
Identity and Data Security for Web Development
Best Practices
- Publisher's listprice GBP 31.99
-
The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.
- Discount 10% (cc. 1 619 Ft off)
- Discounted price 14 571 Ft (13 877 Ft + 5% VAT)
Subcribe now and take benefit of a favourable price.
Subscribe
16 190 Ft
Availability
Estimated delivery time: In stock at the publisher, but not at Prospero's office. Delivery time approx. 3-5 weeks.
Not in stock at Prospero.
Why don't you give exact delivery time?
Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.
Product details:
- Edition number 1
- Publisher O?Reilly
- Date of Publication 21 June 2016
- Number of Volumes Print PDF
- ISBN 9781491937013
- Binding Paperback
- No. of pages204 pages
- Size 232x177x15 mm
- Weight 342 g
- Language English 0
Categories
Long description:
Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don&&&8217;t understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical guide, you&&&8217;ll learn how and why everyone working on a system needs to ensure that users and data are protected.
Authors Jonathan LeBlanc and Tim Messerschmidt provide a deep dive into the concepts, technology, and programming methodologies necessary to build a secure interface for data and identity&&&8212;without compromising usability. You&&&8217;ll learn how to plug holes in existing systems, protect against viable attack vectors, and work in environments that sometimes are naturally insecure.
- Understand the state of web and application security today
- Design security password encryption, and combat password attack vectors
- Create digital fingerprints to identify users through browser, device, and paired device detection
- Build secure data transmission systems through OAuth and OpenID Connect
- Use alternate methods of identification for a second factor of authentication
- Harden your web applications against attack
- Create a secure data transmission system using SSL/TLS, and synchronous and asynchronous cryptography