000 03042nam a22003735i 4500
001 284731
003 MX-SnUAN
005 20160429154336.0
007 cr nn 008mamaa
008 150903s2005 xxu| o |||| 0|eng d
020 _a9781430200574
_99781430200574
024 7 _a10.1007/9781430200574
_2doi
035 _avtls000336597
039 9 _a201509030301
_bVLOAD
_c201404300319
_dVLOAD
_y201402041353
_zstaff
040 _aMX-SnUAN
_bspa
_cMX-SnUAN
_erda
050 4 _aQA76.758
100 1 _aSnyder, Chris.
_eautor
_9311467
245 1 0 _aPro PHP Security /
_cby Chris Snyder, Michael Southwell.
264 1 _aBerkeley, CA :
_bApress,
_c2005.
300 _axxviii, 528 páginas
_brecurso en línea.
336 _atexto
_btxt
_2rdacontent
337 _acomputadora
_bc
_2rdamedia
338 _arecurso en línea
_bcr
_2rdacarrier
347 _aarchivo de texto
_bPDF
_2rda
500 _aSpringer eBooks
505 0 _aThe Importance of Security -- Why Is Secure Programming a Concern? -- Maintaining a Secure Environment -- Dealing with Shared Hosts -- Maintaining Separate Development and Production Environments -- Keeping Software Up to Date -- Using Encryption I: Theory -- Using Encryption II: Practice -- Securing Network Connections I: SSL -- Securing Network Connections II: SSH -- Controlling Access I: Authentication -- Controlling Access II: Permissions and Restrictions -- Practicing Secure PHP Programming -- Validating User Input -- Preventing SQL Injection -- Preventing Cross-Site Scripting -- Preventing Remote Execution -- Enforcing Security for Temporary Files -- Preventing Session Hijacking -- Practicing Secure Operations -- Allowing Only Human Users -- Verifying Your Users’ Identities -- Using Roles to Authorize Actions -- Adding Accountability to Track Your Users -- Preventing Data Loss -- Safely Executing System Commands -- Handling Remote Procedure Calls Safely -- Taking Advantage of Peer Review.
520 _aPro PHP Security is one of the first books devoted solely to PHP security. It will serve as your complete guide for taking defensive and proactive security measures within your PHP applications. The methods discussed are compatible with PHP versions 3, 4, and 5. The knowledge you’ll gain from this comprehensive guide will help you prevent attackers from potentially disrupting site operation or destroying data. And you’ll learn about various security measures, for example, creating and deploying "captchas," validating e-mail, fending off SQL injection attacks, and preventing cross-site scripting attempts.
590 _aPara consulta fuera de la UANL se requiere clave de acceso remoto.
700 1 _aSouthwell, Michael.
_eautor
_9311469
710 2 _aSpringerLink (Servicio en línea)
_9299170
776 0 8 _iEdición impresa:
_z9781590595084
856 4 0 _uhttp://remoto.dgb.uanl.mx/login?url=http://dx.doi.org/10.1007/978-1-4302-0057-4
_zConectar a Springer E-Books (Para consulta externa se requiere previa autentificación en Biblioteca Digital UANL)
942 _c14
999 _c284731
_d284731