Secure development for mobile apps how to design and code secure mobile applications with PHP and JavaScript

"Preface Amazingly, I grew up in the country and we never locked the doors to our house, or our cars. In school, no one broke into someone else's car or locker. If you put something down, you could pretty much rely on it being there when you got back. Family entered without knocking, and n...

Full description

Bibliographic Details
Main Author: Glaser, J. D.
Format: eBook
Language:English
Published: Boca Raton Auerbach Publications 2014
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 04446nmm a2200589 u 4500
001 EB002066981
003 EBX01000000000000001207071
005 00000000000000.0
007 cr|||||||||||||||||||||
008 220922 ||| eng
020 |a 1322637776 
020 |a 9781482209044 
020 |a 1482209047 
020 |a 9781322637778 
050 4 |a QA76.9.A25 
100 1 |a Glaser, J. D. 
245 0 0 |a Secure development for mobile apps  |b how to design and code secure mobile applications with PHP and JavaScript  |c author, J.D. Glaser 
260 |a Boca Raton  |b Auerbach Publications  |c 2014 
300 |a 1 online resource 
505 0 |a Front Cover; Contents; Foreword; Introduction; Industry Analysis; Preface; Acknowledgments; Biography; Chapter 1: Introduction to Mobile Security Development; Chapter 2: Web Application Attack Surface; Chapter 3: PHP Security Anti-Patterns; Chapter 4: PHP Essential Security; Chapter 5: PHP Security Tools Overview; Chapter 6: UTF-8 for PHP and MySQL; Chapter 7: Project Layout Template; Chapter 8: Separation of Concerns; Chapter 9: PHP and PDO; Chapter 10: Template Strategy Patterns; Chapter 11: Modern PHP Encryption; Chapter 12: Professional Exception and Error Handling 
505 0 |a Includes bibliographical references and index 
505 0 |a Chapter 13: Secure Session ManagementChapter 14: Secure Session Storage; Chapter 15: Secure Forms and Account Registration; Chapter 16: Secure Client Server Form Validation; Chapter 17: Secure File Uploading; Chapter 18: Secure JSON Requests; Chapter 19: Google Maps, YouTube, and jQuery Mobile; Chapter 20: Twitter Authentication and SSL cURL; Chapter 21: Secure AJAX Shopping Cart; Chapter 22: Common Facebook Canvas Vulnerability Points; Appendix; Back Cover 
653 |a Logiciels d'application / Développement 
653 |a Mobile computing / Security measures 
653 |a COMPUTERS / Programming / Games / bisacsh 
653 |a PHP (Computer program language) / fast 
653 |a JavaScript (Computer program language) / http://id.loc.gov/authorities/subjects/sh96004880 
653 |a PHP (Computer program language) / http://id.loc.gov/authorities/subjects/sh99002710 
653 |a Application software / Development / fast 
653 |a COMPUTERS / Internet / General / bisacsh 
653 |a JavaScript (Langage de programmation) 
653 |a JavaScript (Computer program language) / fast 
653 |a COMPUTERS / Software Development & Engineering / General / bisacsh 
653 |a Informatique mobile / Sécurité / Mesures 
653 |a Portable computers / Programming / http://id.loc.gov/authorities/subjects/sh85105057 
653 |a Radiocommunications mobiles / Sécurité / Mesures 
653 |a PHP (Langage de programmation) 
653 |a Mobile communication systems / Security measures 
653 |a Application software / Development / http://id.loc.gov/authorities/subjects/sh95009362 
653 |a Portable computers / Programming / fast 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
015 |a GBB4D9289 
776 |z 1482209039 
776 |z 9781482209037 
776 |z 1482209047 
776 |z 9781482209044 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781482209037/?ar  |x Verlag  |3 Volltext 
082 0 |a 384 
082 0 |a 005.256 
082 0 |a 620 
520 |a "Preface Amazingly, I grew up in the country and we never locked the doors to our house, or our cars. In school, no one broke into someone else's car or locker. If you put something down, you could pretty much rely on it being there when you got back. Family entered without knocking, and non-family never tried. This is no longer the case. Now, even though my house and car are locked, the virtual windows to my life, as well as a basement door I didn't even know existed, are open and under attack thanks to the internet. Now the situation is reversed. Family needs to knock several times before using the secret handshake thingy, and strangers enter anonymously and unannounced into my whatever. Security is something I wish I could do without. The business of building cool things as fast as possible without regard to consequence of theft is far more interesting. Out of necessity, security became a priority. What follows is some of what I've learned along the way. If any of these bits and bytes end up helping to protect you, then I win. I hope you enjoy the book."--