Normal view MARC view ISBD view

Web application security is a stack : how to CYA (Cover Your Apps) completely / Lori Mac Vittie.

By: Vittie, Lori Mac [author.].
Material type: TextTextSeries: JSTOR eBooks.Fundamentals Series: Publisher: Cambridgeshire, England : IT Governance Publishing, 2015Copyright date: ©2015Description: 1 online resource (71 pages) : color illustrations.Content type: text Media type: computer Carrier type: online resourceISBN: 9781849287050; 1849287058; 184928704X; 9781849287043.Subject(s): Computer networks -- Security measures | Computer securityGenre/Form: Electronic books.Additional physical formats: Print version:: Web application security is a stack : how to CYA (Cover Your Apps) completely.DDC classification: 005.8 LOC classification: TK5105.59 | .V588 2015Online resources: Click here to view this ebook. Summary: The web application stack - a growing threat vector Understand the threat and learn how to defend your organisation This book is intended for application developers, system administrators and operators, as well as networking professionals who need a comprehensive top-level view of web application security in order to better defend and protect both the 'web' and the 'application' against potential attacks. This book examines the most common, fundamental attack vectors and shows readers the defence techniques used to combat them. ContentsIntroductionAttack SurfaceThreat VectorsThreat Mitigatio.
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Call number URL Status Date due Barcode
Electronic Book UT Tyler Online
Online
TK5105.59 .V588 2015 (Browse shelf) https://ezproxy.uttyler.edu/login?url=http://www.jstor.org/stable/10.2307/j.ctt155j4gk Available ocn905916616

Description based on online resource; title from PDF title page (ebrary, viewed March 9, 2015).

The web application stack - a growing threat vector Understand the threat and learn how to defend your organisation This book is intended for application developers, system administrators and operators, as well as networking professionals who need a comprehensive top-level view of web application security in order to better defend and protect both the 'web' and the 'application' against potential attacks. This book examines the most common, fundamental attack vectors and shows readers the defence techniques used to combat them. ContentsIntroductionAttack SurfaceThreat VectorsThreat Mitigatio.

Includes bibliographical references.

There are no comments for this item.

Log in to your account to post a comment.