LEADER 03376nam 22005775 450 001 9910624378903321 005 20251009102841.0 010 $a9781484285961 010 $a1484285964 024 7 $a10.1007/978-1-4842-8596-1 035 $a(MiAaPQ)EBC7127593 035 $a(Au-PeEL)EBL7127593 035 $a(CKB)25219373100041 035 $a(OCoLC)1349467700 035 $a(OCoLC-P)1349467700 035 $a(CaSebORM)9781484285961 035 $a(DE-He213)978-1-4842-8596-1 035 $a(PPN)265862175 035 $a(Perlego)4514005 035 $a(EXLCZ)9925219373100041 100 $a20221028d2022 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSecure Web Application Development $eA Hands-On Guide with Python and Django /$fby Matthew Baker 205 $a1st ed. 2022. 210 1$aBerkeley, CA :$cApress :$cImprint: Apress,$d2022. 215 $a1 online resource (471 pages) 311 08$aPrint version: Baker, Matthew Secure Web Application Development Berkeley, CA : Apress L. P.,c2022 9781484285954 320 $aIncludes bibliographical references and index. 327 $a1. Introduction -- 2. The Hands-On Environment -- 3. Threat Modelling -- 4. Transport and Encryption -- 5. Installing and Configuring Services -- 6. APIs and Endpoints -- 7. Cookies and User Input -- 8. Cross-Site Requests -- 9. Password Management.-10. Authentication and Authorization -- 11. OAuth2 -- 12. Logging and Monitoring -- 13. Third-Party and Supply Chain Security -- 14. Further Resources. 330 $aCyberattacks are becoming more commonplace and the Open Web Application Security Project (OWASP), estimates 94% of sites have flaws in their access control alone. Attacks evolve to work around new defenses, and defenses must evolve to remain effective. Developers need to understand the fundamentals of attacks and defenses in order to comprehend new techniques as they become available. This book uses a hand-on approach to teach you how to write secure web applications and will highlight how hackers attack applications along with a broad arsenal of defenses. You'll see how to Implement the right defenses in Python/Django applications to prevent such attacks. Secure Web Application Development is your guide to picking the appropriate techniques to close vulnerabilities and ensuring you still provide users with their needed functionality. You will: Understand common coding vulnerabilities and how to avoid them Configure services, such as databases and web servers, to minimize the risk of attack Implement secure methods for password management, authentication, and authorization Safely manage requests to and from external web sites Establish a framework for modelling and assessing risks. 606 $aInternet programming 606 $aPython (Computer program language) 606 $aWeb Development 606 $aPython 615 0$aInternet programming. 615 0$aPython (Computer program language) 615 14$aWeb Development. 615 24$aPython. 676 $a004.6 700 $aBaker$b Matthew$0508285 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910624378903321 996 $aSecure Web Application Development$92962658 997 $aUNINA