Identity and Data Security for Web Development: Best Practices
 
Product details:

ISBN13:9781491937013
ISBN10:1491937017
Binding:Paperback
No. of pages:204 pages
Size:232x177x15 mm
Weight:342 g
Language:English
0
Category:

Identity and Data Security for Web Development

Best Practices
 
Edition number: 1
Publisher: O?Reilly
Date of Publication:
Number of Volumes: Print PDF
 
Normal price:

Publisher's listprice:
GBP 31.99
Estimated price in HUF:
15 451 HUF (14 715 HUF + 5% VAT)
Why estimated?
 
Your price:

13 906 (13 244 HUF + 5% VAT )
discount is: 10% (approx 1 545 HUF off)
The discount is only available for 'Alert of Favourite Topics' newsletter recipients.
Click here to subscribe.
 
Availability:

Estimated delivery time: In stock at the publisher, but not at Prospero's office. Delivery time approx. 3-5 weeks.
Not in stock at Prospero.
Can't you provide more accurate information?
 
  Piece(s)

 
Long description:

Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don&&&8217;t understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical guide, you&&&8217;ll learn how and why everyone working on a system needs to ensure that users and data are protected.

Authors Jonathan LeBlanc and Tim Messerschmidt provide a deep dive into the concepts, technology, and programming methodologies necessary to build a secure interface for data and identity&&&8212;without compromising usability. You&&&8217;ll learn how to plug holes in existing systems, protect against viable attack vectors, and work in environments that sometimes are naturally insecure.

  • Understand the state of web and application security today
  • Design security password encryption, and combat password attack vectors
  • Create digital fingerprints to identify users through browser, device, and paired device detection
  • Build secure data transmission systems through OAuth and OpenID Connect
  • Use alternate methods of identification for a second factor of authentication
  • Harden your web applications against attack
  • Create a secure data transmission system using SSL/TLS, and synchronous and asynchronous cryptography