O'Reilly logo

PHP, MySQL, & JavaScript All-in-One For Dummies by Richard Blum

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 4

Considering PHP Security

IN THIS CHAPTER

check Identifying PHP attacks

check Stopping cross-site scripts

check Hiding your files

check Watching for data spoofing

check Handling data safely

Web application security is a hot topic these days, and for good reason! It seems that almost every day there’s a news story about some company being attacked and having important data stolen. These breaches are costly — both for the company and for the thousands of customers who have personal information stolen.

As a web application developer, your job is to put security first in all your design and coding work. You’re the front line in the battle of data security! This chapter helps with that job, by giving you an idea of the types of attacks you need to watch out for and then walking you through how to avoid those attacks with your PHP code.

Exploring PHP Vulnerabilities

To avoid attacks, you first need to know where they’ll come from. It doesn’t do any good to barricade the front door, if you leave the windows ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required