Sahu Satej Kumar / Саху Сатедж Кумар - Building Secure PHP Applications / Создание защищенных приложений на PHP [2024, PDF/EPUB, ENG]

Страницы:  1
Ответить
 

tsurijin

Стаж: 5 лет

Сообщений: 2970


tsurijin · 26-Авг-25 05:34 (3 месяца 8 дней назад, ред. 26-Авг-25 06:28)

Building Secure PHP Applications / Создание защищенных приложений на PHP
Год издания: 2024
Автор: Sahu Satej Kumar / Саху Сатедж Кумар
Издательство: Apress Media LLC
ISBN: 979-8-8688-0932-3
Язык: Английский
Формат: PDF/EPUB
Качество: Издательский макет (eBook)
Количество страниц: 437
Описание: Learn how to protect PHP applications from potential vulnerabilities and attacks. As cyberattacks and data breaches continue to rise, it's crucial for developers and organizations to prioritize security in their PHP applications. The book offers an all-encompassing guide to securing PHP applications, covering topics ranging from PHP core security to web security, framework security (with a focus on Laravel), security standards, and protocol security.
After examining PHP core security and essential topics, such as input validation, output encoding, secure session management, and secure file handling, you’ll move on to common security risks in PHP applications and provides practical examples to demonstrate effective security measures. From there, you’ll delve into web security, addressing XSS, SQL injection, and CSRF, reviewing in-depth explanations and mitigation techniques.
A significant portion of the book focuses on Laravel's built-in security features, guiding readers to avoid common pitfalls. Industry-standard security protocols like HTTP, OAuth, and JSON Web Tokens are explained with demonstrations for how to effectively use them to ensure integrity, confidentiality, and authenticity in web applications. Additionally, protocol security is discussed, including secure communication, file transfer protocols (SFTP), and email handling. Security in cloud and hybrid environments is also discussed.
This book's comprehensive and inclusive approach spans a wide range of security topics related to PHP and ensures that no critical areas are overlooked. It goes beyond theoretical concepts by providing practical guidance and actionable steps. It includes code snippets, real-world examples, case studies, and hands-on exercises, enabling you to apply the knowledge gained in practical scenarios. Building Secure PHP Applications provides a holistic approach to security, empowering you to build robust and resilient PHP applications.
What You Will Learn
Understand industry-recognized security standards and compliance requirements for data protection regulations.
Learn the intricacies of Laravel and how to leverage its security features.
Integrate security practices throughout the development lifecycle, conducting security testing and reviews and adopting secure deployment and DevOps practices.
Conduct forensic analysis and perform post-incident analysis for continuous improvement.
Look to the future and discover emerging security threats and techniques to anticipate and mitigate potential security risks.
Who This Book Is For
Primarily written for developers, security professionals, and webmasters involved in PHP application development. Additionally, this book may be used as a reference for students studying web development, PHP programming or cybersecurity
Узнайте, как защитить PHP-приложения от потенциальных уязвимостей и атак. Поскольку число кибератак и утечек данных продолжает расти, разработчикам и организациям крайне важно уделять приоритетное внимание безопасности своих PHP-приложений. Книга представляет собой всеобъемлющее руководство по обеспечению безопасности PHP-приложений, охватывающее различные темы, от безопасности ядра PHP до веб-безопасности, безопасности фреймворка (с акцентом на Laravel), стандартов безопасности и безопасности протоколов.
После изучения основ безопасности PHP и основных тем, таких как проверка ввода, кодирование вывода, безопасное управление сеансами и безопасная обработка файлов, вы перейдете к общим угрозам безопасности в приложениях PHP и приведете практические примеры, демонстрирующие эффективные меры безопасности. Далее вы углубитесь в веб-безопасность, познакомитесь с XSS, SQL-инъекциями и CSRF, ознакомитесь с подробными объяснениями и методами защиты.
Значительная часть книги посвящена встроенным функциям безопасности Laravel, которые помогают читателям избежать распространенных ошибок. Стандартные отраслевые протоколы безопасности, такие как HTTP, OAuth и веб-токены JSON, объясняются с демонстрацией того, как эффективно использовать их для обеспечения целостности, конфиденциальности и аутентичности в веб-приложениях. Кроме того, обсуждается безопасность протоколов, включая защищенную связь, протоколы передачи файлов (SFTP) и обработку электронной почты. Также обсуждается безопасность в облачных и гибридных средах.
Всеобъемлющий подход этой книги охватывает широкий спектр вопросов безопасности, связанных с PHP, и гарантирует, что ни одна критическая область не будет упущена из виду. Она выходит за рамки теоретических концепций и содержит практические рекомендации и практические шаги. В него включены фрагменты кода, реальные примеры, тематические исследования и практические упражнения, которые позволят вам применить полученные знания в практических ситуациях. Создание защищенных приложений на PHP обеспечивает целостный подход к безопасности, позволяя создавать надежные и устойчивые приложения на PHP.
Что вы узнаете
Разберитесь в признанных отраслевых стандартах безопасности и требованиях к соблюдению правил защиты данных.
Изучите тонкости Laravel и способы использования его функций безопасности.
Интегрируйте методы обеспечения безопасности на протяжении всего жизненного цикла разработки, проводя тестирование и проверки безопасности, а также внедряя методы безопасного развертывания и DevOps.
Проводите судебно-медицинскую экспертизу и анализ после инцидента для постоянного совершенствования.
Смотрите в будущее и находите новые угрозы безопасности, а также методы, позволяющие предвидеть и смягчать потенциальные риски безопасности.
Для кого предназначена эта книга
В первую очередь она предназначена для разработчиков, специалистов по безопасности и веб-мастеров, занимающихся разработкой приложений на PHP. Кроме того, эта книга может быть использована в качестве справочного материала для студентов, изучающих веб-разработку, программирование на PHP или кибербезопасность
Примеры страниц (скриншоты)
Оглавление
About the Author ........................................................................................xxi
About the Technical Reviewer .......................................................................xxiii
Acknowledgments .......................................................................................xxv
Introduction .............................................................................................. xxvii
Chapter 1: Introduction to PHP Application Security .........................................1
What Is Application Security? ........................................................................1
Protection of Software Applications ................................................................2
Identification of Vulnerabilities ........................................................................2
Lifecycle Approach ..........................................................................................3
Security Testing ...............................................................................................4
Secure Development Practices .......................................................................4
Authentication and Authorization ....................................................................4
Data Protection ................................................................................................5
Incident Response ...........................................................................................5
Compliance and Regulations ...........................................................................6
Importance of Security .....................................................................................6
Role of Application Developer in Security .............................................................7
Understanding the PHP Security Landscape .......................................................13
Core PHP Security .........................................................................................14
Framework-Specific Security ...........................................................................15
Ecosystem Security .......................................................................................15
The Impact of Security Vulnerabilities in PHP Applications ...................................15
Data Breaches ...............................................................................................16
Financial Loss ................................................................................................16
Reputation Damage .......................................................................................16
Operational Disruption ...................................................................................17
Legal Consequences .......................................................................................17
User Impact ...................................................................................................17
Mitigation Costs .............................................................................................18
Long-Term Impact .........................................................................................18
Damage Beyond the Application ......................................................................18
Operational Inefficiency .................................................................................19
Common Attack Vectors and Threats ................................................................19
Phishing Attacks ............................................................................................19
Malware .........................................................................................................19
Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks .............20
SQL Injection .................................................................................................20
Cross-Site Scripting (XSS) .............................................................................20
Cross-Site Request Forgery (CSRF) ...............................................................21
Man-in-the-Middle (MitM) Attacks ................................................................21
Social Engineering .........................................................................................21
Insider Threats ...............................................................................................21
Zero-Day Vulnerabilities ................................................................................22
Credential Theft .............................................................................................22
IoT Vulnerabilities ..........................................................................................22
Cryptojacking ................................................................................................22
Supply Chain Attacks .....................................................................................23
Advanced Persistent Threats (APTs) ..............................................................23
Principles of Secure PHP Application Development ............................................23
Security by Design .........................................................................................24
Secure Coding Practices ...............................................................................25
Authentication and Authorization ..................................................................25
Session Management ....................................................................................26
File Uploads ...................................................................................................27
Error Handling and Logging ...........................................................................27
Security Updates and Patch Management ....................................................28
Secure Communication .................................................................................28
Security Testing and Code Reviews ...............................................................29
Incident Response Plan .................................................................................29
Summary ............................................................................................................30
Chapter 2: PHP Core Security .............................................................................31
The Great PHP Update Debate ............................................................................32
Why Does PHP Version Matters? .........................................................................33
Security Updates ...........................................................................................33
End of Life (EOL) ............................................................................................34
Best Practices ................................................................................................35
Performance and Efficiency ..........................................................................36
Compatibility ..................................................................................................37
Vendor and Application Support ....................................................................38
Secure PHP Configuration ...................................................................................40
php.ini ............................................................................................................41
Directives .......................................................................................................42
Per-Directory Configuration ...........................................................................42
Runtime Configuration ...................................................................................42
Extensions .....................................................................................................43
Security .........................................................................................................43
Common Settings ..........................................................................................43
Error Reporting (“display_errors”, “error_reporting”) .........................................44
“expose_php = Off” ......................................................................................45
“error_reporting = E_ALL” .............................................................................46
“display_errors = Off” ...................................................................................47
“display_startup_errors = Off” .....................................................................47
“log_errors = On” ..........................................................................................48
“error_log = /valid_path/PHP-logs/php_error.log” .......................................48
“ignore_repeated_errors = Off” ....................................................................49
File Inclusion (“allow_url_fopen”, “allow_url_include”) ...............................50
SQL Injection Prevention (“magic_quotes_gpc”, “mysqli”) ..........................50
File Uploads (“upload_max_filesize”, “post_max_size”) ..............................51
“file_uploads = On” .......................................................................................52
“upload_tmp_dir = /path/PHP-uploads/” ......................................................53
“upload_max_filesize = 2M” ........................................................................53
“post_max_size = 5M” .................................................................................54
“max_file_uploads = 2” ................................................................................55
Session Management (“session.cookie_secure”, “session.cookie_httponly”) ............56
Session Data Storage and Management .............................................................57
session.save_path .........................................................................................57
session.name ................................................................................................57
Session Initialization and Handling .....................................................................57
session.auto_start .........................................................................................57
session.use_trans_sid ...................................................................................58
Session Cookie Configuration .........................................................................58
session.cookie_domain .................................................................................58
session.cookie_secure ..................................................................................58
session.cookie_httponly ................................................................................58
session.cookie_samesite ..............................................................................59
Session Security Enhancements .........................................................................59
session.use_strict_mode ..............................................................................59
session.use_cookies and session.use_only_cookies ...........................................59
session.cookie_lifetime .................................................................................59
Additional Security Measures .............................................................................60
session.cache_expire ....................................................................................60
session.sid_length ........................................................................................60
session.sid_bits_per_character ....................................................................60
session.hash_function and session.hash_bits_per_character .....................60
Access Controls (“open_basedir”, “disable_functions”) ...............................61
“enable_dl = Off” ..........................................................................................61
“disable_functions = ” ..................................................................................62
“disable_classes = ...” ..................................................................................63
Other PHP General Settings ................................................................................63
doc_root and open_basedir ..........................................................................64
include_path ..................................................................................................65
extension_dir .................................................................................................65
mime_magic.magicfile ..................................................................................66
allow_webdav_methods ...............................................................................66
session.gc_maxlifetime .................................................................................67
session.referer_check = /application/path ...................................................67
memory_limit = .............................................................................................68
max_execution_time = .................................................................................68
report_memleaks = On .................................................................................69
track_errors = Off .........................................................................................69
html_errors = Off ..........................................................................................70
Input Validation and Sanitization Techniques ......................................................71
Preventing Injection Attacks ..........................................................................72
Mitigating Data Exposure ..............................................................................72
Safeguarding Against Parameter Manipulation .............................................72
Defending Against Cross-Site Scripting (XSS) ...............................................72
Blocking Cross-Site Request Forgery (CSRF) Attacks ...................................73
Enhancing Data Integrity ...............................................................................73
Preventing Application Logic Abuse ..............................................................73
Strengthening Database Security ..................................................................73
Ensuring Compliance .....................................................................................73
Minimizing Attack Surfaces ...........................................................................74
Maintaining User Trust ...................................................................................74
Facilitating Future Development ...................................................................74
Data Filtering and Validation Functions .........................................................74
Regular Expressions ......................................................................................75
Allowed List and Denied List .........................................................................76
Escape Output ...............................................................................................76
Parameterized Queries ..................................................................................77
Cross-Site Request Forgery (CSRF) Tokens ...................................................77
Content Security Policy (CSP) ........................................................................79
HTTP Security Headers ..................................................................................80
File Upload Validation ....................................................................................80
Input Sanitization ...........................................................................................82
Prevention of SQL Injection ...........................................................................83
Mitigation of Cross-Site Scripting (XSS) ........................................................83
Preventing Cross-Site Request Forgery (CSRF) .............................................83
Protection Against Data Tampering ...............................................................84
Defense Against File Upload Exploits ............................................................84
Reducing Attack Surface ...............................................................................84
Enhanced User Experience ............................................................................84
Compliance with Security Best Practices ......................................................85
Long-Term Maintenance and Security ..........................................................85
Stripping HTML Tags ......................................................................................85
Filtering Special Characters ..........................................................................86
Using “htmlspecialchars( )” for Output Escaping ...........................................86
Preventing SQL Injection with Prepared Statements .....................................86
Handling File Uploads Securely .....................................................................87
Filtering User-Generated URLs ......................................................................87
Removing or Escaping Control Characters ....................................................88
Handling Sessions and Cookies Securely ...........................................................88
Cookies ..........................................................................................................89
Sessions ........................................................................................................89
Secure File Handling and Uploads ....................................................................110
Limit File Types ............................................................................................114
Rename Uploaded Files ...............................................................................114
Use a Secure Directory ................................................................................115
Set Appropriate Permissions .......................................................................115
Validate File Size .........................................................................................115
Use a Randomized Upload Path ...................................................................116
Prevent Double Extensions ..........................................................................116
Validate and Sanitize File Names ................................................................116
Regularly Clean the Uploads Directory ........................................................117
Implement an Authentication and Authorization System .............................117
Securing Database Operations in PHP ..............................................................117
Use Prepared Statements (Parameterized Queries) ....................................119
Input Validation and Sanitization .................................................................119
Authentication and Authorization ................................................................120
Limit Database Privileges ............................................................................120
Protect Database Credentials ......................................................................120
Validate User Input for Query Parameters ...................................................120
Regularly Update and Patch ........................................................................121
Error Handling .............................................................................................121
Logging and Monitoring ...............................................................................122
Secure Your Environment ............................................................................122
Data Encryption ...........................................................................................122
Summary ....................................................................................................123
Chapter 3: Web Security for PHP Applications ...................................................125
Principles of Web Application Security ..............................................................126
Defense in Depth .........................................................................................127
Least Privilege .............................................................................................129
Input Validation ............................................................................................131
Secure Coding Practices .............................................................................132
Authentication and Authorization ................................................................133
Secure Session Management ......................................................................137
Custom Middleware or Access Control Lists (ACL) ..........................................138
Encryption ...................................................................................................140
Error Handling .............................................................................................145
Session Management ..................................................................................145
Web Application Firewalls (WAFs) ...............................................................146
Regular Security Testing ..............................................................................147
Patch Management .....................................................................................149
Data Validation .............................................................................................150
Security Headers .........................................................................................151
Security by Design .......................................................................................152
Incident Response Plan ...............................................................................153
User Education ............................................................................................155
Vendor Security ...........................................................................................157
Protecting Against Cross-Site Scripting (XSS) Attacks .....................................161
Output Encoding ..........................................................................................164
Content Security Policy (CSP) ......................................................................165
Input Validation ............................................................................................165
Use Prepared Statements (Database Queries) ............................................166
Avoid Dynamic JavaScript Generation .........................................................166
HTTP-Only Cookies ......................................................................................166
Use Security Libraries .................................................................................167
Regular Security Testing ..............................................................................167
Security Training ..........................................................................................167
Mitigating Cross-Site Request Forgery (CSRF) Attack ........................................168
Unauthorized Actions ...................................................................................168
Data Manipulation .......................................................................................168
Financial Loss ..............................................................................................169
Data Exposure .............................................................................................169
Authentication Bypass .................................................................................169
Session Hijacking ........................................................................................169
Reputation Damage .....................................................................................170
Legal and Compliance Issues ......................................................................170
Summary ....................................................................................................174
Chapter 4: Framework Security ......................................................................177
Introduction to Laravel Security Features .........................................................178
Cross-Site Request Forgery (CSRF) Protection ...............................................178
Cross-Site Scripting (XSS) Protection ..........................................................183
SQL Injection Protection ..............................................................................186
Authentication and Authorization ................................................................189
Session Security ..........................................................................................199
File Upload Security .....................................................................................205
Middleware for Additional Protection ..........................................................212
HTTPS and Secure Configuration ................................................................216
Secure Configuration and Deployment in Laravel .............................................224
Protecting Sensitive Information .................................................................224
Preventing Security Vulnerabilities ..............................................................224
Enforcing HTTPS for Secure Communication ..............................................225
Implementing HTTP Strict Transport Security (HSTS) ..................................225
Maintaining Production-Ready Environments .............................................225
Enhancing Overall Application Security .......................................................226
Protecting Routes, Middleware, and Controllers ...............................................232
1. Access Control and Authorization ............................................................233
2. Input Validation and Sanitization .............................................................233
3. Defense Against Attacks and Security Policies .......................................233
4. Logging and Monitoring ...........................................................................234
Security Best Practices .....................................................................................238
Role-Based Access Control (RBAC) .............................................................239
Middleware ..................................................................................................239
Policies ........................................................................................................239
Authorization in Controllers .........................................................................239
Middleware Parameters ..............................................................................240
Error Handling .............................................................................................240
Route Grouping ............................................................................................240
Securing Laravel Database Operations .............................................................241
Summary ..........................................................................................................246
Chapter 5: Security Standards and Best Practices ...........................................249
OWASP Top Ten: Key Web Application Security Risks .......................................251
Injection (SQL, NoSQL, OS) ..........................................................................251
Cross-Site Scripting (XSS) ...........................................................................251
Broken Authentication .................................................................................252
Insecure Direct Object References (IDOR) ...................................................252
Security Misconfigurations ..........................................................................252
Sensitive Data Exposure ..............................................................................253
Missing Function-Level Access Control .......................................................253
Cross-Site Request Forgery (CSRF) .............................................................254
Using Components with Known Vulnerabilities ...........................................254
Unvalidated Redirects and Forwards ...........................................................255
Secure Coding Practices and Code Reviews .....................................................255
Secure Coding Practices in PHP ..................................................................256
Input Validation and Sanitization .................................................................256
Password Handling ......................................................................................257
Session Management ..................................................................................257
Error Handling .............................................................................................258
File Upload Security .....................................................................................258
Cross-Site Request Forgery (CSRF) Tokens .................................................259
Data Validation and Sanitization ..................................................................259
Secure Password Recovery .........................................................................260
Content Security Policy (CSP) ......................................................................260
Database Connection Security ....................................................................260
Session Security ..........................................................................................261
SSL/TLS Usage ............................................................................................261
Secure Coding Practices in Laravel .............................................................262
Middleware for Authentication and Authorization .......................................262
Use Laravel’s Authentication System ..........................................................263
Validation with Requests .............................................................................263
Authorization with Policies and Gates .........................................................264
Use Eloquent ORM Safely ............................................................................264
Cross-Site Request Forgery (CSRF) Protection ............................................265
Secure Session Management ......................................................................265
Content Security Policy (CSP) ......................................................................266
Use Dependency Injection ...........................................................................266
Database Migrations and Seeders ..............................................................266
Use HTTPS ...................................................................................................267
Code Reviews ..............................................................................................267
Peer Reviews ...............................................................................................269
Static Code Analysis ....................................................................................269
Security Linters and Scanners ....................................................................270
Checklist-Based Reviews ............................................................................270
Automated Testing .......................................................................................270
Security-Related Packages in Laravel ..............................................................271
Laravel Bouncer (for Authorization) .............................................................271
Laravel Sanctum (for API Authentication) ....................................................272
Laravel Debugbar (for Debugging and Profiling) .........................................273
Laravel Scout (for Full-Text Search) ............................................................274
Laravel Telescope (for Monitoring and Debugging) .....................................275
Laravel Nova (for Admin Panel) ...................................................................276
Spatie Laravel Activitylog (for Activity Logging) ..........................................277
Intervention Image (for Image Handling) .....................................................278
Laravel Dusk (for Browser Testing) ..............................................................278
Laravel Medialibrary (for Media Management) ...........................................279
Secure Authentication and Authorization Mechanisms .....................................280
Importance of Secure Authentication and Authorization .............................280
Secure Authentication and Authorization in PHP .........................................281
Laravel Sanctum (for API Authentication) ....................................................282
Laravel Passport (for OAuth2) ......................................................................283
Laravel Breeze (for Starter Kits) ..................................................................284
Laravel Fortify (for Custom Authentication) .................................................284
Security Testing and Vulnerability Assessments ...............................................291
Importance of Security Testing and Vulnerability Assessments ..................291
Security Testing and Vulnerability Assessment Practices: ...........................292
Static Application Security Testing (SAST) ...................................................292
Dynamic Application Security Testing (DAST) ..............................................292
Dependency Scanning .................................................................................293
Container Image Scanning ..........................................................................293
Security Headers .........................................................................................294
Automated Security Testing in CI/CD ...........................................................294
Secure Deployment and DevOps Considerations ..............................................299
General Secure Deployment and DevOps Considerations ...........................300
PHP and Laravel-Specific Deployment Considerations ...............................303
Secure Deployment Code Practices (Example Using Ansible) .....................305
General Secure Deployment Code Practices ...............................................307
Summary .................................................................................................314
Chapter 6: Protocol Security ........................................................................315
Securing HTTP Communications: SSL/TLS and HTTPS .....................................315
HTTPS ......................................................................................................320
SSL (Secure Sockets Layer) and TLS (Transport Layer Security) .......................323
Usage of SSL/TLS/HTTPS in the Context of PHP Application .............................327
Web Server Configurations ..........................................................................327
Forced HTTPS in Laravel ..............................................................................330
HSTS (HTTP Strict Transport Security) .........................................................330
Mixed Content Handling ..............................................................................331
Laravel Mix ..................................................................................................331
Testing .........................................................................................................332
Securely Handling User Input and Data Transmission ......................................332
Code Samples and Examples in Laravel ......................................................334
Securing API Communication: OAuth, JWT, and API Security Best Practices ....337
Code Samples and Examples in Laravel ......................................................340
Implementing Transport Layer Security (TLS) for Email Communication ..........342
Key Reasons for Implementing TLS for Email Communication ........................342
Confidentiality .............................................................................................342
Configuring Laravel for TLS Email Communication ............................................343
Summary ...................................................................................................345
Chapter 7: Incident Response and Security Monitoring ......................................347
Developing an Incident Response Plan .............................................................348
Identifying Stakeholders ..............................................................................348
Define Incident Severity Levels ...................................................................349
Establish Communication Channels ............................................................351
Create an Incident Response Team (IRT) .....................................................354
Document PHP Application Architecture ......................................................356
Implement Monitoring and Logging .............................................................359
Define Incident Response Procedures .........................................................361
Test Incident Response Plan ........................................................................363
Incident Reporting and Escalation ...............................................................366
Post-incident Analysis and Improvement ....................................................368
Training and Awareness ..............................................................................371
Legal and Regulatory Compliance ...............................................................373
Incident Communication and Escalation Procedures ........................................377
Define Communication Channels ................................................................377
Designate Communication Roles .................................................................377
Incident Reporting Process .........................................................................378
Internal Communication Procedures ...........................................................378
External Communication Procedures ..........................................................378
Incident Severity Classification ...................................................................379
Escalation Matrix .........................................................................................379
Response Time Objectives (RTOs) and Service-Level Agreements (SLAs) ..........379
Incident Notification Templates ...................................................................379
Training and Awareness ..............................................................................380
Documentation and Post-incident Analysis .................................................380
Legal and Regulatory Compliance ...............................................................380
Forensic Analysis and Post-incident Analysis ...................................................381
Implementing Security Monitoring and Intrusion Detection Systems ...............384
Summary ..................................................................................................386
Chapter 8: Future Trends in PHP Application Security .......................................389
Emerging Security Threats and Attack Techniques ...........................................389
Advancements in Security Tools and Technologies ...........................................391
The Role of AI and Machine Learning in PHP Application Security .......................393
Integrating LLMs and Generative AI Technologies into PHP Application
Security ....................................................................................................395
Securing Microservices and Serverless Architectures .....................................397
Implement Proper Authentication and Authorization ......................................397
Secure Communication Channels ................................................................397
Apply the Principle of Least Privilege ..........................................................398
Implement Defense in Depth .......................................................................398
Monitor and Logging ...................................................................................398
Continuous Vulnerability Management ........................................................399
Secure Deployment and Configuration ........................................................399
Implement Rate Limiting and Throttling ......................................................399
Container and Function Security .................................................................399
Security Testing and Compliance ................................................................400
Summary ................................................................................................400
Index ......................................................................................................403
Download
Rutracker.org не распространяет и не хранит электронные версии произведений, а лишь предоставляет доступ к создаваемому пользователями каталогу ссылок на торрент-файлы, которые содержат только списки хеш-сумм
Как скачивать? (для скачивания .torrent файлов необходима регистрация)
[Профиль]  [ЛС] 

Maddesto

Стаж: 16 лет 4 месяца

Сообщений: 104

Maddesto · 22-Ноя-25 02:55 (спустя 2 месяца 26 дней)

потешно смотреть, как какие-то индусы, явно с индийским опытом разработки, написали книгу о безопасности, в кратком описании автора сказано ровно 0 о его опыте работы и куча воды, попахивает написанием книги ради книги, может чтобы было что показать в консульстве при получении рабочей визы в сами знаете какие страны
[Профиль]  [ЛС] 
 
Ответить
Loading...
Error