Pro PHP Security
Main Authors: | , |
---|---|
Corporate Author: | |
Format: | eBook |
Language: | English |
Published: |
Berkeley, CA :
Apress : Imprint: Apress,
2005.
|
Edition: | 1st ed. 2005. |
Subjects: | |
Online Access: | https://doi.org/10.1007/978-1-4302-0057-4 |
Table of Contents:
- The Importance of Security
- Why Is Secure Programming a Concern?
- Maintaining a Secure Environment
- Dealing with Shared Hosts
- Maintaining Separate Development and Production Environments
- Keeping Software Up to Date
- Using Encryption I: Theory
- Using Encryption II: Practice
- Securing Network Connections I: SSL
- Securing Network Connections II: SSH
- Controlling Access I: Authentication
- Controlling Access II: Permissions and Restrictions
- Practicing Secure PHP Programming
- Validating User Input
- Preventing SQL Injection
- Preventing Cross-Site Scripting
- Preventing Remote Execution
- Enforcing Security for Temporary Files
- Preventing Session Hijacking
- Practicing Secure Operations
- Allowing Only Human Users
- Verifying Your Users' Identities
- Using Roles to Authorize Actions
- Adding Accountability to Track Your Users
- Preventing Data Loss
- Safely Executing System Commands
- Handling Remote Procedure Calls Safely
- Taking Advantage of Peer Review.