Image

Contents

     Foreword

     Acknowledgments

     Introduction

 

  1 Web Application Security Basics

     What Is Untrusted Data?

     HTTP Security Considerations

               HTTPS

               HTTP/S GET Request

               HTTP/S POST Request

               HTTP/S Response

               HTTP/S Response Headers

     Anti-Patterns and Weaknesses

               Blacklist Input Validation

               Lack of Parameterized SQL

               Use of Weak or Incorrect Ciphers

     Security Controls and Positive Patterns

               Verify Authentication and Authorization with Every Request

               Protect Transactions with the ...

Get Iron-Clad Java now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.