Record ID | marc_openlibraries_sanfranciscopubliclibrary/sfpl_chq_2018_12_24_run05.mrc:151686926:3373 |
Source | marc_openlibraries_sanfranciscopubliclibrary |
Download Link | /show-records/marc_openlibraries_sanfranciscopubliclibrary/sfpl_chq_2018_12_24_run05.mrc:151686926:3373?format=raw |
LEADER: 03373cam a2200517 i 4500
001 884440194
003 OCoLC
005 20151005125313.0
008 140718s2015 nyua b 001 0 eng
010 $a2014028224
020 $a9780071835886$q(paperback)
020 $a0071835881$q(paperback)
035 $a884440194
035 $a(OCoLC)891670163
040 $aDLC$beng$erda$cUBY$dYDXCP$dOCLCQ$dOCLCF$dSFR$dUtOrBLW
042 $apcc
049 $aSFRA
050 00 $aQA76.73.J38$bM3445 2015
082 00 $a006.7/6$223
092 $a006.76$bM3143i
100 1 $aManico, Jim,$eauthor.
245 10 $aIron-clad Java :$bbuilding secure web applications /$cJim Manico, August Detlefsen.
264 1 $aNew York :$bMcGraw-Hill Education,$c2015.
300 $axvii, 282 pages :$billustrations ;$c24 cm
336 $atext$btxt$2rdacontent
337 $aunmediated$bn$2rdamedia
338 $avolume$bnc$2rdacarrier
504 $aIncludes bibliographical references and index.
520 $a"This Oracle Press guide provides expert tips and techniques for building more secure Java-based Web applications. Iron-Clad Java: Building Secure Web Applications describes the use of several OWASP, Oracle, Apache, and Google open-source Java projects that are essential tools needed to construct a secure web application with the Java programming language. You'll learn best practices for authentication and access control, defense for cross-site scripting and cross-site request forgery, cryptographic storage, and injection protection. Using the practical advice, best practices, and real-world examples provided in this authoritative resource, you'll gain software engineering techniques for increasing security. Tech edited by Java Security Director, Milton Smith Shows how to build secure Java Web applications using leading industry tools and techniques Code examples from the book available free for download "--$cProvided by publisher.
500 $a"Oracle Press."
505 0 $aChapter 1: Web Application Security Basics -- Chapter 2. Authentication and Session Management -- Chapter 3: Access Control -- Chapter 4: Cross-Site Scripting Defense -- Chapter 5: Cross-Site Request Forgery Defense and Clickjacking -- Chapter 6: Protecting Sensitive Data -- Chapter 7: SQL Injection and other Injection Attacks -- Chapter 8: Safe File Upload and File I/O -- Chapter 9: Logging, error handling, and Intrusion Detection -- Chapter 10: Secure Software Development Lifecycle.
650 0 $aWeb applications.
650 0 $aJava (Computer program language)
700 1 $aDetlefsen, August,$eauthor.
907 $a.b29675984$b12-20-18$c02-11-15
998 $axbt$b04-07-15$cm$da $e-$feng$gnyu$h0$i0
957 00 $aOCLC reclamation of 2017-18
907 $a.b29675984$b04-21-15$c02-11-15
938 $aYBP Library Services$bYANK$n11726624
956 $aPre-reclamation 001 value: ocn891670163
980 $a0415 sh jb
998 $axbt$b04-07-15$cm$da$e-$feng$gnyu$h0$i0
994 $aC0$bSFR
999 $yMARS
945 $a006.76$bM3143i$d - - $e03-06-2018 14:45$f0$g0$h04-21-18$i31223108730095$j503$0800$k - - $lxbtci$o-$p$40.00$q-$r-$s- $t1$u3$v5$w0$x2$y.i81458599$z04-20-15
945 $a006.76$bM3143i$d - - $e11-20-2018 17:31$f0$g0$h11-29-18$i31223108730103$j503$0503$k - - $lxbtci$o-$p$40.00$q-$r-$s- $t1$u7$v3$w1$x2$y.i81458605$z04-20-15