Description
Proven Methods for Building Protected Java-Based Web Applications
Develop, deploy, and care for Protected Java applications The use of the expert techniques and open source libraries described in this Oracle Press guide. Iron-Clad Java presents the processes required to build robust and Protected applications from the start and explains how to do away with existing security bugs. Best practices for authentication, access regulate, data protection, attack prevention, error handling, and a lot more are included. The use of the practical advice and real-world examples provided in this authoritative resource, you’ll be able to gain valuable Protected software engineering skills.
- Establish Protected authentication and session management processes
- Implement a robust access regulate design for multi-tenant web applications
- Defend against cross-site scripting, cross-site request forgery, and clickjacking
- Protect sensitive data at the same time as it is stored or in transit
- Prevent SQL injection and other injection attacks
- Ensure secure file I/O and upload
- Use effective logging, error handling, and intrusion detection methods
- Follow a comprehensive Protected software development lifecycle
“In this book, Jim Manico and August Detlefsen tackle security education from a technical perspective and bring their wealth of industry knowledge and experience to application designers. A significant amount of thought used to be given to include the most useful and relevant security content for designers to defend their applications. This is not a book about security theories, it’s the hard lessons learned from those who have been exploited, turned into actionable items for application designers, and condensed into print.” ―From the Foreword by Milton Smith, Oracle Senior Principal Security Product Manager, Java