This book is intended for application developers, system administrators and operators, as well as networking professionals who need a comprehensive top-level view of web application security in order to better defend and protect both the ‘web’ and the ‘application’ against potential attacks. This book examines the most common, fundamental attack vectors and shows readers the defence techniques used to combat them.
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
Lori MacVittie has extensive development and technical architecture experience in both high-tech and enterprise organisations, in addition to network and systems administration expertise. Prior to joining F5, Lori was an award-winning technology editor at Network Computing Magazine. She holds a BS in information and computing science from the University of Wisconsin at Green Bay, and an MS in computer science from Nova Southeastern University. She is technical editor and member of the steering committee for CloudNOW, a non-profit consortium of the leading women in Cloud computing.
Secure your apps for better cybersecurity.
The web application stack a growing threat vector
Hackers are increasingly moving beyond exploiting flaws that come from mistakes in the software/hardware development process. They are now also targeting areas of the web application stack: namely, protocols and platforms. In this book, Lori MacVittie explains the importance of recognising that application security is really a stack and how this ensures that a growing threat is not ignored.
Understand the threat and learn how to defend your organisation
This book is intended for application developers, system administrators and operators, as well as networking professionals who need a comprehensive top level view of web application security in order to better defend and protect both the web and the application against potential attacks. This book examines the most common, fundamental attack vectors and shows readers the defence techniques used to combat them.
Contents
1. Introduction; 2: Attack Surface; 3. Threat Vectors; 4. Threat Mitigation; 5: Conclusion
About the author
Lori MacVittie has extensive development and technical architecture experience in both high-tech and enterprise organisations, in addition to network and systems administration expertise. Prior to joining F5, MacVittie was an award-winning technology editor at Network Computing Magazine. She is currently technical editor and a member of the steering committee for CloudNOW, a non-profit consortium of the leading women in Cloud computing.
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
EUR 6,41 per la spedizione da Regno Unito a Italia
Destinazione, tempi e costiEUR 1,94 per la spedizione da U.S.A. a Italia
Destinazione, tempi e costiDa: WeBuyBooks, Rossendale, LANCS, Regno Unito
Condizione: Very Good. Most items will be dispatched the same or the next working day. A copy that has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged. Codice articolo wbs4276616036
Quantità: 1 disponibili
Da: PBShop.store US, Wood Dale, IL, U.S.A.
PAP. Condizione: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Codice articolo L0-9781849287043
Quantità: Più di 20 disponibili
Da: PBShop.store UK, Fairford, GLOS, Regno Unito
PAP. Condizione: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Codice articolo L0-9781849287043
Quantità: Più di 20 disponibili
Da: Ria Christie Collections, Uxbridge, Regno Unito
Condizione: New. In. Codice articolo ria9781849287043_new
Quantità: Più di 20 disponibili
Da: California Books, Miami, FL, U.S.A.
Condizione: New. Codice articolo I-9781849287043
Quantità: Più di 20 disponibili
Da: THE SAINT BOOKSTORE, Southport, Regno Unito
Paperback / softback. Condizione: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days 86. Codice articolo C9781849287043
Quantità: Più di 20 disponibili
Da: moluna, Greven, Germania
Condizione: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. This book is intended for application developers, system administrators and operators, as well as networking professionals who need a comprehensive top level view of web application security in order to better defend and protect both the web and the appl. Codice articolo 448375273
Quantità: Più di 20 disponibili
Da: GreatBookPricesUK, Woodford Green, Regno Unito
Condizione: New. Codice articolo 23196086-n
Quantità: Più di 20 disponibili
Da: GreatBookPrices, Columbia, MD, U.S.A.
Condizione: As New. Unread book in perfect condition. Codice articolo 23196086
Quantità: Più di 20 disponibili
Da: GreatBookPrices, Columbia, MD, U.S.A.
Condizione: New. Codice articolo 23196086-n
Quantità: Più di 20 disponibili