It looks like you're offline.
Open Library logo
additional options menu

MARC Record from marc_nuls

Record ID marc_nuls/NULS_PHC_180925.mrc:291915717:2759
Source marc_nuls
Download Link /show-records/marc_nuls/NULS_PHC_180925.mrc:291915717:2759?format=raw

LEADER: 02759cam 2200409 i 4500
001 9925210204001661
005 20150430065848.4
008 140718s2015 nyu 001 0 eng
010 $a 2014028224
019 $a875520246$a891670163
020 $a9780071835886
020 $a0071835881 (MHID)
035 $a99964773468
035 $a(OCoLC)884440194$z(OCoLC)875520246$z(OCoLC)891670163
035 $a(OCoLC)ocn884440194
040 $aDLC$beng$erda$cDLC$dYDXCP$dIAD$dBDX$dBTCTA$dOCLCF$dUBY
042 $apcc
050 00 $aQA76.73.J38$bM3445 2015
082 00 $a006.7/6$223
100 1 $aManico, Jim.
245 10 $aIron-clad Java :$bbuilding secure web applications /$cJim Manico, August Detlefsen.
264 1 $aNew York :$bMcGraw-Hill Education,$c[2015]
300 $axvii, 282 pages ;$c24 cm
336 $atext$2rdacontent
337 $aunmediated$2rdamedia
338 $avolume$2rdacarrier
500 $a"Oracle."
500 $a"Oracle Press."
500 $aIncludes index.
520 $a"This Oracle Press guide provides expert tips and techniques for building more secure Java-based Web applications. Iron-Clad Java: Building Secure Web Applications describes the use of several OWASP, Oracle, Apache, and Google open-source Java projects that are essential tools needed to construct a secure web application with the Java programming language. You'll learn best practices for authentication and access control, defense for cross-site scripting and cross-site request forgery, cryptographic storage, and injection protection. Using the practical advice, best practices, and real-world examples provided in this authoritative resource, you'll gain software engineering techniques for increasing security. Tech edited by Java Security Director, Milton Smith Shows how to build secure Java Web applications using leading industry tools and techniques Code examples from the book available free for download "--$cProvided by publisher.
504 $aIncludes bibliographical references and index.
505 8 $aMachine generated contents note: Chapter 1: Application Security Basics -- Chapter 2. Authentication and Session Management -- Chapter 3: Access Control -- Chapter 4: Cross-Site Scripting Defense -- Chapter 5: Cross-Site Request Forgery Defense and Clickjacking -- Chapter 6: Protecting Sensitive Data -- Chapter 7: SQL Injection and other Injection Attacks -- Chapter 8: Safe File Upload and File I/O -- Chapter 9: Logging and Intrusion Detection -- Chapter 10: Software Development Lifecycle and Processes -- Appendix: Resources and Standards.
650 0 $aJava (Computer program language)
650 0 $aWeb applications.
700 1 $aDetlefsen, August.
947 $hCIRCSTACKS$r31786103015068
980 $a99964773468