<h3>Kurzbeschreibung</h3><p>PHP security, just like PHP itself, has advanced. Updated for PHP 5.3, the second edition of this authoritative PHP security book covers foundational PHP security topics like SQL injection, XSS, user authentication, and secure PHP development. Chris Snyder and Tom Myer al
Pro PHP Security: From Application Security Principles to the Implementation of XSS Defenses, Second Edition
β Scribed by Chris Snyder, Thomas Myer, Michael Southwell
- Publisher
- Apress
- Year
- 2010
- Tongue
- English
- Leaves
- 369
- Edition
- 2
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
PHP security, just like PHP itself, has advanced. Updated for PHP 5.3, the second edition of this authoritative PHP security book covers foundational PHP security topics like SQL injection, XSS, user authentication, and secure PHP development. Chris Snyder and Tom Myer also delve into recent developments like mobile security, the impact of javascript, and the advantages of recent PHP hardening efforts. Pro PHP Security, Second Edition will serve as your complete guide for taking defensive and proactive security measures within your PHP applications. Beginners in secure programming will find a lot of material on secure PHP development, the basics of encryption, secure protocols, as well as how to reconcile the demands of server-side and web application security.
β¦ Subjects
ΠΠΈΠ±Π»ΠΈΠΎΡΠ΅ΠΊΠ°;ΠΠΎΠΌΠΏΡΡΡΠ΅ΡΠ½Π°Ρ Π»ΠΈΡΠ΅ΡΠ°ΡΡΡΠ°;PHP;
π SIMILAR VOLUMES
PHP security, just like PHP itself, has advanced. Updated for PHP 5.3, the 2nd edition of this authoritative PHP security book covers foundational PHP security topics like SQL injection, XSS, user authentication, and secure PHP development. Chris Snyder and Tom Myer also delve into recent developmen
<h4>Written by leading IT security educators, this fully updated Lab Manual supplements Principles of Computer Security: CompTIA Security+ and Beyond, Second Edition </h4> <p> Principles of Computer Security Lab Manual, Second Edition , contains more than 30 labs that challenge you to solve real
Commercial, personal and sensitive information is very hard to keep secure, and technological solutions are not the only answer. In todays technology-driven environment, there is an ever-increasing demand for information delivery on various devices in the office, at home and in public places. A comp