Book description
The web application stack – a growing threat vector
Understand the threat and learn how to defend your organisation
This book is intended for application developers, system administrators and operators, as well as networking professionals who need a comprehensive top-level view of web application security in order to better defend and protect both the ‘web’ and the ‘application’ against potential attacks. This book examines the most common, fundamental attack vectors and shows readers the defence techniques used to combat them.
Contents
Introduction
Attack Surface
Threat Vectors
Threat Mitigation
Conclusion
About the Author
Lori MacVittie has extensive development and technical architecture experience in both high-tech and enterprise organizations , in addition to network and systems administration expertise. Prior to joining F5, Lori was an award-winning technology editor at Network Computing Magazine. She holds a BS in information and computing science from the University of Wisconsin at Green Bay, and an MS in computer science from Nova Southeastern University. She is technical editor and member of the steering committee for CloudNOW, a non-profit consortium of the leading women in Cloud computing.
Secure your apps for better cyber security – buy this book today!
Table of contents
- Cover
- Web Application Security is a Stack
- Title Page
- Copy Page
- ABOUT THE AUTHOR
- ACKNOWLEDGEMENTS
- Contents
- Chapter 1: Introduction
- The modern threat
- CYA: Cover Your Apps
- Chapter 2: Attack Surface
- The web application security stack
- Application: Platform
- Application: Logic
- Application: Data
- Chapter 3: Threat Vectors
- Threat vector: Data
- Threat vector: Protocols
- Threat vector: Availability
- Chapter 4: Threat Mitigation
- The three Cs of application security
- Inbound threat mitigation
- Outbound threat mitigation
- Chapter 5: Conclusion
- ITG Resources
Product information
- Title: Web Application Security is a Stack: How to CYA (Cover Your Apps) Completely
- Author(s):
- Release date: February 2015
- Publisher(s): IT Governance Publishing
- ISBN: 9781849287050
You might also like
book
Java APIs, Extensions and Libraries: With JavaFX, JDBC, jmod, jlink, Networking, and the Process API
This book completes the Apress Java learning journey and is a comprehensive approach to learning Java …
book
iOS Application Security
iOS Application Security covers everything you need to know to design secure iOS apps from the …
book
Building Web Apps that Respect a User's Privacy and Security
A recent survey from the Pew Research Center found that few Americans are confident about the …
book
Advanced Persistent Training : Take Your Security Awareness Program to the Next Level
Gain greater compliance with corporate training by addressing the heart of the very awareness vs. compliance …