• Tous les prix incluent la TVA.
En stock.
Expédié et vendu par Amazon. Emballage cadeau disponible.
Quantité :1
Pro PHP Security: From Ap... a été ajouté à votre Panier
+ EUR 2,99 (livraison)
D'occasion: Bon | Détails
Vendu par momox fr
État: D'occasion: Bon
Commentaire: En Stock.
Vous l'avez déjà ?
Repliez vers l'arrière Repliez vers l'avant
Ecoutez Lecture en cours... Interrompu   Vous écoutez un extrait de l'édition audio Audible
En savoir plus
Voir cette image

Pro PHP Security: From Application Security Principles to the Implementation of XSS Defenses (Anglais) Broché – 10 décembre 2010

Voir les formats et éditions Masquer les autres formats et éditions
Prix Amazon
Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
"Veuillez réessayer"
EUR 51,64
EUR 51,61 EUR 30,42

Offres spéciales et liens associés

Descriptions du produit

Présentation de l'éditeur

PHP security, just like PHP itself, has advanced. Updated for PHP 5.3, the second edition of this authoritative PHP security book covers foundational PHP security topics like SQL injection, XSS, user authentication, and secure PHP development. Chris Snyder and Tom Myer also dive into recent developments like mobile security, the impact of Javascript, and the advantages of recent PHP hardening efforts. Pro PHP Security will serve as your complete guide for taking defensive and proactive security measures within your PHP applications. Beginners in secure programming will find a lot of material on secure PHP development, the basics of encryption, secure protocols, as well as how to reconcile the demands of server side and web application security. What you'll learn Secure PHP Development Principles PHP Web Application Security User and file security Mobile Security Encryption and Secure Protocols Dealing with Javascript Who this book is for Pro PHP Security appeals to all intermediate and advanced PHP programmers who need to keep websites safe. It also contains material of interest to all who are concerned with web application security.

Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.

  • Apple
  • Android
  • Windows Phone
  • Android

Pour obtenir l'appli gratuite, saisissez votre adresse e-mail ou numéro de téléphone mobile.

Détails sur le produit

En savoir plus sur l'auteur

Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

Dans ce livre

(En savoir plus)
Parcourir les pages échantillon
Couverture | Copyright | Table des matières | Extrait | Index
Rechercher dans ce livre:

Commentaires en ligne

Il n'y a pas encore de commentaires clients sur Amazon.fr
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoiles

Commentaires client les plus utiles sur Amazon.com (beta)

Amazon.com: HASH(0x9e1d4ea0) étoiles sur 5 7 commentaires
5 internautes sur 5 ont trouvé ce commentaire utile 
HASH(0x9dfd0ab0) étoiles sur 5 Great book on security 1 juin 2011
Par A Golden Eagle - Publié sur Amazon.com
Format: Broché
This was a pretty solid book on PHP web application security, and should be a part of any PHP developer's library. The author gives detailed descriptions of the most common ways in which your application can be attacked, and gives well thought out examples of how to guard against them. Here are some of the topics that you'll learn about in the book:

- SQL injection: This book gives a great overview of what SQL injection is, how to identify vulnerabilities, how to fix them, and how to test your application
- Cross-site scripting: This was a good one for me. Much of the documentation on XSS is pretty vague. The authors did a good job of providing several detailed examples of cross-site scripting attacks, and how to defend against them.
- Validating and Sanitizing input: The authors really stress the importance of validating and sanitizing any input that comes into your application. They give examples of how to create validation libraries. However, one of my main disappointments with the book was that they failed to discuss PHP's filter_var functionality.
- Captchas: What they are and how to implement them.
- Securing RESTful services: Restricting access, authenticating and authorizing requests, and enforcing quotas and rate limits.
- How to secure UNIX
- How to secure your database
- Encryption: The authors discuss keeping your passwords safe by hashing, and how to protect other sensitive data by symmetrical or asymmetrical encryption
- SSL and SSH: Securing network connections via SSL and SSH. How to generate certificates and keys.
- Securing shared hosting
- Keeping production and development environments separate
- Keeping software up to date

These are just some of the focus areas of this book. It provides even more interesting and valuable information. While this book won't make you a security expert, it will put you well on the path of proper security-minded PHP coding.
5 internautes sur 6 ont trouvé ce commentaire utile 
HASH(0x9dfd0dbc) étoiles sur 5 I enjoy the second edition 26 janvier 2011
Par Amazon Customer - Publié sur Amazon.com
Format: Broché
As a PHP web developer, I I highly recommend this book to anyone who uses PHP as parts of daily web programming tool. It is really difficult to find a book that emphasizes only on the PHP security from different approach. Fortunately, this book contains all the security perspective related to PHP.
If you bought the first edition of this book, you might be disappointment on how it was organized in the first edition; however, the second edition of this book will change your opinion forever. It is easy to follow, and the authors focus on only one specific area per chapter; as a result, it allows readers to focus on the specific security that they may either are not aware of the problems or want to get more in depth detail.
Overall, I think this book is not only good for the seasonal PHP programmers since they may only need some parts of security topics that related to their current projects but also good for the experience PHP programmer since they can use this book as reference.
I do not think this book is good for programmers who just start to learn PHP language since most of the topics in this book are for people who have worked in PHP for few years.
HASH(0x9dfd0f30) étoiles sur 5 Awesome read 19 février 2014
Par Maureenfind - Publié sur Amazon.com
Format: Format Kindle Achat vérifié
Great book with code included for tacking down major security design and implementation issues.
PHP must have for any beginning coder.
HASH(0x9dfd0ccc) étoiles sur 5 Pro PHP securioty 16 octobre 2012
Par Maxtor09 - Publié sur Amazon.com
Format: Broché Achat vérifié
Clear and complete, easy to read with nice code examples. I recommend really this book. Thanks to the author !
HASH(0x9dfd0fcc) étoiles sur 5 Thorough and well-written. 23 juillet 2014
Par Rebecca Adamson - Publié sur Amazon.com
Format: Broché Achat vérifié
Covered everything I need to know, and more.
Ces commentaires ont-ils été utiles ? Dites-le-nous

Rechercher des articles similaires par rubrique


Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?