000 | 03042nam a22003735i 4500 | ||
---|---|---|---|
001 | 284731 | ||
003 | MX-SnUAN | ||
005 | 20160429154336.0 | ||
007 | cr nn 008mamaa | ||
008 | 150903s2005 xxu| o |||| 0|eng d | ||
020 |
_a9781430200574 _99781430200574 |
||
024 | 7 |
_a10.1007/9781430200574 _2doi |
|
035 | _avtls000336597 | ||
039 | 9 |
_a201509030301 _bVLOAD _c201404300319 _dVLOAD _y201402041353 _zstaff |
|
040 |
_aMX-SnUAN _bspa _cMX-SnUAN _erda |
||
050 | 4 | _aQA76.758 | |
100 | 1 |
_aSnyder, Chris. _eautor _9311467 |
|
245 | 1 | 0 |
_aPro PHP Security / _cby Chris Snyder, Michael Southwell. |
264 | 1 |
_aBerkeley, CA : _bApress, _c2005. |
|
300 |
_axxviii, 528 páginas _brecurso en línea. |
||
336 |
_atexto _btxt _2rdacontent |
||
337 |
_acomputadora _bc _2rdamedia |
||
338 |
_arecurso en línea _bcr _2rdacarrier |
||
347 |
_aarchivo de texto _bPDF _2rda |
||
500 | _aSpringer eBooks | ||
505 | 0 | _aThe Importance of Security -- Why Is Secure Programming a Concern? -- Maintaining a Secure Environment -- Dealing with Shared Hosts -- Maintaining Separate Development and Production Environments -- Keeping Software Up to Date -- Using Encryption I: Theory -- Using Encryption II: Practice -- Securing Network Connections I: SSL -- Securing Network Connections II: SSH -- Controlling Access I: Authentication -- Controlling Access II: Permissions and Restrictions -- Practicing Secure PHP Programming -- Validating User Input -- Preventing SQL Injection -- Preventing Cross-Site Scripting -- Preventing Remote Execution -- Enforcing Security for Temporary Files -- Preventing Session Hijacking -- Practicing Secure Operations -- Allowing Only Human Users -- Verifying Your Users’ Identities -- Using Roles to Authorize Actions -- Adding Accountability to Track Your Users -- Preventing Data Loss -- Safely Executing System Commands -- Handling Remote Procedure Calls Safely -- Taking Advantage of Peer Review. | |
520 | _aPro PHP Security is one of the first books devoted solely to PHP security. It will serve as your complete guide for taking defensive and proactive security measures within your PHP applications. The methods discussed are compatible with PHP versions 3, 4, and 5. The knowledge you’ll gain from this comprehensive guide will help you prevent attackers from potentially disrupting site operation or destroying data. And you’ll learn about various security measures, for example, creating and deploying "captchas," validating e-mail, fending off SQL injection attacks, and preventing cross-site scripting attempts. | ||
590 | _aPara consulta fuera de la UANL se requiere clave de acceso remoto. | ||
700 | 1 |
_aSouthwell, Michael. _eautor _9311469 |
|
710 | 2 |
_aSpringerLink (Servicio en línea) _9299170 |
|
776 | 0 | 8 |
_iEdición impresa: _z9781590595084 |
856 | 4 | 0 |
_uhttp://remoto.dgb.uanl.mx/login?url=http://dx.doi.org/10.1007/978-1-4302-0057-4 _zConectar a Springer E-Books (Para consulta externa se requiere previa autentificación en Biblioteca Digital UANL) |
942 | _c14 | ||
999 |
_c284731 _d284731 |