
Fortified Web
A comprehensive guide to web application security and protection strategies
No se pudo agregar al carrito
Solo puedes tener X títulos en el carrito para realizar el pago.
Add to Cart failed.
Por favor prueba de nuevo más tarde
Error al Agregar a Lista de Deseos.
Por favor prueba de nuevo más tarde
Error al eliminar de la lista de deseos.
Por favor prueba de nuevo más tarde
Error al añadir a tu biblioteca
Por favor intenta de nuevo
Error al seguir el podcast
Intenta nuevamente
Error al dejar de seguir el podcast
Intenta nuevamente
$0.00 por los primeros 30 días
Escucha audiolibros, podcasts y Audible Originals con Audible Plus por un precio mensual bajo.
Escucha en cualquier momento y en cualquier lugar en tus dispositivos con la aplicación gratuita Audible.
Los suscriptores por primera vez de Audible Plus obtienen su primer mes gratis. Cancela la suscripción en cualquier momento.
Compra ahora por $4.99
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
la tarjeta con terminación
Al confirmar tu compra, aceptas las Condiciones de Uso de Audible y el Aviso de Privacidad de Amazon. Impuestos a cobrar según aplique.
-
Narrado por:
-
Virtual Voice

Este título utiliza narración de voz virtual
Voz Virtual es una narración generada por computadora para audiolibros..
Acerca de esta escucha
Looking to understand why web applications often fall prey to cyber threats? Chapter 3 is a goldmine, with its meticulously designed sections, ranging from software interaction with cybersecurity to securing the boundaries of web applications.
Want to understand protection methods for the most vulnerable entity, user data? Chapter 4 outlines techniques for securing user data in web applications and common pitfalls in user data protection. Chapter 5's detailed account of authentication and authorization, dissecting their roles in cybersecurity, best practices, and more, augments this knowledge.
Chapter 6 delves into the crucial aspect of web application security, that is, the overlooked element of secure coding practices. Understand the vulnerabilities that can be introduced through insecure coding. Chapters 7, 8, and 9 further enhance your knowledge with anti-malware strategies, the pivotal role of firewalls, and secure session & cookies management, respectively.
From preventing cross-site scripting in Chapter 10 to ensuring Security with HTTPS in Chapter 12, the content simplifies the most complicated aspects of web safety within an engaging narrative.
Discover the risk of outdated software dependencies in Chapter 13, and the importance of regular security audits for web applications in Chapter 14. The final chapter, Chapter 15, focuses on Incident Response & Recovery, a crucial component in the realm of cybersecurity.
"Fortified Web" acts as a comprehensive guide, catering to both beginners desiring a solid foundation in cybersecurity and those eager to update their knowledge. Embark on a fascinating exploration into the world of web security with "Fortified Web." Your guide to safeguard your web applications in the unparalleled digital landscape is waiting. Happy reading!
Todavía no hay opiniones