Pro PHP Security
Autores principales: | , |
---|---|
Autor Corporativo: | |
Formato: | eBook |
Lenguaje: | English |
Publicado: |
Berkeley, CA :
Apress : Imprint: Apress,
2005.
|
Edición: | 1st ed. 2005. |
Materias: | |
Acceso en línea: | https://doi.org/10.1007/978-1-4302-0057-4 |
Tabla de Contenidos:
- The Importance of Security
- Why Is Secure Programming a Concern?
- Maintaining a Secure Environment
- Dealing with Shared Hosts
- Maintaining Separate Development and Production Environments
- Keeping Software Up to Date
- Using Encryption I: Theory
- Using Encryption II: Practice
- Securing Network Connections I: SSL
- Securing Network Connections II: SSH
- Controlling Access I: Authentication
- Controlling Access II: Permissions and Restrictions
- Practicing Secure PHP Programming
- Validating User Input
- Preventing SQL Injection
- Preventing Cross-Site Scripting
- Preventing Remote Execution
- Enforcing Security for Temporary Files
- Preventing Session Hijacking
- Practicing Secure Operations
- Allowing Only Human Users
- Verifying Your Users' Identities
- Using Roles to Authorize Actions
- Adding Accountability to Track Your Users
- Preventing Data Loss
- Safely Executing System Commands
- Handling Remote Procedure Calls Safely
- Taking Advantage of Peer Review.