LEADER 00000cam a2200685 a 4500 001 892969608 003 OCoLC 005 20240129213017.0 006 m o d 007 cr unu|||||||| 008 141015s2015 nyua ob 001 0 eng d 019 1171074375 020 9780071835893|q(electronic bk.) 020 007183589X|q(electronic bk.) 029 1 AU@|b000057232295 029 1 DEBSZ|b41723497X 035 (OCoLC)892969608|z(OCoLC)1171074375 037 CL0500000489|bSafari Books Online 037 B565D617-FBE3-4143-A3E7-9A0C3DDAEF53|bOverDrive, Inc. |nhttp://www.overdrive.com 040 UMI|beng|epn|cUMI|dTEFOD|dB24X7|dSTF|dDEBBG|dDEBSZ|dCOO |dTEFOD|dOCLCQ|dTEFOD|dOCLCQ|dOCLCF|dTOH|dYDX|dMM9|dN$T |dOCLCO|dJTB|dOCLCO|dOCLCQ|dINARC|dOCLCO|dOCLCL 049 INap 082 04 006.7/6 082 04 006.7/6|223 099 eBook O'Reilly for Public Libraries 100 1 Manico, Jim. 245 10 Iron-clad Java :|bbuilding secure web applications /|cJim Manico, August Detlefsen.|h[O'Reilly electronic resource] 260 New York :|bMc Graw Hill Education,|c©2015. 300 1 online resource (1 volume) :|billustrations 336 text|btxt|2rdacontent 337 computer|bc|2rdamedia 338 online resource|bcr|2rdacarrier 500 Includes index. 504 Includes bibliographical references and index. 505 00 |tWeb Application Security Basics --|tAuthentication and Session Management --|tAccess Control --|tCross-Site Scripting Defense --|tCross-Site Request Forgery Defense and Clickjacking --|tProtecting Sensitive Data --|tSQL Injection and other Injection Attacks --|tSafe File Upload and File I/O --|tLogging, Error Handling, and Intrusion Detection --|tSecure Software Development Lifecycle -- |gResources. 520 This book presents the processes required to build robust and secure applications from the start and explains how to eliminate existing security bugs. Best practices for authentication, access control, data protection, attack prevention, error handling, and much more are included. Using the practical advice and real-world examples provided in this authoritative resource, you'll gain valuable secure software engineering skills. You will learn how to establish secure authentication and session management processes; implement a robust access control design for multi-tenant web applications; defend against cross-site scripting, cross-site request forgery, and clickjacking; protect sensitive data while it is stored or in transit; prevent SQL injection and other injection attacks; ensure safe file I/O and upload; use effective logging, error handling, and intrusion detection methods; follow a comprehensive secure software development lifecycle. --|cEdited summary from book. 588 0 Online resource; title from title page (Safari, viewed October 8, 2014). 590 O'Reilly|bO'Reilly Online Learning: Academic/Public Library Edition 650 0 Java (Computer program language) 650 0 Web applications|xDevelopment. 650 0 Application software|xDevelopment. 650 0 Web site development. 650 0 Web sites|xDesign. 650 6 Java (Langage de programmation) 650 6 Applications Web|xDéveloppement. 650 6 Logiciels d'application|xDéveloppement. 650 6 Sites Web|xDéveloppement. 650 6 Sites Web|xConception. 650 7 Application software|xDevelopment|2fast 650 7 Java (Computer program language)|2fast 650 7 Web site development|2fast 650 7 Web sites|xDesign|2fast 700 1 Detlefsen, August. 856 40 |uhttps://ezproxy.naperville-lib.org/login?url=https:// learning.oreilly.com/library/view/~/9780071835886/?ar |zAvailable on O'Reilly for Public Libraries 938 Internet Archive|bINAR|nironcladjavabuil0000mani 938 Books 24x7|bB247|nbks00072520 938 EBSCOhost|bEBSC|n2688909 938 YBP Library Services|bYANK|n16841115 994 92|bJFN