Text
Iron-clad java
Anak Judul: best practices for secure java web application development.
Terdapat bibliografi dan indeks.
CONTENTS:
1. Web Application Security Basics
< >What Is Untrusted Data?
< >HTTP Security Considerations
< >< >HTTPS
< >< >HTTP/S GET Request
< >< >HTTP/S POST Request
< >< >HTTP/S Response
< >< >HTTP/S Response Headers
< >Anti-Patterns and Weaknesses
< >< >Blacklist Input Validation
< >< >Lack of Parameterized SQL
< >< >Use of Weak or Incorrect Ciphers
< >Security Controls and Positive Patterns
< >< >Verify Authentication and Authorization with Every Request
< >< >Protect Transactions with the Synchronizer Token Pattern
< >Input Validation
< >< >Input Validation Anti-Patterns: Blacklist Validation Only
< >< >Input Validation Positive Patterns: Whitelisting
< >< >Input Validation: Apache Struts
< >< >Basic Input Validation Considerations: Length of Input
< >< >Validating Numerical Input
< >< >Validating Open Text Input
< >< >Input Validation Positive Patterns: URL Validation
< >Where Do We Go from Here?
2. Authentication and Session Management
< >Registration of New Users
< >< >Preventing Automated Registration
< >The Basic Flow of the Login Process and Session Management
< >< >Login Workflow Step 1: Anonymous Session Created on First Hit
< >< >Login Workflow Step 2: Starting HTTPS and Encryption in Transit
< >< >Login Workflow Step 3: Processing and Verifying Credentials
< >< >Login Workflow Step 4: Start the User
No copy data
No other version available