Get Free Shipping on orders over $79
Security for Web Developers : Using JavaScript, HTML, and CSS - John Paul Mueller

Security for Web Developers

Using JavaScript, HTML, and CSS

By: John Paul Mueller

eText | 10 November 2015 | Edition Number 1

At a Glance

eText


$53.89

or 4 interest-free payments of $13.47 with

 or 

Instant online reading in your Booktopia eTextbook Library *

Why choose an eTextbook?

Instant Access *

Purchase and read your book immediately

Read Aloud

Listen and follow along as Bookshelf reads to you

Study Tools

Built-in study tools like highlights and more

* eTextbooks are not downloadable to your eReader or an app and can be accessed via web browsers only. You must be connected to the internet and have no technical issues with your device or browser that could prevent the eTextbook from operating.

As a web developer, you may not want to spend time making your web app secure, but it definitely comes with the territory. This practical guide provides you with the latest information on how to thwart security threats at several levels, including new areas such as microservices. You'll learn how to help protect your app no matter where it runs, from the latest smartphone to an older desktop, and everything in between.

Author John Paul Mueller delivers specific advice as well as several security programming examples for developers with a good knowledge of CSS3, HTML5, and JavaScript. In five separate sections, this book shows you how to protect against viruses, DDoS attacks, security breaches, and other nasty intrusions.

  • Create a security plan for your organization that takes the latest devices and user needs into account
  • Develop secure interfaces, and safely incorporate third-party code from libraries, APIs, and microservices
  • Use sandboxing techniques, in-house and third-party testing techniques, and learn to think like a hacker
  • Implement a maintenance cycle by determining when and how to update your application software
  • Learn techniques for efficiently tracking security threats as well as training requirements that your organization can use
on
Desktop
Tablet
Mobile

More in Data Encryption