Snyder, Chris
Pro PHP Security
Part 1. The Importance of Security
1. Why Is Secure Programming a Concern?
Part 2. Maintaining a Secure Environment
2. Dealing with Shared Hosts
3. Maintaining Separate Development and Production Environments
4. Keeping Software Up to Date
5. Using Encryption I: Theory
6. Using Encryption II: Practice
7. Securing Network Connections I: SSL
8. Securing Network Connections II: SSH
9. Controlling Access I: Authentication
10. Controlling Access II: Permissions and Restrictions
Part 3. Practicing Secure PHP Programming
11. Validating User Input
12. Preventing SQL Injection
13. Preventing Cross-Site Scripting
14. Preventing Remote Execution
15. Enforcing Security for Temporary Files
16. Preventing Session Hijacking
Part 4. Practicing Secure Operations
17. Allowing Only Human Users
18. Verifying Your Users’ Identities
19. Using Roles to Authorize Actions
20. Adding Accountability to Track Your Users
21. Preventing Data Loss
22. Safely Executing System Commands
23. Handling Remote Procedure Calls Safely
24. Taking Advantage of Peer Review
Keywords: COMPUTERS / Computer Science COM014000
- Author(s)
- Snyder, Chris
- Southwell, Michael
- Publisher
- Springer
- Publication year
- 2005
- Language
- en
- Edition
- 1
- Category
- Information Technology, Telecommunications
- Format
- Ebook
- eISBN (PDF)
- 9781430200574