|
|
|
|
LEADER |
04446nmm a2200589 u 4500 |
001 |
EB002066981 |
003 |
EBX01000000000000001207071 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
220922 ||| eng |
020 |
|
|
|a 1322637776
|
020 |
|
|
|a 9781482209044
|
020 |
|
|
|a 1482209047
|
020 |
|
|
|a 9781322637778
|
050 |
|
4 |
|a QA76.9.A25
|
100 |
1 |
|
|a Glaser, J. D.
|
245 |
0 |
0 |
|a Secure development for mobile apps
|b how to design and code secure mobile applications with PHP and JavaScript
|c author, J.D. Glaser
|
260 |
|
|
|a Boca Raton
|b Auerbach Publications
|c 2014
|
300 |
|
|
|a 1 online resource
|
505 |
0 |
|
|a Front Cover; Contents; Foreword; Introduction; Industry Analysis; Preface; Acknowledgments; Biography; Chapter 1: Introduction to Mobile Security Development; Chapter 2: Web Application Attack Surface; Chapter 3: PHP Security Anti-Patterns; Chapter 4: PHP Essential Security; Chapter 5: PHP Security Tools Overview; Chapter 6: UTF-8 for PHP and MySQL; Chapter 7: Project Layout Template; Chapter 8: Separation of Concerns; Chapter 9: PHP and PDO; Chapter 10: Template Strategy Patterns; Chapter 11: Modern PHP Encryption; Chapter 12: Professional Exception and Error Handling
|
505 |
0 |
|
|a Includes bibliographical references and index
|
505 |
0 |
|
|a Chapter 13: Secure Session ManagementChapter 14: Secure Session Storage; Chapter 15: Secure Forms and Account Registration; Chapter 16: Secure Client Server Form Validation; Chapter 17: Secure File Uploading; Chapter 18: Secure JSON Requests; Chapter 19: Google Maps, YouTube, and jQuery Mobile; Chapter 20: Twitter Authentication and SSL cURL; Chapter 21: Secure AJAX Shopping Cart; Chapter 22: Common Facebook Canvas Vulnerability Points; Appendix; Back Cover
|
653 |
|
|
|a Logiciels d'application / Développement
|
653 |
|
|
|a Mobile computing / Security measures
|
653 |
|
|
|a COMPUTERS / Programming / Games / bisacsh
|
653 |
|
|
|a PHP (Computer program language) / fast
|
653 |
|
|
|a JavaScript (Computer program language) / http://id.loc.gov/authorities/subjects/sh96004880
|
653 |
|
|
|a PHP (Computer program language) / http://id.loc.gov/authorities/subjects/sh99002710
|
653 |
|
|
|a Application software / Development / fast
|
653 |
|
|
|a COMPUTERS / Internet / General / bisacsh
|
653 |
|
|
|a JavaScript (Langage de programmation)
|
653 |
|
|
|a JavaScript (Computer program language) / fast
|
653 |
|
|
|a COMPUTERS / Software Development & Engineering / General / bisacsh
|
653 |
|
|
|a Informatique mobile / Sécurité / Mesures
|
653 |
|
|
|a Portable computers / Programming / http://id.loc.gov/authorities/subjects/sh85105057
|
653 |
|
|
|a Radiocommunications mobiles / Sécurité / Mesures
|
653 |
|
|
|a PHP (Langage de programmation)
|
653 |
|
|
|a Mobile communication systems / Security measures
|
653 |
|
|
|a Application software / Development / http://id.loc.gov/authorities/subjects/sh95009362
|
653 |
|
|
|a Portable computers / Programming / fast
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b OREILLY
|a O'Reilly
|
015 |
|
|
|a GBB4D9289
|
776 |
|
|
|z 1482209039
|
776 |
|
|
|z 9781482209037
|
776 |
|
|
|z 1482209047
|
776 |
|
|
|z 9781482209044
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781482209037/?ar
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 384
|
082 |
0 |
|
|a 005.256
|
082 |
0 |
|
|a 620
|
520 |
|
|
|a "Preface Amazingly, I grew up in the country and we never locked the doors to our house, or our cars. In school, no one broke into someone else's car or locker. If you put something down, you could pretty much rely on it being there when you got back. Family entered without knocking, and non-family never tried. This is no longer the case. Now, even though my house and car are locked, the virtual windows to my life, as well as a basement door I didn't even know existed, are open and under attack thanks to the internet. Now the situation is reversed. Family needs to knock several times before using the secret handshake thingy, and strangers enter anonymously and unannounced into my whatever. Security is something I wish I could do without. The business of building cool things as fast as possible without regard to consequence of theft is far more interesting. Out of necessity, security became a priority. What follows is some of what I've learned along the way. If any of these bits and bytes end up helping to protect you, then I win. I hope you enjoy the book."--
|