My Account Log in

1 option

SECURE DEVELOPMENT FOR MOBILE APPS : how to design and code secure mobile applications with php ... and javascript.

O'Reilly Online Learning: Academic/Public Library Edition Available online

View online
Format:
Book
Author/Creator:
Glaser, J. D.
Series:
Auerbach Book
Language:
English
Subjects (All):
Portable computers--Programming.
Portable computers.
Mobile computing--Security measures.
Mobile computing.
Application software--Development.
Application software.
Mobile communication systems--Security measures.
Mobile communication systems.
PHP (Computer program language).
Physical Description:
1 online resource (460 p.)
Edition:
1st ed.
Place of Publication:
[Place of publication not identified] CRC Press, 2017.
Language Note:
English
Summary:
The world is becoming increasingly mobile. Smartphones and tablets have become more powerful and popular, with many of these devices now containing confidential business, financial, and personal information. This has led to a greater focus on mobile software security. Establishing mobile software security should be of primary concern to every mobile application developer. This book explains how you can create mobile social applications that incorporate security throughout the development process.Although there are many books that address security issues, most do not explain how to incorporate
Contents:
Front Cover; Contents; Foreword; Introduction; Industry Analysis; Preface; Acknowledgments; Biography; Chapter 1: Introduction to Mobile Security Development; Chapter 2: Web Application Attack Surface; Chapter 3: PHP Security Anti-Patterns; Chapter 4: PHP Essential Security; Chapter 5: PHP Security Tools Overview; Chapter 6: UTF-8 for PHP and MySQL; Chapter 7: Project Layout Template; Chapter 8: Separation of Concerns; Chapter 9: PHP and PDO; Chapter 10: Template Strategy Patterns; Chapter 11: Modern PHP Encryption; Chapter 12: Professional Exception and Error Handling
Chapter 13: Secure Session ManagementChapter 14: Secure Session Storage; Chapter 15: Secure Forms and Account Registration; Chapter 16: Secure Client Server Form Validation; Chapter 17: Secure File Uploading; Chapter 18: Secure JSON Requests; Chapter 19: Google Maps, YouTube, and jQuery Mobile; Chapter 20: Twitter Authentication and SSL cURL; Chapter 21: Secure AJAX Shopping Cart; Chapter 22: Common Facebook Canvas Vulnerability Points; Appendix; Back Cover
Notes:
Description based upon print version of record.
Includes bibliographical references.
Description based on print version record.
ISBN:
1-04-005671-7
0-429-06954-5
1-138-42802-7
1-4822-0903-9
9780429069543
OCLC:
1080588430

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account