Iron-Clad Java Iron-Clad Java
Oracle Press

Iron-Clad Java

Building Secure Web Applications

    • $47.99
    • $47.99

Publisher Description

Proven Methods for Building Secure Java-Based Web Applications

Develop, deploy, and maintain secure Java applications using the expert techniques and open source libraries described in this Oracle Press guide. Iron-Clad Java presents the processes required to build robust and secure applications from the start and explains how to eliminate existing security bugs. Best practices for authentication, access control, data protection, attack prevention, error handling, and much more are included. Using the practical advice and real-world examples provided in this authoritative resource, you'll gain valuable secure software engineering skills.
Establish secure authentication and session management processes

Implement a robust access control design for multi-tenant web applications

Defend against cross-site scripting, cross-site request forgery, and clickjacking

Protect sensitive data while it is stored or in transit

Prevent SQL injection and other injection attacks

Ensure safe file I/O and upload

Use effective logging, error handling, and intrusion detection methods

Follow a comprehensive secure software development lifecycle




"In this book, Jim Manico and August Detlefsen tackle security education from a technical perspective and bring their wealth of industry knowledge and experience to application designers. A significant amount of thought was given to include the most useful and relevant security content for designers to defend their applications. This is not a book about security theories, it’s the hard lessons learned from those who have been exploited, turned into actionable items for application designers, and condensed into print."—From the Foreword by Milton Smith, Oracle Senior Principal Security Product Manager, Java

GENRE
Computing & Internet
RELEASED
2014
12 September
LANGUAGE
EN
English
LENGTH
304
Pages
PUBLISHER
McGraw Hill LLC
SELLER
McGraw-Hill Global Education Holdings, LLC
SIZE
25.6
MB

More Books Like This

Web Application Security, A Beginner's Guide Web Application Security, A Beginner's Guide
2011
Foundations of Security Foundations of Security
2007
HACKING EXPOSED WEB APPLICATIONS, 3rd Edition HACKING EXPOSED WEB APPLICATIONS, 3rd Edition
2010
API Security: A guide to building and securing APIs from the developer team at Okta API Security: A guide to building and securing APIs from the developer team at Okta
2018
How to Break Web Software How to Break Web Software
2006
Network Security Bible Network Security Bible
2011

Other Books in This Series

Java Programming Java Programming
2011
Oracle Data Guard 11g Handbook Oracle Data Guard 11g Handbook
2009
Applied Oracle Security: Developing Secure Database and Middleware Environments Applied Oracle Security: Developing Secure Database and Middleware Environments
2009
Oracle Database 11g Building Oracle XML DB Applications Oracle Database 11g Building Oracle XML DB Applications
2011
Oracle Database 11g Oracle Real Application Clusters Handbook, 2nd Edition Oracle Database 11g Oracle Real Application Clusters Handbook, 2nd Edition
2011
Oracle Essbase & Oracle OLAP Oracle Essbase & Oracle OLAP
2009