Software vulnerabilities: Web applications are constructed from numerous technologies, typically a database ...
© Frank M. Kromann 2018
Frank M. KromannBeginning PHP and MySQLhttps://doi.org/10.1007/978-1-4302-6044-8_1919. Secure PHP Programming
Frank M. Kromann1
(1)
Aliso Viejo, CA, USA
Any web site or service exposed on the Internet can be thought of as a castle under constant attack by a sea of barbarians. And as the history of both conventional and information warfare shows, the attacker’s victory isn’t entirely dependent upon their degree of skill or cunning, but rather on an oversight in the castle defense. As keeper of the electronic kingdom, you’re faced with no small number of potential ingresses from which havoc can be wrought, including notably:
Get Beginning PHP and MySQL: From Novice to Professional now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.