• Contact

  • Newsletter

  • About us

  • Delivery options

  • Prospero Book Market Podcast

  • Iron-Clad Java: Building Secure Web Applications

    Iron-Clad Java by Manico, Jim; Detlefsen, August;

    Building Secure Web Applications

    Series: Oracle Press;

      • GET 10% OFF

      • The discount is only available for 'Alert of Favourite Topics' newsletter recipients.
      • Publisher's listprice GBP 43.99
      • The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.

        21 016 Ft (20 015 Ft + 5% VAT)
      • Discount 10% (cc. 2 102 Ft off)
      • Discounted price 18 914 Ft (18 014 Ft + 5% VAT)

    21 016 Ft

    db

    Availability

    printed on demand

    Why don't you give exact delivery time?

    Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.

    Product details:

    • Publisher McGraw Hill
    • Date of Publication 16 October 2014

    • ISBN 9780071835886
    • Binding Paperback
    • No. of pages304 pages
    • Size 231x188x17 mm
    • Weight 515 g
    • Language English
    • 0

    Categories

    Short description:

    Develop, deploy, and maintain secure Java applications using the expert techniques and open source libraries in this Oracle Press guide. The book presents the processes required to build robust and secure applications from the start and explains how to eliminate existing security bugs.

    More

    Long description:

    Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.


    Proven Methods for Building Secure Java-Based Web Applications

    Develop, deploy, and maintain secure Java applications using the expert techniques and open source libraries described in this Oracle Press guide. Iron-Clad Java presents the processes required to build robust and secure applications from the start and explains how to eliminate existing security bugs. Best practices for authentication, access control, data protection, attack prevention, error handling, and much more are included. Using the practical advice and real-world examples provided in this authoritative resource, you'll gain valuable secure software engineering skills.

    • Establish secure authentication and session management processes
    • Implement a robust access control design for multi-tenant web applications
    • Defend against cross-site scripting, cross-site request forgery, and clickjacking
    • Protect sensitive data while it is stored or in transit
    • Prevent SQL injection and other injection attacks
    • Ensure safe file I/O and upload
    • Use effective logging, error handling, and intrusion detection methods
    • Follow a comprehensive secure software development lifecycle

    "In this book, Jim Manico and August Detlefsen tackle security education from a technical perspective and bring their wealth of industry knowledge and experience to application designers. A significant amount of thought was given to include the most useful and relevant security content for designers to defend their applications. This is not a book about security theories, it’s the hard lessons learned from those who have been exploited, turned into actionable items for application designers, and condensed into print." ―From the Foreword by Milton Smith, Oracle Senior Principal Security Product Manager, Java



    Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.


    Proven Methods for Building Secure Java-Based Web Applications

    Develop, deploy, and maintain secure Java applications using the expert techniques and open source libraries described in this Oracle Press guide. Iron-Clad Java presents the processes required to build robust and secure applications from the start and explains how to eliminate existing security bugs. Best practices for authentication, access control, data protection, attack prevention, error handling, and much more are included. Using the practical advice and real-world examples provided in this authoritative resource, you'll gain valuable secure software engineering skills.

    • Establish secure authentication and session management processes
    • Implement a robust access control design for multi-tenant web applications
    • Defend against cross-site scripting, cross-site request forgery, and clickjacking
    • Protect sensitive data while it is stored or in transit
    • Prevent SQL injection and other injection attacks
    • Ensure safe file I/O and upload
    • Use effective logging, error handling, and intrusion detection methods
    • Follow a comprehensive secure software development lifecycle

    "In this book, Jim Manico and August Detlefsen tackle security education from a technical perspective and bring their wealth of industry knowledge and experience to application designers. A significant amount of thought was given to include the most useful and relevant security content for designers to defend their applications. This is not a book about security theories, it’s the hard lessons learned from those who have been exploited, turned into actionable items for application designers, and condensed into print." ―From the Foreword by Milton Smith, Oracle Senior Principal Security Product Manager, Java

    More

    Table of Contents:

    Chapter 1: Web Application Security Basics
    Chapter 2. Authentication and Session Management
    Chapter 3: Access Control
    Chapter 4: Cross-Site Scripting Defense
    Chapter 5: Cross-Site Request Forgery Defense and Clickjacking
    Chapter 6: Protecting Sensitive Data
    Chapter 7: SQL Injection and Other Injection Attacks
    Chapter 8: Safe File Upload and File I/O
    Chapter 9: Logging, Error Handling, and Intrusion Detection
    Chapter 10: Secure Software Development Lifecycle
    Appendix: Resources

    More
    0