51,95 €*
Versandkostenfrei per Post / DHL
Lieferzeit 2-4 Werktage
If you are interested in truly top-notch security, available sources don¿t give you the information you need. Most blogs and other books simply state how to use the configurations within [...], but do not teach you security as understood by security professionals. Online code samples aren't much help because they are usually written by developers who aren¿t incorporating security practices.
This book solves those issues by teaching you security first, going over software best practices as understood by security professionals, not developers. Then it teaches you how security is implemented in [...]. With that foundation, it dives into specific security-related functionality and discusses how to improve upon the default functionality with working code samples. And you will learn how security professionals build software security programs so you can continue building software security best practices into your own Secure Software Development Life Cycle (SSDLC).
What Yoüll Learn
Know how both attackers and professional defenders approach web security
Establish a baseline of security for understanding how to design more secure software
Discern which attacks are easy to prevent, and which are more challenging, in [...]
Dig into [...] source code to understand how the security services work
Know how the new logging system in [...] falls short of security needs
Incorporate security into your software development process
Who This Book Is For
Software developers who have experience creating websites in [...] and want to know how to make their websites secure from hackers and security professionals who work with a development team that uses [...]. To get the most out of this book, you should already have a basic understanding of web programming and [...], including creating new projects, creating pages, and using JavaScript.
Topics That Are New to This Edition
This edition has been updated with the following changes:
Best practices and code samples updated to reflect security-related changes in [...] 8
Improved examples, including a fully-functional website incorporating security suggestions
Best practices for securely using Large Language Models (LLMs) and AI
Expansions and clarifications throughout
If you are interested in truly top-notch security, available sources don¿t give you the information you need. Most blogs and other books simply state how to use the configurations within [...], but do not teach you security as understood by security professionals. Online code samples aren't much help because they are usually written by developers who aren¿t incorporating security practices.
This book solves those issues by teaching you security first, going over software best practices as understood by security professionals, not developers. Then it teaches you how security is implemented in [...]. With that foundation, it dives into specific security-related functionality and discusses how to improve upon the default functionality with working code samples. And you will learn how security professionals build software security programs so you can continue building software security best practices into your own Secure Software Development Life Cycle (SSDLC).
What Yoüll Learn
Know how both attackers and professional defenders approach web security
Establish a baseline of security for understanding how to design more secure software
Discern which attacks are easy to prevent, and which are more challenging, in [...]
Dig into [...] source code to understand how the security services work
Know how the new logging system in [...] falls short of security needs
Incorporate security into your software development process
Who This Book Is For
Software developers who have experience creating websites in [...] and want to know how to make their websites secure from hackers and security professionals who work with a development team that uses [...]. To get the most out of this book, you should already have a basic understanding of web programming and [...], including creating new projects, creating pages, and using JavaScript.
Topics That Are New to This Edition
This edition has been updated with the following changes:
Best practices and code samples updated to reflect security-related changes in [...] 8
Improved examples, including a fully-functional website incorporating security suggestions
Best practices for securely using Large Language Models (LLMs) and AI
Expansions and clarifications throughout
Scott Norberg is a web security specialist with almost 20 years of experience in various technology and programming roles, specializing in web development and web security using Microsoft technologies. He has a wide range of experiences in security, from working with development teams on secure code techniques, to software security assessments, and application security program building. He also has an interest in building plug-and-play software libraries that developers can use to secure their sites with little-to-no extra effort.
Scott holds several certifications, including Microsoft Certified Technology Specialist (MCTS), and certifications for [...] and SQL Server. He also holds two certifications from ISC2, (Certified Information Systems Security Professional (CISSP) and Cloud Certified Security Professional (CCSP)) and an MBA from Indiana University.
Scott is the Founder and President of Opperis Technologies LLC, a firm dedicated to helping small- to mid-sized businesses write more secure software. His latest project is [...], an open-source security scanner for [...] Core, which can be found on GitHub at [...].
Chapter 1: Intro to Security.- Chapter 2: Software Security Overview.- Chapter 3: Web Security.- Chapter 4: Thinking Like a Hacker.- Chapter 5: Introduction to [...] Core Security.- Chapter 6: Cryptography.- Chapter 7: Processing User Input.- Chapter 8: Data Access and Storage.- Chapter 9: Authentication and Authorization.- Chapter 10: Advanced Web Security.- Chapter 11: Logging and Error Handling. Chapter 12: Setup and Configuration. - Chapter 13: Secure Software Development Life Cycle. (SSDLC).
Erscheinungsjahr: | 2024 |
---|---|
Genre: | Importe, Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Taschenbuch |
Inhalt: |
xxiv
455 S. 34 s/w Illustr. 455 p. 34 illus. |
ISBN-13: | 9798868804939 |
Sprache: | Englisch |
Einband: | Kartoniert / Broschiert |
Autor: | Norberg, Scott |
Auflage: | Second Edition |
Hersteller: | APRESS |
Verantwortliche Person für die EU: | APress in Springer Science + Business Media, Heidelberger Platz 3, D-14197 Berlin, juergen.hartmann@springer.com |
Maße: | 254 x 178 x 26 mm |
Von/Mit: | Scott Norberg |
Erscheinungsdatum: | 03.10.2024 |
Gewicht: | 0,895 kg |
Scott Norberg is a web security specialist with almost 20 years of experience in various technology and programming roles, specializing in web development and web security using Microsoft technologies. He has a wide range of experiences in security, from working with development teams on secure code techniques, to software security assessments, and application security program building. He also has an interest in building plug-and-play software libraries that developers can use to secure their sites with little-to-no extra effort.
Scott holds several certifications, including Microsoft Certified Technology Specialist (MCTS), and certifications for [...] and SQL Server. He also holds two certifications from ISC2, (Certified Information Systems Security Professional (CISSP) and Cloud Certified Security Professional (CCSP)) and an MBA from Indiana University.
Scott is the Founder and President of Opperis Technologies LLC, a firm dedicated to helping small- to mid-sized businesses write more secure software. His latest project is [...], an open-source security scanner for [...] Core, which can be found on GitHub at [...].
Chapter 1: Intro to Security.- Chapter 2: Software Security Overview.- Chapter 3: Web Security.- Chapter 4: Thinking Like a Hacker.- Chapter 5: Introduction to [...] Core Security.- Chapter 6: Cryptography.- Chapter 7: Processing User Input.- Chapter 8: Data Access and Storage.- Chapter 9: Authentication and Authorization.- Chapter 10: Advanced Web Security.- Chapter 11: Logging and Error Handling. Chapter 12: Setup and Configuration. - Chapter 13: Secure Software Development Life Cycle. (SSDLC).
Erscheinungsjahr: | 2024 |
---|---|
Genre: | Importe, Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Taschenbuch |
Inhalt: |
xxiv
455 S. 34 s/w Illustr. 455 p. 34 illus. |
ISBN-13: | 9798868804939 |
Sprache: | Englisch |
Einband: | Kartoniert / Broschiert |
Autor: | Norberg, Scott |
Auflage: | Second Edition |
Hersteller: | APRESS |
Verantwortliche Person für die EU: | APress in Springer Science + Business Media, Heidelberger Platz 3, D-14197 Berlin, juergen.hartmann@springer.com |
Maße: | 254 x 178 x 26 mm |
Von/Mit: | Scott Norberg |
Erscheinungsdatum: | 03.10.2024 |
Gewicht: | 0,895 kg |