Iron-Clad Java: Building Secure Web Applications

Iron-Clad Java: Building Secure Web Applications
ISBN-10
007183589X
ISBN-13
9780071835893
Category
Computers
Pages
304
Language
English
Published
2014-09-12
Publisher
McGraw Hill Professional
Authors
Jim Manico, August Detlefsen

Description

Proven Methods for Building Secure Java-Based Web Applications Develop, deploy, and maintain secure Java applications using the expert techniques and open source libraries described in this Oracle Press guide. Iron-Clad Java presents the processes required to build robust and secure applications from the start and explains how to eliminate existing security bugs. Best practices for authentication, access control, data protection, attack prevention, error handling, and much more are included. Using the practical advice and real-world examples provided in this authoritative resource, you'll gain valuable secure software engineering skills. Establish secure authentication and session management processes Implement a robust access control design for multi-tenant web applications Defend against cross-site scripting, cross-site request forgery, and clickjacking Protect sensitive data while it is stored or in transit Prevent SQL injection and other injection attacks Ensure safe file I/O and upload Use effective logging, error handling, and intrusion detection methods Follow a comprehensive secure software development lifecycle "In this book, Jim Manico and August Detlefsen tackle security education from a technical perspective and bring their wealth of industry knowledge and experience to application designers. A significant amount of thought was given to include the most useful and relevant security content for designers to defend their applications. This is not a book about security theories, it’s the hard lessons learned from those who have been exploited, turned into actionable items for application designers, and condensed into print."—From the Foreword by Milton Smith, Oracle Senior Principal Security Product Manager, Java

Other editions

Similar books

  • Digital Java EE 7 Web Application Development
    By Peter Pilgrim

    ... jmeter.apache.org/ • Java EE 7 Developer Handbook by Peter Pilgrim, Packt Pub, 2013 https:// www.packtpub.com/application-development/java-ee-7-developer- handbook • Iron-Clad Java: Building Secure Web Applications by Jim Manico, ...

  • OCP Oracle Certified Professional Java SE 11 Programmer II Study Guide: Exam 1Z0-816 and Exam 1Z0-817
    By Scott Selikoff, Jeanne Boyarsky

    ... on our book page. http://www.selikoff.net/ocp11-2 This chapter is just a taste of security. To learn more about security beyond the scope of the exam, please read Iron-Clad Java, Jim Manico and August Detlefsen (Oracle Press, 2014).

  • OCP Oracle Certified Professional Java SE 11 Developer Complete Study Guide: Exam 1Z0-815, Exam 1Z0-816, and Exam 1Z0-817
    By Scott Selikoff, Jeanne Boyarsky

    Introduction xxxi FIGURE I.1 Past and current Java certifications Renamed SCJA 5-6 OCJA 6 OCA 7-8 Renamed SCJP 5-6 OCJP 6 OCP 11 OCP 7-8 Figure I.2 shows the exams you need to take in order to earn the latest Java certification if you ...

  • The Statesman's Year-Book
    By F. Martin

    Name Rate Class Guns Tonnage Iris • - Fourth Iron-clad 2 483 Iroquois . - Third Screw 6 695 Jason - Fourth Iron-clad 2 *496 Java - Second Screw 21 2,490 Juniata - Third Screw 8 828 I(earsarge - Third Screw 6 695 Kewaydin - Tourth ...

  • Java Coding Guidelines: 75 Recommendations for Reliable and Secure Programs
    By Robert C. Seacord, Fred Long, Dhruv Mohindra

    75 Recommendations for Reliable and Secure Programs Fred Long, Dhruv Mohindra, Robert C. Seacord, Dean F. Sutherland, David Svoboda ... James Madison University (2008). http:// mikeware.us/thesis/ [Zadegan 2009] Zadegan, Bryant.

  • OAuth 2.0 Cookbook: Protect your web applications using Spring Security
    By Adolfo Eloy Nascimento

    Efficiently integrate OAuth 2.0 to protect your mobile, desktop, Cloud applications and APIs using Spring Security technologies. About This Book Interact with public OAuth 2.0 protected APIs such as Facebook, LinkedIn and Google.

  • The Covenant: A Novel
    By James A. Michener

    The Compagnie in Java had an iron-clad rule. No of— ficial to buy and sell for himself. Only for the Compagnie.” “But his family bought and sold like madmen. And grew very rich.” “And the Compagnie had another iron-clad rule.

  • The CERT Oracle Secure Coding Standard for Java
    By Fred Long

    A set of standard practices has evolved over the years. The Secure® Coding® Standard for Java™ is a compendium of these practices. These are not theoretical research papers or product marketing blurbs.

  • Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World
    By Marcus J. Carey, Jennifer Jin

    This unique guide includes inspiring interviews from 70 security experts, including Lesley Carhart, Ming Chow, Bruce Potter, Robert M. Lee, and Jayson E. Street.

  • The Covenant
    By James Albert Michener

    The Compagnie in Java had an iron - clad rule . No official to buy and sell for himself . Only for the Compagnie . ' ' But his family bought and sold like madmen . And grew very rich . ' ' And the Compagnie had another iron - clad rule ...