Image

Contents

     Foreword

     Acknowledgments

     Introduction

 

  1 Web Application Security Basics

     What Is Untrusted Data?

     HTTP Security Considerations

               HTTPS

               HTTP/S GET Request

               HTTP/S POST Request

               HTTP/S Response

               HTTP/S Response Headers

     Anti-Patterns and Weaknesses

               Blacklist Input Validation

               Lack of Parameterized SQL

               Use of Weak or Incorrect Ciphers

     Security Controls and Positive Patterns

               Verify Authentication and Authorization with Every Request

               Protect Transactions with the ...

Get Iron-Clad Java now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.