Web Security for Developers Real Threats Practical Defense 1st Edition by Malcolm Mcdonald – Ebook PDF Instant Download/Delivery: 9781593279950 ,1593279957
Full download Web Security for Developers Real Threats Practical Defense 1st Edition after payment
Product details:
ISBN 10: 1593279957
ISBN 13: 9781593279950
Author: Malcolm Mcdonald
Web Security for Developers Real Threats Practical Defense 1st Edition Table of contents:
1 LET’S HACK A WEBSITE
Software Exploits and the Dark Web
How to Hack a Website
Part I: The Basics
2 HOW THE INTERNET WORKS
The Internet Protocol Suite
Application Layer Protocols
Stateful Connections
Encryption
Summary
3 HOW BROWSERS WORK
Web Page Rendering
JavaScript
Before and After Rendering: Everything Else the Browser Does
Summary
4 HOW WEB SERVERS WORK
Static and Dynamic Resources
Static Resources
Dynamic Resources
Summary
5 HOW PROGRAMMERS WORK
Phase 1: Design and Analysis
Phase 2: Writing Code
Phase 3: Pre-Release Testing
Phase 4: The Release Process
Phase 5: Post-Release Testing and Observation
Dependency Management
Summary
Part II: The Threats
6 INJECTION ATTACKS
SQL Injection
Command Injection
Remote Code Execution
File Upload Vulnerabilities
Summary
7 CROSS-SITE SCRIPTING ATTACKS
Stored Cross-Site Scripting Attacks
Reflected Cross-Site Scripting Attacks
DOM-Based Cross-Site Scripting Attacks
Summary
8 CROSS-SITE REQUEST FORGERY ATTACKS
Anatomy of a CSRF Attack
Mitigation 1: Follow REST Principles
Mitigation 2: Implement Anti-CSRF Cookies
Mitigation 3: Use the SameSite Cookie Attribute
Bonus Mitigation: Require Reauthentication for Sensitive Actions
Summary
9 COMPROMISING AUTHENTICATION
Implementing Authentication
Mitigation 1: Use Third-Party Authentication
Mitigation 2: Integrate with Single Sign-On
Mitigation 3: Secure Your Own Authentication System
Summary
10 SESSION HIJACKING
How Sessions Work
How Attackers Hijack Sessions
Summary
11 PERMISSIONS
Privilege Escalation
Access Control
Directory Traversal
Summary
12 INFORMATION LEAKS
Mitigation 1: Disable Telltale Server Headers
Mitigation 2: Use Clean URLs
Mitigation 3: Use Generic Cookie Parameters
Mitigation 4: Disable Client-Side Error Reporting
Mitigation 5: Minify or Obfuscate Your JavaScript Files
Mitigation 6: Sanitize Your Client-Side Files
Stay on Top of Security Advisories
Summary
13 ENCRYPTION
Encryption in the Internet Protocol
Enabling HTTPS
Attacking HTTP (and HTTPS)
Summary
14 THIRD-PARTY CODE
Securing Dependencies
Securing Configuration
Securing the Services That You Use
Services as an Attack Vector
Summary
15 XML ATTACKS
The Uses of XML
Validating XML
XML Bombs
XML External Entity Attacks
Securing Your XML Parser
Other Considerations
Summary
16 DON’T BE AN ACCESSORY
Email Fraud
Disguising Malicious Links in Email
Clickjacking
Server-Side Request Forgery
Botnets
Summary
17 DENIAL-OF-SERVICE ATTACKS
Denial-of-Service Attack Types
Denial-of-Service Attack Mitigation
Summary
18 SUMMING UP
INDEX
People also search for Web Security for Developers Real Threats Practical Defense 1st Edition:
web security for developers pdf github
web security for developers book pdf download
web security for developers epub
web application security for developers
Tags:
Malcolm Mcdonald,Web Security,Developers,Real Threats,Practical Defense