top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
La Sécurisation d'une Application Web
La Sécurisation d'une Application Web
Autore Quinton Eric
Pubbl/distr/stampa London : , : ISTE Editions Ltd., , 2017
Descrizione fisica 1 online resource (209 pages)
Soggetto genere / forma Electronic books.
ISBN 1-78406-296-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione fre
Nota di contenuto Intro -- Table des matières -- Avant-propos -- Chapitre 1. Pourquoi sécuriser les applications web ? -- Chapitre 2. Estimer le risque -- Chapitre 3. Le chiffrement et la configurationdu serveur web -- Chapitre 4. Les menaces et comment s'en protéger -- Chapitre 5. Gérer l'identification des utilisateurset leur affecter des droits -- Chapitre 6. Structurer l'applicationavec le modèle MVC -- Chapitre 7. Mettre en placeune plate-forme technique adaptéeet tester l'application -- Bibliographie -- Index.
Record Nr. UNINA-9910493220403321
Quinton Eric  
London : , : ISTE Editions Ltd., , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Safety of web applications : risks, encryption and handling vulnerabilities with PHP / / Eric Quinton
Safety of web applications : risks, encryption and handling vulnerabilities with PHP / / Eric Quinton
Autore Quinton Eric
Pubbl/distr/stampa London, [England] ; ; Oxford, [England] : , : ISTE Press : , : Elsevier, , 2017
Descrizione fisica 1 online resource (226 pages)
Disciplina 005.8
Soggetto topico Computer networks - Security measures
Web sites - Security measures
PHP (Computer program language)
ISBN 0-08-102362-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Why Do Web Applications Need to be Secure? What is a web application? ; What is computer security? ; Examples of damage caused by security failures -- Estimating Risk. What is risk? ; How can we protect ourselves from risk? ; Determining the target ; Determining the impact ; Which causes or scenarios should be considered? ; How should this study be performed in a company setting? -- Encryption and Web Server Configuration. Examples of different web servers ; Introduction to concepts in encryption ; Generating and managing encryption certificates ; Implementing the HTTPS protocol ; Improving the security of the Apache server -- Threats and Protecting Against Them. The threats associated with web-based environments ; The top 10 most frequent attacks in 2013 ; Other countermeasures ; Implementing a resource controller -- Managing User Logins and Assigning. Permissions ; Managing user logins ; Managing permissions -- Using the MVC model to structure the application. Why does the application structure matter? ; What is the MVC model? ; Conclusion -- Implementing a Suitable Technical Platform and Testing the Application. Designing a suitable technical architecture ; Testing the security of the application ; What options do we have if implementing security measures for an application seems an impossible task?
Record Nr. UNINA-9910583028303321
Quinton Eric  
London, [England] ; ; Oxford, [England] : , : ISTE Press : , : Elsevier, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui