Pro PHP Security, 2nd Edition
Download
Download is available until [expire_date]
  • Version
  • Download 3
  • File Size 5.01 MB
  • File Count 1
  • Create Date March 19, 2018
  • Last Updated September 1, 2019

Pro PHP Security, 2nd Edition

Pro PHP Security, 2nd Edition : PHP security, just like PHP itself, has advanced. Updated for PHP 5.3, the second edition of this authoritative PHP security book covers foundational PHP security topics like SQL injection, XSS, user authentication, and secure PHP development.

PHP Security

Pro PHP Security, Second Edition will serve as your complete guide for taking defensive and proactive security measures within your PHP applications. Beginners in secure programming will find a lot of material on secure PHP development, the basics of encryption, secure protocols, as well as how to reconcile the demands of server-side and web application security.

Table of contents (17 chapters)

  • Why Is Secure Programming a Concern?

    Snyder, Chris (et al.)

    Pages 3-12

  • Validating and Sanitizing User Input

    Snyder, Chris (et al.)

    Pages 15-32

  • Preventing SQL Injection

    Snyder, Chris (et al.)

    Pages 33-43

  • Preventing Cross-Site Scripting

    Snyder, Chris (et al.)

    Pages 45-57

  • Preventing Remote Execution

    Snyder, Chris (et al.)

    Pages 59-79

  • Enforcing Security for Temporary Files

    Snyder, Chris (et al.)

    Pages 81-91

  • Preventing Session Hijacking

    Snyder, Chris (et al.)

    Pages 93-104

  • Securing REST Services

    Snyder, Chris (et al.)

    Pages 105-113

  • Using CAPTCHAs

    Snyder, Chris (et al.)

    Pages 117-131

  • User Authentication, Authorization, and Logging

    Snyder, Chris (et al.)

    Pages 133-157

  • Preventing Data Loss

    Snyder, Chris (et al.)

    Pages 159-175

  • Safe Execution of System and Remote Procedure Calls

    Snyder, Chris (et al.)

    Pages 177-205

  • Securing Unix

    Snyder, Chris (et al.)

    Pages 209-220

  • Securing Your Database

    Snyder, Chris (et al.)

    Pages 221-228

  • Using Encryption

    Snyder, Chris (et al.)

    Pages 229-266

  • Securing Network Connections: SSL and SSH

    Snyder, Chris (et al.)

    Pages 267-294

  • Final Recommendations

    Snyder, Chris (et al.)

    Pages 295-326

Related Posts:

Check out our downloads section. Lots of learning resources.

Download the source files for the book Pro PHP Security, 2nd Edition

Checkout our PHP category section for more posts about PHP.

Why do most sites use cookies?

How to secure your Nest account and cameras and keep hackers at bay(Opens in a new browser tab)

Networking The Complete Reference, Third Edition(Opens in a new browser tab)

Google admits it forgot to tell users about its hidden spy microphone(Opens in a new browser tab)

Hacking the IoT: Vulnerabilities and Prevention Methods(Opens in a new browser tab)

Downloads(Opens in a new browser tab)

Network Security Hacks 2nd Edition(Opens in a new browser tab)

WordPress 5.2 finally gets the security features a third of the Internet deserves(Opens in a new browser tab)

Hacking Autonomous Vehicles: Is This Why We Don't Have Self-Driving Cars Yet?(Opens in a new browser tab)

Cybersecurity burnout: 10 most stressful parts of the job(Opens in a new browser tab)

RBC customer out of pocket after fraud: What you need to know if you e-transfer money(Opens in a new browser tab)

North Korean Hackers Use ELECTRICFISH Malware to Steal Data(Opens in a new browser tab)

Machine learning algorithms explained(Opens in a new browser tab)

Increase User Engagement & Why It Matters for SEO(Opens in a new browser tab)

Fake Google reCAPTCHA used to hide Android banking malware(Opens in a new browser tab)