9781491937013-1491937017-Identity and Data Security for Web Development: Best Practices

Identity and Data Security for Web Development: Best Practices

ISBN-13: 9781491937013
ISBN-10: 1491937017
Edition: 1
Author: Jonathan LeBlanc, Tim Messerschmidt
Publication date: 2016
Publisher: O'Reilly Media
Format: Paperback 201 pages
FREE US shipping
Buy

From $33.99

Book details

ISBN-13: 9781491937013
ISBN-10: 1491937017
Edition: 1
Author: Jonathan LeBlanc, Tim Messerschmidt
Publication date: 2016
Publisher: O'Reilly Media
Format: Paperback 201 pages

Summary

Identity and Data Security for Web Development: Best Practices (ISBN-13: 9781491937013 and ISBN-10: 1491937017), written by authors Jonathan LeBlanc, Tim Messerschmidt, was published by O'Reilly Media in 2016. With an overall rating of 3.7 stars, it's a notable title among other Cybernetics (Computer Science, Network Administration, Networking & Cloud Computing, Programming, Web Development & Design, Internet & Social Media, Encryption, Security & Encryption, Cryptography) books. You can easily purchase or rent Identity and Data Security for Web Development: Best Practices (Paperback) from BooksRun, along with many other new and used Cybernetics books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.67.

Description

Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don’t understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical guide, you’ll learn how and why everyone working on a system needs to ensure that users and data are protected.

Authors Jonathan LeBlanc and Tim Messerschmidt provide a deep dive into the concepts, technology, and programming methodologies necessary to build a secure interface for data and identity—without compromising usability. You’ll learn how to plug holes in existing systems, protect against viable attack vectors, and work in environments that sometimes are naturally insecure.

  • Understand the state of web and application security today
  • Design security password encryption, and combat password attack vectors
  • Create digital fingerprints to identify users through browser, device, and paired device detection
  • Build secure data transmission systems through OAuth and OpenID Connect
  • Use alternate methods of identification for a second factor of authentication
  • Harden your web applications against attack
  • Create a secure data transmission system using SSL/TLS, and synchronous and asynchronous cryptography
Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book