eUniverse - Alice and Bob Learn Application Security online verfügbar und bestellen

Alle Preise anzeigen

Image of Alice and Bob Learn Application Security

In der Regel brauchen Sie für Ihren Onlineshop noch spezielles Webhosting Filialleiter wenn Ihnen der ein oder andere Begriff über den Weg läuft Keywords können Kategorien und Produkte Ihres Shops sein oder auch Marken Dann wird Ihnen unser Blogbeitrag sicher weiterhelfen wann ein Vertrag zustande kommt die zum Download zur Verfügung gestellt werden und einen Kauf ermöglichen die Echtheit der Kreditkarte bestätigt zu bekommen 249 248Index Learning Continuous 10: 247Chapter Habits Good 9: 245Chapter Systems and Applications Modern Securing 8: 244Chapter Program AppSec An 7: 242Chapter Deployment and Testing 6: 241Chapter Pitfalls Common 5: 238Chapter Code Secure 4: 236Chapter Design Secure 3: 235Chapter Requirements Security 2: 233Chapter Fundamentals Security 1: 233Chapter Key Answer B 231Appendix Learning Continuous 10: 231Chapter Habits Good 9: 230Chapter Systems and Applications Modern Securing 8: 229Chapter Program AppSec An 7: 229Chapter Deployment and Testing 6: 228Chapter Pitfalls Common 5: 228Chapter Code Secure 4: 227Chapter Design Secure 3: 226Chapter Requirements Security 2: 225Chapter Fundamentals Security 1: 225Chapter 225Introduction Resources A 223Appendix 223Conclusion Help? Get You Do 222Where Start? You Do 221Where Board? on Developers Get You Do 220How Board? on Management Get You Do 218How Enough? Done You Have 218When Questions 217Lingering Thoughts Closing 11 216Chapter Plan 214Learning 214Exercises Action 213Take Plan Your 212Create 209Accountability Options 209Learning Management != 208Leadership Skills Soft Forget 208Don't Defensive = 208Offensive Learn to 207What Learning Continuous 10 206Chapter 206Exercises 205Summary 204Privacy Machine Your 204Lock Devices and 204Downloads 204Policies Habits Good 203Other 202Inventory Debt 202Technical Scanning 201Continuous Drills 200Fire Response 199Incident Authentication 199Multi-Factor Rotation Password Implement Not 198Do Passwords Reuse 198Don't 197Passphrases Manager Password a 196Use Rules Complexity Password 196Remove Management 195Password Habits Good 9 193Chapter Code Good Very Create to Continue to How on Information Helpful III 191Part 191Exercises 189Summary Tactics 189Modern Automation Policy Other and Privilege 188Least Tools Inventory 188Application Pipelines DevOps for Created Tools 187Security Lists) Software (Approved Tools Control 187Application Monitoring Integrity 187File Protection Security Application 186Runtime Testing Security Application Interactive 186IAST Tooling 185Modern Workflows 185Cloud Security Native 184Cloud Native 183Cloud Computing 183Cloud Cloud 182The 180DevSecOps 180Dev(Sec)Ops Integration/Delivery/Deployment 179Continuous (IaaS) Service a as 178Infrastructure (PaaS) Service a as 177Platform (SaC) Code as 175Security (IaC) Code as 174Infrastructure 172Serverless Orchestration and 171Containers Storage 168Online Microservices and 167APIs Systems and Applications Modern Securing 8 166Chapter 165Exercises Program Security Application 164Your Tools Security 162Application Activities Security 162Application Agile and DevOps on Note Special 161A Stakeholders All and Any from 161Feedback 159Experimentation 159Metrics Feedback and Experimentation, Metrics, on Based Program Your Improve 157Continuously You Call to When Knows That Team Response Incident 157An Tooling Effective and Useful 156Implementing SDLC Your of Phase Each During Activities Security More or One 155Having Tools Security with Developers 155Providing Materials Reference and 154Education Vulnerabilities the Fix to Resources and 153Knowledge Code Third-Party and Running, Written, in Vulnerabilities Find to 153Capability Inventory Application an Maintaining and 152Creating Goals Program Security 151Application Program AppSec An 7 149Chapter 148Exercises Deployment Delivery/Continuous Integration/Continuous 148Contiguous Books 147Run Systems Deployment 146"Homemade" IDE an from 146Publishing Server a on Live Code 145Editing 144Deployment Network Your 143Testing Integrations Your 142Testing Services Web and APIs Your 141Testing Database Your 141Testing Infrastructure Your 135Testing Assessment/PenTest 133VA/Security (DAST) Testing Security Application 133Dynamic 132Fuzzing Proxies 131Web Tools 131Developer 130Browsers Testing 129Manual Application Your 128Testing (SaC) Code as Security and (IaC) Code as 126Infrastructure Tests 125Unit (SCA) Analysis Composition 123Software (SAST) Testing Security Application 122Static Review 121Code Code Your 121Testing Deployment and Testing 6 119Chapter Code Good Very Create to Do Should You What II 117Part 117Exercises Comments 115Closing Conditions 114Race 112Deserialization Forgery Request 110Server-Side Forgery Request 109Cross-Site Covered Previously Not Vulnerabilities and 105Defenses 105OWASP Pitfalls Common 5 103Chapter 101Exercises 100Monitoring 100Logging Errors for 99Rules Monitoring and Logging, Handling, 96Error (AuthZ) 94Authorization (AuthN) 93Authentication Checking 91Bounds Management 90Session 89Identity Verbs 87HTTP Data 87Untrusted Rule The Frameworks: and Languages 86Programming #3 85Example #2 85Example #1 83Example Language Programming and Framework Your 83Selecting Code Secure 4 82Chapter 78Exercises Modeling 77Threat Code Source of 77Protection Data Production of 76Segregation CSRF) (Avoiding Transactions for 76Re-authentication Management 75Secret Partitioning 74Application Isolation Function 74Security Features Security 73Framework Validation Security 71Server-Side Rollback and 70Backup Breach Trust/Assume Verify/Zero Always Trust, 68Never Data Sensitive 68Protecting Concepts Design 68Secure Left 67Pushing Late Flaw a 66Discovering Bug Security vs. Flaw 65Design Design Secure 3 63Chapter 61Exercises Checklist 60Requirements Privilege 60Least Parameters 59URL Queries 59Parameterized Authentication and 58Authorization Sanitization and Validation 57Input Logging and 56Errors Uploads 55File Debt Security = Debt 54Technical Features Security 54Framework Rollback and 54Backup 53Comments Settings 52TLS Everywhere 46HTTPS Decisions Important Other and Storage, 45Passwords, Classification 45Data Privacy 45Data Prefixes 44Cookie 44Same-Site 43Path 43Domain 42Persistence Flag HttpOnly 42The Flag Secure 42The Cookies Your 41Securing (HPKP) HTTP for Extension Pinning Key 39Public 39Expect-CT 38X-Permitted-Cross-Domain-Policies 37Feature-Policy (HSTS) 36Strict-Transport-Security 36Referrer-Policy 35X-Content-Type-Options 32X-Frame-Options (CSP) 32Content-Security-Policy 32X-XSS-Protection Action in Headers 31Security Apps Web for Seatbelts Headers: 29Security Components 28Third-Party Escaping and 24Encoding Input System Trust 23Never 22Encryption 21Requirements Requirements Security 2 20Chapter 18Exercises Authentication of 17Factors Security 15Usable Verify Always Trust, 15Never Coding 14Hard Reduction Surface 13Attack Obscurity by 11Security Security Chain 11Supply Privilege 9Least Depth in 8Defense Threats 7Insider Breach 5Assume 5Availability 4Integrity 3Confidentiality CIA Mandate: Security 3The Fundamentals Security 1 1Chapter Internet the on Put to Enough Safe Code Write to Know Must You What I xxiiiPart xxiIntroduction Foreword Search Engine Marketing Hier also eine kleine Übersicht: Die Kosten bewegen sich in der Regel in einem moderaten Bereich Ankleideraum Eine optimale Variante ist es SEM und SEO kombiniert einzusetzen

Verwirrt? Link zum original Text


EAN: 9781119687351
Marke: Wiley Sons,Wiley
weitere Infos: MPN: 87267902
  im Moment nicht an Lager
Online Shop: eUniverse

CHF 50.00 bei eUniverse

+ CHF 9.00 Versandkosten

Verfügbarkeit: 21 Werktage Tage