Security Smarts for the Self-Guided IT Professional
"Get to know the hackers--or plan on getting hacked. Sullivan and Liu have created a savvy, essentials-based approach to web app security packed with immediately applicable tools for any information security practitioner sharpening his or her tools or just starting out." --Ryan McGeehan, Security Manager, Facebook, Inc.
Secure web applications from today's most devious hackers. Web Application Security: A Beginner's Guide helps you stock your security toolkit, prevent common hacks, and defend quickly against malicious attacks.
This practical resource includes chapters on authentication, authorization, and session management, along with browser, database, and file security--all supported by true stories from industry. You'll also get best practices for vulnerability detection and secure development, as well as a chapter that covers essential security fundamentals. This book's templates, checklists, and examples are designed to help you get started right away.
Web Application Security: A Beginner's Guide features:
- Lingo--Common security terms defined so that you're in the know on the job
- IMHO--Frank and relevant opinions based on the authors' years of industry experience
- Budget Note--Tips for getting security technologies and processes into your organization's budget
- In Actual Practice--Exceptions to the rules of security explained in real-world contexts
- Your Plan--Customizable checklists you can use on the job now
- Into Action--Tips on how, why, and when to apply new skills and techniques at work
Table of contents
Part I: Primer
Chapter 1. Welcome to the Wide World of Web Application Security
Chapter 2. Security FundamentalsPart II: Web Application Security Principles
Chapter 3. Authentication
Chapter 4. Authorization
Chapter 5. Browser Security Principles: The Same-Origin Policy
Chapter 6. Browser Security Principles: Cross-Site Scripting and Cross-Site Request Forgery
Chapter 7. Database Security Principles
Chapter 8. File Security PrinciplesPart III: Secure Development and Deployment
Chapter 9. Secure Development Methodologies
Epilogue: The Wizard, the Giant, and the Magic Fruit Trees: A Happy Ending