Web security a whitehat perspective
In late 2013, approximately 40 million customer debit and credit cards were leaked in a data breach at Target. This catastrophic event, deemed one of the biggest data breaches ever, clearly showed that many companies need to significantly improve their information security strategies. Web Security:...
Saved in:
| Main Authors: | , |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
©2015
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Table of Contents:
- Section 1. Our view of the security world
- View of the IT security world
- Section 2. Safetyon the client script
- Security of browser
- Cross-site scripting attack
- Cross-site request forgery
- Clickjacking
- Section 3. Application on the server side-- HTML5 securities
- Injection attacks
- File upload vulnerability
- Authentication and session management
- Access control
- Encryption algorithm and random numbers
- Web framework security
- Application-layer denial-of-service attacks
- PHP security
- Web server configuration security
- Section 4. Safety operations of internet companies.
- Security of Internet business
- Security development lifecycle
- Secuirty operations


