ASP.Net core security / created by Christan Wenz.
Material type:
- text
- unmediated
- volume
- 9781633439986
- TK5105.59 WEN
Item type | Current library | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|
![]() |
Batanai Library Open Shelf | TK5105.59 WEN (Browse shelf(Opens below)) | 162666 | Available | BK150658 | ||
![]() |
Harare Campus Library Open Shelf | TK5105.59 WEN (Browse shelf(Opens below)) | 162664 | Available | BK150688 | ||
![]() |
Main Library Open Shelf | TK5105.59 WEN (Browse shelf(Opens below)) | 162663 | Available | BK150717 | ||
![]() |
Zvishavane Mining Sciences Library Open Shelf | TK5105.59 WEN (Browse shelf(Opens below)) | 162665 | Available | BK150718 |
Browsing Batanai Library shelves, Shelving location: Open Shelf Close shelf browser (Hides shelf browser)
No cover image available | No cover image available | No cover image available | ||||||
TK5104MAR Satelite communications systems systems, techniques and technology | TK5105.15PAU Digital video distribution in broadband, television, mobile and converged networks | TK 5105.5 WAL High - perfomance communication networks. : | TK5105.59 WEN ASP.Net core security / | TK5105.875.I57 BUR Intronet : | TK5105.875.I57 BUR Intronet : | TK 5105.875.I57 MCB The internet made simple. |
Includes bibliographical references and index.
table of contents PART 1: FIRSTS STEPS READ IN LIVEBOOK 1ON WEB APPLICATION SECURITY PART 2: MITIGATING COMMON ATTACKS READ IN LIVEBOOK 2CROSS-SITE SCRIPTING (XSS) READ IN LIVEBOOK 3ATTACKING SESSION MANAGEMENT READ IN LIVEBOOK 4CROSS-SITE REQUEST FORGERY READ IN LIVEBOOK 5UNVALIDATED DATA READ IN LIVEBOOK 6SQL INJECTION (AND OTHER INJECTIONS) PART 3: SECURE DATA STORAGE READ IN LIVEBOOK 7STORING SECRETS READ IN LIVEBOOK 8HANDLING PASSWORDS PART 4: CONFIGURATION READ IN LIVEBOOK 9HTTP HEADERS READ IN LIVEBOOK 10ERROR HANDLING READ IN LIVEBOOK 11LOGGING AND HEALTH CHECKS PART 5: AUTHENTICATION AND AUTHORIZATION READ IN LIVEBOOK 12SECURING WEB APPLICATIONS WITH ASP.NET CORE IDENTITY 13 SECURING APIS AND SINGLE PAGE APPLICATIONS (SPAS) PART 6: SECURITY AS A PROCESS 14 ECURE DEPENDENCIES 15 AUDIT TOOLS 16 OWASP TOP TEN
ASP.NET Core Security teaches you the skills and countermeasures you need to keep your ASP.NET Core apps secure from the most common web application attacks. With this collection of practical techniques, you will be able to anticipate risks and introduce practices like testing as regular security checkups. You'll be fascinated as the author explores real-world security breaches, including rogue Firefox extensions and Adobe password thefts. The examples present universal security best practices with a sharp focus on the unique needs of ASP.NET Core applications
There are no comments on this title.