Pro PHP Security Corrected , Cor Edition Contributor(s): Snyder, Chris (Author), Southwell, Michael (Author) |
|||||||
ISBN: 1590595084 ISBN-13: 9781590595084 Publisher: Apress
WE WILL NOT BE UNDERSOLD! Click here for our low price guarantee Binding Type: Paperback - See All Available Formats & Editions Published: September 2005 Annotation: "Pro PHP Security" is arguably the most comprehensive PHP security book available, and is highly recommended to any developer or administrator of a PHP-based Web site. -- Michael J. Ross, Slashdot contributor "Pro PHP Security" is one of the first books devoted solely to PHP security. It will serve as your complete guide for taking defensive and proactive security measures within your PHP applications. (And the methods discussed are compatible with PHP versions 3, 4, and 5.) The knowledge you'll gain from this comprehensive guide will help you prevent attackers from potentially disrupting site operation or destroying data. And you'll learn about various security measures, for example, creating and deploying "captchas," validating e-mail, fending off SQL injection attacks, and preventing cross-site scripting attempts. |
Additional Information |
BISAC Categories: - Computers | Programming Languages - General - Computers | Web - Web Programming - Computers | Security - General |
Dewey: 004 |
Physical Information: 1.07" H x 7.06" W x 9.22" L (1.79 lbs) 528 pages |
Features: Illustrated, Index, Price on Product, Table of Contents |
Descriptions, Reviews, Etc. |
Publisher Description: Pro PHP Security is one of the first books devoted solely to PHP security. It will serve as your complete guide for taking defensive and proactive security measures within your PHP applications. The methods discussed are compatible with PHP versions 3, 4, and 5. The knowledge you'll gain from this comprehensive guide will help you prevent attackers from potentially disrupting site operation or destroying data. And you'll learn about various security measures, for example, creating and deploying "captchas," validating e-mail, fending off SQL injection attacks, and preventing cross-site scripting attempts. |
Customer ReviewsSubmit your own review |
To tell a friend about this book, you must Sign In First! |