Pro PHP Security: From Application Security Principles to the Implementation of XSS Defenses Front Cover

Pro PHP Security: From Application Security Principles to the Implementation of XSS Defenses

  • Length: 368 pages
  • Edition: 2
  • Publisher:
  • Publication Date: 2010-12-09
  • ISBN-10: 1430233184
  • ISBN-13: 9781430233183
  • Sales Rank: #1435762 (See Top 100 Books)
Description

PHP security, just like PHP itself, has advanced. Updated for PHP 5.3, the second edition of this authoritative PHP security book covers foundational PHP security topics like SQL injection, XSS, user authentication, and secure PHP development. Chris Snyder and Tom Myer also delve into recent developments like mobile security, the impact of JavaScript, and the advantages of recent PHP hardening efforts.

Pro PHP Security, Second Edition
will serve as your complete guide for taking defensive and proactive security measures within your PHP applications. Beginners in secure programming will find a lot of material on secure PHP development, the basics of encryption, secure protocols, as well as how to reconcile the demands of server-side and web application security.

What you’ll learn

  • Secure PHP development principles
  • PHP web application security
  • User and file security
  • Mobile security
  • Encryption and secure protocols
  • Dealing with JavaScript

Who this book is for

Pro PHP Security appeals to all intermediate and advanced PHP programmers who need to keep websites safe. It also contains material of interest to all who are concerned with web application security.

Table of Contents

  1. Why Is Secure Programming a Concern?
  2. Validating and Sanitizing User Input
  3. Preventing SQL Injection
  4. Preventing Cross-Site Scripting
  5. Preventing Remote Execution
  6. Enforcing Security for Temporary Files
  7. Preventing Session Hijacking
  8. Securing REST Services
  9. Using CAPTCHAs
  10. User Authentication, Authorization, and Logging
  11. Preventing Data Loss
  12. Safe Execution of System and Remote Procedure Calls
  13. Securing Unix
  14. Securing Your Database
  15. Using Encryption
  16. Securing Network Connections: SSL and SSH
  17. Final Recommendations
To access the link, solve the captcha.