Protecting your web applications solutions and strategies to combat cybersecurity threats
Websites, applications, and online services are critical business assets, but these services are also among the most vulnerable to attack. When cyberthreats succeed, your company can quickly drop customers, lose revenue, and suffer brand damage. This practical ebook explores today's major threa...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Sebastopol, CA
O'Reilly Media
[2019]
|
Ausgabe: | First edition. |
Schlagworte: | |
Online-Zugang: | lizenzpflichtig |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-048593389 | ||
003 | DE-627-1 | ||
005 | 20240228120824.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191206s2019 xx |||||o 00| ||eng c | ||
035 | |a (DE-627-1)048593389 | ||
035 | |a (DE-599)KEP048593389 | ||
035 | |a (ORHE)9781492052791 | ||
035 | |a (DE-627-1)048593389 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
100 | 1 | |a Sloper, Gary |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Protecting your web applications |b solutions and strategies to combat cybersecurity threats |c Gary Sloper and Ken Hess |
250 | |a First edition. | ||
264 | 1 | |a Sebastopol, CA |b O'Reilly Media |c [2019] | |
264 | 4 | |c ©2019 | |
300 | |a 1 online resource (1 volume) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references. - Online resource; title from title page (Safari, viewed July 1, 2019) | ||
520 | |a Websites, applications, and online services are critical business assets, but these services are also among the most vulnerable to attack. When cyberthreats succeed, your company can quickly drop customers, lose revenue, and suffer brand damage. This practical ebook explores today's major threat patterns and provides security professionals with strategies and techniques for preventing and protecting against a host of attacks. Gary Sloper, a vice president at Oracle Dyn, and industry journalist Ken Hess examine current dangers to cloud-based everything-as-a-service (XaaS) offerings--a threat landscape as big and diverse as the internet itself. You'll learn how attackers have become successful and explore current remedies to counteract their efforts. This ebook also looks at the future of web application protection according to industry experts. Get an overview of today's top cyberthreats and their impact on businesses Protect web applications from evolving threats using an integrated approach Use industry guidelines to help prevent injection, XSS, and session hijacking attacks Learn why companies are moving threat protection to third-party entities and the cloud Build layered security with firewalls, multifactor authentication, AI, secure programming, and data analytics. | ||
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a World Wide Web |x Security measures | |
650 | 0 | |a Web sites |x Security measures | |
650 | 0 | |a Computer crimes | |
650 | 0 | |a Web applications | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Web ; Sécurité ; Mesures | |
650 | 4 | |a Sites Web ; Sécurité ; Mesures | |
650 | 4 | |a Criminalité informatique | |
650 | 4 | |a Applications Web | |
650 | 4 | |a Computer crimes | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Web applications | |
650 | 4 | |a Web sites ; Security measures | |
650 | 4 | |a World Wide Web ; Security measures | |
700 | 1 | |a Hess, Ken |e VerfasserIn |4 aut | |
856 | 4 | 0 | |l TUM01 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781492052791/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-048593389 |
---|---|
_version_ | 1818767279805956097 |
adam_text | |
any_adam_object | |
author | Sloper, Gary Hess, Ken |
author_facet | Sloper, Gary Hess, Ken |
author_role | aut aut |
author_sort | Sloper, Gary |
author_variant | g s gs k h kh |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)048593389 (DE-599)KEP048593389 (ORHE)9781492052791 |
edition | First edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03178cam a22005292 4500</leader><controlfield tag="001">ZDB-30-ORH-048593389</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120824.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191206s2019 xx |||||o 00| ||eng c</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)048593389</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP048593389</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781492052791</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)048593389</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Sloper, Gary</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Protecting your web applications</subfield><subfield code="b">solutions and strategies to combat cybersecurity threats</subfield><subfield code="c">Gary Sloper and Ken Hess</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Sebastopol, CA</subfield><subfield code="b">O'Reilly Media</subfield><subfield code="c">[2019]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2019</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 volume)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references. - Online resource; title from title page (Safari, viewed July 1, 2019)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Websites, applications, and online services are critical business assets, but these services are also among the most vulnerable to attack. When cyberthreats succeed, your company can quickly drop customers, lose revenue, and suffer brand damage. This practical ebook explores today's major threat patterns and provides security professionals with strategies and techniques for preventing and protecting against a host of attacks. Gary Sloper, a vice president at Oracle Dyn, and industry journalist Ken Hess examine current dangers to cloud-based everything-as-a-service (XaaS) offerings--a threat landscape as big and diverse as the internet itself. You'll learn how attackers have become successful and explore current remedies to counteract their efforts. This ebook also looks at the future of web application protection according to industry experts. Get an overview of today's top cyberthreats and their impact on businesses Protect web applications from evolving threats using an integrated approach Use industry guidelines to help prevent injection, XSS, and session hijacking attacks Learn why companies are moving threat protection to third-party entities and the cloud Build layered security with firewalls, multifactor authentication, AI, secure programming, and data analytics.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">World Wide Web</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Web sites</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Web applications</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Web ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sites Web ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Criminalité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Applications Web</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Web applications</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Web sites ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">World Wide Web ; Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hess, Ken</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781492052791/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-048593389 |
illustrated | Not Illustrated |
indexdate | 2024-12-18T08:47:22Z |
institution | BVB |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource (1 volume) |
psigel | ZDB-30-ORH |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | O'Reilly Media |
record_format | marc |
spelling | Sloper, Gary VerfasserIn aut Protecting your web applications solutions and strategies to combat cybersecurity threats Gary Sloper and Ken Hess First edition. Sebastopol, CA O'Reilly Media [2019] ©2019 1 online resource (1 volume) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references. - Online resource; title from title page (Safari, viewed July 1, 2019) Websites, applications, and online services are critical business assets, but these services are also among the most vulnerable to attack. When cyberthreats succeed, your company can quickly drop customers, lose revenue, and suffer brand damage. This practical ebook explores today's major threat patterns and provides security professionals with strategies and techniques for preventing and protecting against a host of attacks. Gary Sloper, a vice president at Oracle Dyn, and industry journalist Ken Hess examine current dangers to cloud-based everything-as-a-service (XaaS) offerings--a threat landscape as big and diverse as the internet itself. You'll learn how attackers have become successful and explore current remedies to counteract their efforts. This ebook also looks at the future of web application protection according to industry experts. Get an overview of today's top cyberthreats and their impact on businesses Protect web applications from evolving threats using an integrated approach Use industry guidelines to help prevent injection, XSS, and session hijacking attacks Learn why companies are moving threat protection to third-party entities and the cloud Build layered security with firewalls, multifactor authentication, AI, secure programming, and data analytics. Computer networks Security measures World Wide Web Security measures Web sites Security measures Computer crimes Web applications Réseaux d'ordinateurs ; Sécurité ; Mesures Web ; Sécurité ; Mesures Sites Web ; Sécurité ; Mesures Criminalité informatique Applications Web Computer networks ; Security measures Web sites ; Security measures World Wide Web ; Security measures Hess, Ken VerfasserIn aut TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781492052791/?ar X:ORHE Aggregator lizenzpflichtig Volltext |
spellingShingle | Sloper, Gary Hess, Ken Protecting your web applications solutions and strategies to combat cybersecurity threats Computer networks Security measures World Wide Web Security measures Web sites Security measures Computer crimes Web applications Réseaux d'ordinateurs ; Sécurité ; Mesures Web ; Sécurité ; Mesures Sites Web ; Sécurité ; Mesures Criminalité informatique Applications Web Computer networks ; Security measures Web sites ; Security measures World Wide Web ; Security measures |
title | Protecting your web applications solutions and strategies to combat cybersecurity threats |
title_auth | Protecting your web applications solutions and strategies to combat cybersecurity threats |
title_exact_search | Protecting your web applications solutions and strategies to combat cybersecurity threats |
title_full | Protecting your web applications solutions and strategies to combat cybersecurity threats Gary Sloper and Ken Hess |
title_fullStr | Protecting your web applications solutions and strategies to combat cybersecurity threats Gary Sloper and Ken Hess |
title_full_unstemmed | Protecting your web applications solutions and strategies to combat cybersecurity threats Gary Sloper and Ken Hess |
title_short | Protecting your web applications |
title_sort | protecting your web applications solutions and strategies to combat cybersecurity threats |
title_sub | solutions and strategies to combat cybersecurity threats |
topic | Computer networks Security measures World Wide Web Security measures Web sites Security measures Computer crimes Web applications Réseaux d'ordinateurs ; Sécurité ; Mesures Web ; Sécurité ; Mesures Sites Web ; Sécurité ; Mesures Criminalité informatique Applications Web Computer networks ; Security measures Web sites ; Security measures World Wide Web ; Security measures |
topic_facet | Computer networks Security measures World Wide Web Security measures Web sites Security measures Computer crimes Web applications Réseaux d'ordinateurs ; Sécurité ; Mesures Web ; Sécurité ; Mesures Sites Web ; Sécurité ; Mesures Criminalité informatique Applications Web Computer networks ; Security measures Web sites ; Security measures World Wide Web ; Security measures |
url | https://learning.oreilly.com/library/view/-/9781492052791/?ar |
work_keys_str_mv | AT slopergary protectingyourwebapplicationssolutionsandstrategiestocombatcybersecuritythreats AT hessken protectingyourwebapplicationssolutionsandstrategiestocombatcybersecuritythreats |