Why is Secure Programming a Concern?- Dealing with Shared Hosts -- Maintaining Separate Development and Production Environments -- Keeping Software Up To Date -- Connecting Securely -- Using Encryption -- Controlling Access -- Reducing Risk with PHP's Safe Mode -- Peer Review -- Preventing SQL Injection -- Preventing Hijacking of Temporary Files -- Preventing Hijacking of Sessions -- Preventing Spoofing of Forms -- Preventing Spoofing of File Uploads -- Preventing Misuse of Shell Arguments -- Preventing Misuse of Global Variables -- Preventing Buffer Overflow -- Using Content Filtering -- Using Roles to Authorize Script Execution -- Avoiding Cross-site Scripting -- Using captchas as Turing Tests -- Verifying Email Addresses -- Adding undo to Prevent Data Loss -- Adding Accountability to Track (Ab)Use -- Safely Executing Privileged Scripts -- Handling Remote Procedure Calls Safely -- Using FTP Safely -- Fending Off the Robots.
0
SUMMARY OR ABSTRACT
Text of Note
"Pro PHP Security" is one of the first books devoted solely to PHP security. It will serve as your complete guide for taking defensive and proactive security measures within your PHP applications. (And the methods discussed are compatible with PHP versions 3, 4, and 5.) The knowledge you'll gain from this comprehensive guide will help you prevent attackers from potentially disrupting site operation or destroying data. And you'll learn about various security measures, for example, creating and deploying "captchas," validating e-mail, fending off SQL injection attacks, and pr.
SYSTEM REQUIREMENTS NOTE (ELECTRONIC RESOURCES)
Text of Note
Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.