Protecting your web applications solutions and strategies to combat cybersecurity threats

Websites, applications, and online services are critical business assets, but these services are also among the most vulnerable to attack. When cyberthreats succeed, your company can quickly drop customers, lose revenue, and suffer brand damage. This practical ebook explores today's major threa...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Sloper, Gary (VerfasserIn), Hess, Ken (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Sebastopol, CA O'Reilly Media [2019]
Ausgabe:First edition.
Schlagworte:
Online-Zugang:lizenzpflichtig
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000cam a22000002 4500
001 ZDB-30-ORH-048593389
003 DE-627-1
005 20240228120824.0
007 cr uuu---uuuuu
008 191206s2019 xx |||||o 00| ||eng c
035 |a (DE-627-1)048593389 
035 |a (DE-599)KEP048593389 
035 |a (ORHE)9781492052791 
035 |a (DE-627-1)048593389 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
100 1 |a Sloper, Gary  |e VerfasserIn  |4 aut 
245 1 0 |a Protecting your web applications  |b solutions and strategies to combat cybersecurity threats  |c Gary Sloper and Ken Hess 
250 |a First edition. 
264 1 |a Sebastopol, CA  |b O'Reilly Media  |c [2019] 
264 4 |c ©2019 
300 |a 1 online resource (1 volume) 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
500 |a Includes bibliographical references. - Online resource; title from title page (Safari, viewed July 1, 2019) 
520 |a Websites, applications, and online services are critical business assets, but these services are also among the most vulnerable to attack. When cyberthreats succeed, your company can quickly drop customers, lose revenue, and suffer brand damage. This practical ebook explores today's major threat patterns and provides security professionals with strategies and techniques for preventing and protecting against a host of attacks. Gary Sloper, a vice president at Oracle Dyn, and industry journalist Ken Hess examine current dangers to cloud-based everything-as-a-service (XaaS) offerings--a threat landscape as big and diverse as the internet itself. You'll learn how attackers have become successful and explore current remedies to counteract their efforts. This ebook also looks at the future of web application protection according to industry experts. Get an overview of today's top cyberthreats and their impact on businesses Protect web applications from evolving threats using an integrated approach Use industry guidelines to help prevent injection, XSS, and session hijacking attacks Learn why companies are moving threat protection to third-party entities and the cloud Build layered security with firewalls, multifactor authentication, AI, secure programming, and data analytics. 
650 0 |a Computer networks  |x Security measures 
650 0 |a World Wide Web  |x Security measures 
650 0 |a Web sites  |x Security measures 
650 0 |a Computer crimes 
650 0 |a Web applications 
650 4 |a Réseaux d'ordinateurs ; Sécurité ; Mesures 
650 4 |a Web ; Sécurité ; Mesures 
650 4 |a Sites Web ; Sécurité ; Mesures 
650 4 |a Criminalité informatique 
650 4 |a Applications Web 
650 4 |a Computer crimes 
650 4 |a Computer networks ; Security measures 
650 4 |a Web applications 
650 4 |a Web sites ; Security measures 
650 4 |a World Wide Web ; Security measures 
700 1 |a Hess, Ken  |e VerfasserIn  |4 aut 
856 4 0 |l TUM01  |p ZDB-30-ORH  |q TUM_PDA_ORH  |u https://learning.oreilly.com/library/view/-/9781492052791/?ar  |m X:ORHE  |x Aggregator  |z lizenzpflichtig  |3 Volltext 
912 |a ZDB-30-ORH 
912 |a ZDB-30-ORH 
951 |a BO 
912 |a ZDB-30-ORH 
049 |a DE-91 

Datensatz im Suchindex

DE-BY-TUM_katkey ZDB-30-ORH-048593389
_version_ 1818767279805956097
adam_text
any_adam_object
author Sloper, Gary
Hess, Ken
author_facet Sloper, Gary
Hess, Ken
author_role aut
aut
author_sort Sloper, Gary
author_variant g s gs
k h kh
building Verbundindex
bvnumber localTUM
collection ZDB-30-ORH
ctrlnum (DE-627-1)048593389
(DE-599)KEP048593389
(ORHE)9781492052791
edition First edition.
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03178cam a22005292 4500</leader><controlfield tag="001">ZDB-30-ORH-048593389</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120824.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191206s2019 xx |||||o 00| ||eng c</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)048593389</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP048593389</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781492052791</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)048593389</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Sloper, Gary</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Protecting your web applications</subfield><subfield code="b">solutions and strategies to combat cybersecurity threats</subfield><subfield code="c">Gary Sloper and Ken Hess</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Sebastopol, CA</subfield><subfield code="b">O'Reilly Media</subfield><subfield code="c">[2019]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2019</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 volume)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references. - Online resource; title from title page (Safari, viewed July 1, 2019)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Websites, applications, and online services are critical business assets, but these services are also among the most vulnerable to attack. When cyberthreats succeed, your company can quickly drop customers, lose revenue, and suffer brand damage. This practical ebook explores today's major threat patterns and provides security professionals with strategies and techniques for preventing and protecting against a host of attacks. Gary Sloper, a vice president at Oracle Dyn, and industry journalist Ken Hess examine current dangers to cloud-based everything-as-a-service (XaaS) offerings--a threat landscape as big and diverse as the internet itself. You'll learn how attackers have become successful and explore current remedies to counteract their efforts. This ebook also looks at the future of web application protection according to industry experts. Get an overview of today's top cyberthreats and their impact on businesses Protect web applications from evolving threats using an integrated approach Use industry guidelines to help prevent injection, XSS, and session hijacking attacks Learn why companies are moving threat protection to third-party entities and the cloud Build layered security with firewalls, multifactor authentication, AI, secure programming, and data analytics.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">World Wide Web</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Web sites</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Web applications</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Web ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sites Web ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Criminalité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Applications Web</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Web applications</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Web sites ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">World Wide Web ; Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hess, Ken</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781492052791/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection>
id ZDB-30-ORH-048593389
illustrated Not Illustrated
indexdate 2024-12-18T08:47:22Z
institution BVB
language English
open_access_boolean
owner DE-91
DE-BY-TUM
owner_facet DE-91
DE-BY-TUM
physical 1 online resource (1 volume)
psigel ZDB-30-ORH
publishDate 2019
publishDateSearch 2019
publishDateSort 2019
publisher O'Reilly Media
record_format marc
spelling Sloper, Gary VerfasserIn aut
Protecting your web applications solutions and strategies to combat cybersecurity threats Gary Sloper and Ken Hess
First edition.
Sebastopol, CA O'Reilly Media [2019]
©2019
1 online resource (1 volume)
Text txt rdacontent
Computermedien c rdamedia
Online-Ressource cr rdacarrier
Includes bibliographical references. - Online resource; title from title page (Safari, viewed July 1, 2019)
Websites, applications, and online services are critical business assets, but these services are also among the most vulnerable to attack. When cyberthreats succeed, your company can quickly drop customers, lose revenue, and suffer brand damage. This practical ebook explores today's major threat patterns and provides security professionals with strategies and techniques for preventing and protecting against a host of attacks. Gary Sloper, a vice president at Oracle Dyn, and industry journalist Ken Hess examine current dangers to cloud-based everything-as-a-service (XaaS) offerings--a threat landscape as big and diverse as the internet itself. You'll learn how attackers have become successful and explore current remedies to counteract their efforts. This ebook also looks at the future of web application protection according to industry experts. Get an overview of today's top cyberthreats and their impact on businesses Protect web applications from evolving threats using an integrated approach Use industry guidelines to help prevent injection, XSS, and session hijacking attacks Learn why companies are moving threat protection to third-party entities and the cloud Build layered security with firewalls, multifactor authentication, AI, secure programming, and data analytics.
Computer networks Security measures
World Wide Web Security measures
Web sites Security measures
Computer crimes
Web applications
Réseaux d'ordinateurs ; Sécurité ; Mesures
Web ; Sécurité ; Mesures
Sites Web ; Sécurité ; Mesures
Criminalité informatique
Applications Web
Computer networks ; Security measures
Web sites ; Security measures
World Wide Web ; Security measures
Hess, Ken VerfasserIn aut
TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781492052791/?ar X:ORHE Aggregator lizenzpflichtig Volltext
spellingShingle Sloper, Gary
Hess, Ken
Protecting your web applications solutions and strategies to combat cybersecurity threats
Computer networks Security measures
World Wide Web Security measures
Web sites Security measures
Computer crimes
Web applications
Réseaux d'ordinateurs ; Sécurité ; Mesures
Web ; Sécurité ; Mesures
Sites Web ; Sécurité ; Mesures
Criminalité informatique
Applications Web
Computer networks ; Security measures
Web sites ; Security measures
World Wide Web ; Security measures
title Protecting your web applications solutions and strategies to combat cybersecurity threats
title_auth Protecting your web applications solutions and strategies to combat cybersecurity threats
title_exact_search Protecting your web applications solutions and strategies to combat cybersecurity threats
title_full Protecting your web applications solutions and strategies to combat cybersecurity threats Gary Sloper and Ken Hess
title_fullStr Protecting your web applications solutions and strategies to combat cybersecurity threats Gary Sloper and Ken Hess
title_full_unstemmed Protecting your web applications solutions and strategies to combat cybersecurity threats Gary Sloper and Ken Hess
title_short Protecting your web applications
title_sort protecting your web applications solutions and strategies to combat cybersecurity threats
title_sub solutions and strategies to combat cybersecurity threats
topic Computer networks Security measures
World Wide Web Security measures
Web sites Security measures
Computer crimes
Web applications
Réseaux d'ordinateurs ; Sécurité ; Mesures
Web ; Sécurité ; Mesures
Sites Web ; Sécurité ; Mesures
Criminalité informatique
Applications Web
Computer networks ; Security measures
Web sites ; Security measures
World Wide Web ; Security measures
topic_facet Computer networks Security measures
World Wide Web Security measures
Web sites Security measures
Computer crimes
Web applications
Réseaux d'ordinateurs ; Sécurité ; Mesures
Web ; Sécurité ; Mesures
Sites Web ; Sécurité ; Mesures
Criminalité informatique
Applications Web
Computer networks ; Security measures
Web sites ; Security measures
World Wide Web ; Security measures
url https://learning.oreilly.com/library/view/-/9781492052791/?ar
work_keys_str_mv AT slopergary protectingyourwebapplicationssolutionsandstrategiestocombatcybersecuritythreats
AT hessken protectingyourwebapplicationssolutionsandstrategiestocombatcybersecuritythreats