secure interface for data and identity-without compromising usability. You'll learn how to plug holes in existing systems, protect against viable attack vectors, and work in environments that sometimes are naturally insecure. Understand the state of web and application security today Design security password encryption, and combat password attack vectors Create digital fingerprints to identify users through browser, device, and paired device detection Build secure data transmission systems through OAuth and OpenID Connect Use alternate methods of identification for a second factor of authentication Harden your web applications against attack Create a secure data transmission system using SSL/TLS, and synchronous and asynchronous cryptography."--from Publisher.;Introduction -- Password encryption, hashing, and salting -- Identity security fundamentals -- Securing the login with OAuth 2 and OpenID connect -- Alternate methods of identification -- Hardening web applications -- Data transmission security.
โฆ Table of Contents
Introduction --
Password encryption, hashing, and salting --
Identity security fundamentals --
Securing the login with OAuth 2 and OpenID connect --
Alternate methods of identification --
Hardening web applications --
Data transmission security.
โฆ Subjects
Business enterprises--Computer networks--Security measures;Computer networks--Security measures;Electronic information resources--Access control;Web site development;Business enterprises -- Computer networks -- Security measures;Computer networks -- Security measures;Electronic information resources -- Access control
๐ SIMILAR VOLUMES
Balancing usability and security when building a website or app can be incredibly difficult. This practical book teaches you a results-driven approach for accomplishing both without compromising either. Not only will you learn what to be aware of when building your systems, but also how to build a s
Final version.
Balancing usability and security when building a website or app can be incredibly difficult. This practical book teaches you a results-driven approach for accomplishing both without compromising either. Not only will you learn what to be aware of when building your systems, but also how to build a s
In Collaborative Web Development, author Jessica Burdman shares the successful secrets of managing a web project, including collaboration, communication, and budgeting. The book provides many case studies of both successful and unsuccessful Web sites, and will help web-project managers pick and mana
For Web architects, developers, and project managers, this manual on internet applications and services security demonstrates security design for J2EE enterprise applications, Web services, identity management, service provisioning, and personal identification solutions. It provides 23 patterns and