|Item type||Current location||Call number||URL||Status||Date due||Barcode|
|Electronic Book||UT Tyler Online Online||QA76.9.A25 .G384 2014 (Browse shelf)||http://uttyler.eblib.com/patron/FullRecord.aspx?p=1408089||Available||EBL1408089|
Front Cover; Contents; Foreword; Introduction; Industry Analysis; Preface; Acknowledgments; Biography; Chapter 1: Introduction to Mobile Security Development; Chapter 2: Web Application Attack Surface; Chapter 3: PHP Security Anti-Patterns; Chapter 4: PHP Essential Security; Chapter 5: PHP Security Tools Overview; Chapter 6: UTF-8 for PHP and MySQL; Chapter 7: Project Layout Template; Chapter 8: Separation of Concerns; Chapter 9: PHP and PDO; Chapter 10: Template Strategy Patterns; Chapter 11: Modern PHP Encryption; Chapter 12: Professional Exception and Error Handling
Chapter 13: Secure Session ManagementChapter 14: Secure Session Storage; Chapter 15: Secure Forms and Account Registration; Chapter 16: Secure Client Server Form Validation; Chapter 17: Secure File Uploading; Chapter 18: Secure JSON Requests; Chapter 19: Google Maps, YouTube, and jQuery Mobile; Chapter 20: Twitter Authentication and SSL cURL; Chapter 21: Secure AJAX Shopping Cart; Chapter 22: Common Facebook Canvas Vulnerability Points; Appendix; Back Cover
The world is becoming increasingly mobile. Smartphones and tablets have become more powerful and popular, with many of these devices now containing confidential business, financial, and personal information. This has led to a greater focus on mobile software security. Establishing mobile software security should be of primary concern to every mobile application developer. This book explains how you can create mobile social applications that incorporate security throughout the development process.Although there are many books that address security issues, most do not explain how to incorporate
Description based upon print version of record.