Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.

LEADER 00000cam a2200685 a 4500 
001    892969608 
003    OCoLC 
005    20240129213017.0 
006    m     o  d         
007    cr unu|||||||| 
008    141015s2015    nyua    ob    001 0 eng d 
019    1171074375 
020    9780071835893|q(electronic bk.) 
020    007183589X|q(electronic bk.) 
029 1  AU@|b000057232295 
029 1  DEBSZ|b41723497X 
035    (OCoLC)892969608|z(OCoLC)1171074375 
037    CL0500000489|bSafari Books Online 
037    B565D617-FBE3-4143-A3E7-9A0C3DDAEF53|bOverDrive, Inc.
       |nhttp://www.overdrive.com 
040    UMI|beng|epn|cUMI|dTEFOD|dB24X7|dSTF|dDEBBG|dDEBSZ|dCOO
       |dTEFOD|dOCLCQ|dTEFOD|dOCLCQ|dOCLCF|dTOH|dYDX|dMM9|dN$T
       |dOCLCO|dJTB|dOCLCO|dOCLCQ|dINARC|dOCLCO|dOCLCL 
049    INap 
082 04 006.7/6 
082 04 006.7/6|223 
099    eBook O'Reilly for Public Libraries 
100 1  Manico, Jim. 
245 10 Iron-clad Java :|bbuilding secure web applications /|cJim 
       Manico, August Detlefsen.|h[O'Reilly electronic resource] 
260    New York :|bMc Graw Hill Education,|c©2015. 
300    1 online resource (1 volume) :|billustrations 
336    text|btxt|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
500    Includes index. 
504    Includes bibliographical references and index. 
505 00 |tWeb Application Security Basics --|tAuthentication and 
       Session Management --|tAccess Control --|tCross-Site 
       Scripting Defense --|tCross-Site Request Forgery Defense 
       and Clickjacking --|tProtecting Sensitive Data --|tSQL 
       Injection and other Injection Attacks --|tSafe File Upload
       and File I/O --|tLogging, Error Handling, and Intrusion 
       Detection --|tSecure Software Development Lifecycle --
       |gResources. 
520    This book presents the processes required to build robust 
       and secure applications from the start and explains how to
       eliminate existing security bugs. Best practices for 
       authentication, access control, data protection, attack 
       prevention, error handling, and much more are included. 
       Using the practical advice and real-world examples 
       provided in this authoritative resource, you'll gain 
       valuable secure software engineering skills. You will 
       learn how to establish secure authentication and session 
       management processes; implement a robust access control 
       design for multi-tenant web applications; defend against 
       cross-site scripting, cross-site request forgery, and 
       clickjacking; protect sensitive data while it is stored or
       in transit; prevent SQL injection and other injection 
       attacks; ensure safe file I/O and upload; use effective 
       logging, error handling, and intrusion detection methods; 
       follow a comprehensive secure software development 
       lifecycle. --|cEdited summary from book. 
588 0  Online resource; title from title page (Safari, viewed 
       October 8, 2014). 
590    O'Reilly|bO'Reilly Online Learning: Academic/Public 
       Library Edition 
650  0 Java (Computer program language) 
650  0 Web applications|xDevelopment. 
650  0 Application software|xDevelopment. 
650  0 Web site development. 
650  0 Web sites|xDesign. 
650  6 Java (Langage de programmation) 
650  6 Applications Web|xDéveloppement. 
650  6 Logiciels d'application|xDéveloppement. 
650  6 Sites Web|xDéveloppement. 
650  6 Sites Web|xConception. 
650  7 Application software|xDevelopment|2fast 
650  7 Java (Computer program language)|2fast 
650  7 Web site development|2fast 
650  7 Web sites|xDesign|2fast 
700 1  Detlefsen, August. 
856 40 |uhttps://ezproxy.naperville-lib.org/login?url=https://
       learning.oreilly.com/library/view/~/9780071835886/?ar
       |zAvailable on O'Reilly for Public Libraries 
938    Internet Archive|bINAR|nironcladjavabuil0000mani 
938    Books 24x7|bB247|nbks00072520 
938    EBSCOhost|bEBSC|n2688909 
938    YBP Library Services|bYANK|n16841115 
994    92|bJFN