Alice and Bob Learn Application Security - Tanya Janca
- Format: Broché Voir le descriptif
Vous en avez un à vendre ?
Vendez-le-vôtre42,00 €
Produit Neuf
Ou 10,50 € /mois
- Livraison à 0,01 €
- Livré entre le 12 et le 26 mai
Expédition rapide et soignée depuis l`Angleterre - Délai de livraison: entre 10 et 20 jours ouvrés.
Nos autres offres
-
44,71 €
Produit Neuf
Ou 11,18 € /mois
- Livraison à 0,01 €
Nouvel article expédié dans le 24H à partir des Etats Unis Livraison au bout de 14 à 21 jours ouvrables.
-
46,57 €
Produit Neuf
Ou 11,64 € /mois
- Livraison à 0,01 €
- Livré entre le 30 avril et le 7 mai
Brand new, In English, Fast shipping from London, UK; Tout neuf, en anglais, expédition rapide depuis Londres, Royaume-Uni;ria9781119687351_dbm
-
51,34 €
Produit Neuf
Ou 12,84 € /mois
- Livraison : 3,99 €
- Livré entre le 29 avril et le 4 mai
-
56,99 €
Occasion · Comme Neuf
Ou 14,25 € /mois
- Livraison : 0,00 €
- Livré entre le 7 et le 15 mai
Service client à l'écoute et une politique de retour sans tracas - Livraison des USA en 3 a 4 semaines (2 mois si circonstances exceptionnelles) - La plupart de nos titres sont en anglais, sauf indication contraire. N'hésitez pas à nous envoyer un e-... Voir plus -
61,16 €
Produit Neuf
Ou 15,29 € /mois
- Livraison : 5,00 €
- Livré entre le 30 avril et le 4 mai
Exp¿di¿ en 7 jours ouvr¿s
- Payez directement sur Rakuten (CB, PayPal, 4xCB...)
- Récupérez le produit directement chez le vendeur
- Rakuten vous rembourse en cas de problème
Gratuit et sans engagement
Félicitations !
Nous sommes heureux de vous compter parmi nos membres du Club Rakuten !
TROUVER UN MAGASIN
Retour
Avis sur Alice And Bob Learn Application Security de Tanya Janca Format Broché - Livre Informatique
0 avis sur Alice And Bob Learn Application Security de Tanya Janca Format Broché - Livre Informatique
Les avis publiés font l'objet d'un contrôle automatisé de Rakuten.
-
Yoshitomo Nara: Pinacoteca
Occasion dès 62,33 €
-
Complete Ielts Bands 6.5-7.5 Workbook Without Answers With Audio Cd
Neuf dès 38,71 €
-
Tour Auto - 25e Édition
1 avis
Neuf dès 59,00 €
Occasion dès 35,40 €
-
Horror Films - Cinéma Fantastique -
Occasion dès 29,80 €
-
Pucci De Rossi: '71-'96
Occasion dès 49,70 €
-
Incroyable Islam: La Religion Qui Met Votre Cerveau À L'épreuve (French Edition)
Occasion dès 21,57 €
-
Finance For Executives
Occasion dès 50,00 €
-
David Busch's Canon Eos R6 Ii Guide To Digital Photography
Neuf dès 46,39 €
Occasion dès 82,99 €
-
Medicine 1 - Student's Book
Occasion dès 47,99 €
-
Encyclopedia Of Hydrangeas
Occasion dès 51,25 €
-
Paul Thek En Italie (1962-1976)
Neuf dès 24,00 €
-
Atomic Habits
4 avis
Neuf dès 23,00 €
Occasion dès 42,31 €
-
The Secret Of Secrets
Neuf dès 32,92 €
Occasion dès 22,45 €
-
Furious Love
Neuf dès 22,38 €
-
Dc Finest: Justice Society Of America: The Plunder Of The Psycho-Pirate
Neuf dès 39,20 €
-
L'allemand B2 Pack Téléchargement - Avec 1 Livre, 1 Livret Et 1 Téléchargement Audio
Neuf dès 49,90 €
Occasion dès 45,40 €
-
Cote D'azur: Inventing The French Riviera
Occasion dès 24,90 €
-
Dc Finest: The Flash: The Fastest Man Dead
Neuf dès 39,88 €
-
Hypnose Leviers De Changement: Comment Les Détecter Et Les Activer
3 avis
Occasion dès 24,00 €
-
World Radio Tv Handbook 2024: The Directory Of Global Broadcasting
Neuf dès 53,48 €
Occasion dès 39,54 €
Produits similaires
Présentation Alice And Bob Learn Application Security de Tanya Janca Format Broché
- Livre Informatique
Résumé : A TRIED-AND-TESTED APPROACH TO BUILDING SECURITY INTO PROJECTS FROM THE START Do you have difficulty implementing application security into your software development process? Alice and Bob Learn Application Security shows readers how to push left in software, by building security considerations into their system development life cycle, right from the start. You'll learn basic security fundamentals and requirements, as well as secure design concepts, all while benefiting from the code, exercises, and examples interspersed throughout the text. Written by one of the leading voices in the application security field, the book includes answers to the most common questions people starting out in application security often have. It also includes valuable additional resources where readers can find more answers. The core security concepts are illustrated through references to the personas of Alice and Bob and how their professional lives and businesses drive application security decisions. The book takes a pleasantly straightforward approach that's heavy on practical strategies and light on needless jargon or complexity. At the same time, it supplies the rigor or richness you would expect to find in a leading resource on the topic of application security. The book is perfect for current and aspiring software and application developers. It also belongs on the bookshelves of software project managers, Chief Information Security Officers, and penetration testers who seek to improve their craft and their ability to deliver valuable results. Alice and Bob Learn Application Security will teach you everything you need to know about:
...
Biographie:
.
Sommaire: Foreword xxi Introduction xxiii Part I What You Must Know to Write Code Safe Enough to Put on the Internet 1 Chapter 1 Security Fundamentals 3 The Security Mandate: CIA 3 Confidentiality 4 Integrity 5 Availability 5 Assume Breach 7 Insider Threats 8 Defense in Depth 9 Least Privilege 11 Supply Chain Security 11 Security by Obscurity 13 Attack Surface Reduction 14 Hard Coding 15 Never Trust, Always Verify 15 Usable Security 17 Factors of Authentication 18 Exercises 20 Chapter 2 Security Requirements 21 Requirements 22 Encryption 23 Never Trust System Input 24 Encoding and Escaping 28 Third-Party Components 29 Security Headers: Seatbelts for Web Apps 31 Security Headers in Action 32 X-XSS-Protection 32 Content-Security-Policy (CSP) 32 X-Frame-Options 35 X-Content-Type-Options 36 Referrer-Policy 36 Strict-Transport-Security (HSTS) 37 Feature-Policy 38 X-Permitted-Cross-Domain-Policies 39 Expect-CT 39 Public Key Pinning Extension for HTTP (HPKP) 41 Securing Your Cookies 42 The Secure Flag 42 The HttpOnly Flag 42 Persistence 43 Domain 43 Path 44 Same-Site 44 Cookie Prefixes 45 Data Privacy 45 Data Classification 45 Passwords, Storage, and Other Important Decisions 46 HTTPS Everywhere 52 TLS Settings 53 Comments 54 Backup and Rollback 54 Framework Security Features 54 Technical Debt = Security Debt 55 File Uploads 56 Errors and Logging 57 Input Validation and Sanitization 58 Authorization and Authentication 59 Parameterized Queries 59 URL Parameters 60 Least Privilege 60 Requirements Checklist 61 Exercises 63 Chapter 3 Secure Design 65 Design Flaw vs. Security Bug 66 Discovering a Flaw Late 67 Pushing Left 68 Secure Design Concepts 68 Protecting Sensitive Data 68 Never Trust, Always Verify/Zero Trust/Assume Breach 70 Backup and Rollback 71 Server-Side Security Validation 73 Framework Security Features 74 Security Function Isolation 74 Application Partitioning 75 Secret Management 76 Re-authentication for Transactions (Avoiding CSRF) 76 Segregation of Production Data 77 Protection of Source Code 77 Threat Modeling 78 Exercises 82 Chapter 4 Secure Code 83 Selecting Your Framework and Programming Language 83 Example #1 85 Example #2 85 Example #3 86 Programming Languages and Frameworks: The Rule 87 Untrusted Data 87 HTTP Verbs 89 Identity 90 Session Management 91 Bounds Checking 93 Authentication (AuthN) 94 Authorization (AuthZ) 96 Error Handling, Logging, and Monitoring 99 Rules for Errors 100 Logging 100 Monitoring 101 Exercises 103 Chapter 5 Common Pitfalls 105 OWASP 105 Defenses and Vulnerabilities Not Previously Covered 109 Cross-Site Request Forgery 110 Server-Side Request Forgery 112 Deserialization 114 Race Conditions 115 Closing Comments 117 Exercises 117 Part II What You Should Do to Create Very Good Code 119 Chapter 6 Testing and Deployment 121 Testing Your Code 121 Code Review 122 Static Application Security Testing (SAST) 123 Software Composition Analysis (SCA) 125 Unit Tests 126...
Détails de conformité du produit
Personne responsable dans l'UE