Skip to Content
Expert PHP and MySQL®
book

Expert PHP and MySQL®

by Andrew Curioso, Ronald Bradford, Patrick Galbraith
March 2010
Intermediate to advanced
622 pages
15h 16m
English
Wrox
Content preview from Expert PHP and MySQL®

Chapter 14. Security

WHAT'S IN THIS CHAPTER?

  • Identifying the limitations of default MySQL security

  • Learning best practices for providing a more secure MySQL installation

  • Identifying the ideal privileges for client access to the database

  • Encrypting and decrypting data using PHP

  • Creating secure hash values using PHP

  • Preventing common exploits including cross-site scripting, SQL injection, as well as some lesser-known exploits

Security is a critical component of any application software. It's often overlooked and implemented insufficiently due to lack of time or commitment which can translate into a less robust and secure option. Yet it only takes one weak link to destroy a site or brand's reputation.

To ensure that best practices are part of the solution to a secure product, adequate data security must be a prerequisite to commencing development. In fact, it's imperative that applications follow all the rules and best practices outlined in this chapter. This chapter creates a path to securing an application; you'll looks at hardening your MySQL server, encrypting and decrypting data in PHP, and some techniques for overcoming common vulnerabilities.

HARDENING YOUR MYSQL SERVER

A default MySQL installation fails to provide adequate best practices in database security. This section discusses these limitations and then various means of improving security including:

  • Operating system security

  • MySQL security permissions

  • Database privileges

  • Other security options

Installation Defaults

When installed, MySQL ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.

Read now

Unlock full access

More than 5,000 organizations count on O’Reilly

AirBnbBlueOriginElectronic ArtsHomeDepotNasdaqRakutenTata Consultancy Services

QuotationMarkO’Reilly covers everything we've got, with content to help us build a world-class technology community, upgrade the capabilities and competencies of our teams, and improve overall team performance as well as their engagement.
Julian F.
Head of Cybersecurity
QuotationMarkI wanted to learn C and C++, but it didn't click for me until I picked up an O'Reilly book. When I went on the O’Reilly platform, I was astonished to find all the books there, plus live events and sandboxes so you could play around with the technology.
Addison B.
Field Engineer
QuotationMarkI’ve been on the O’Reilly platform for more than eight years. I use a couple of learning platforms, but I'm on O'Reilly more than anybody else. When you're there, you start learning. I'm never disappointed.
Amir M.
Data Platform Tech Lead
QuotationMarkI'm always learning. So when I got on to O'Reilly, I was like a kid in a candy store. There are playlists. There are answers. There's on-demand training. It's worth its weight in gold, in terms of what it allows me to do.
Mark W.
Embedded Software Engineer

You might also like

Jump Start PHP Environment

Jump Start PHP Environment

Bruno Skvorc
PHP 7 Programming Blueprints

PHP 7 Programming Blueprints

Jose Palala, Martin Helmich

Publisher Resources

ISBN: 9780470563120Purchase book