O'Reilly logo

Securing PHP Web Applications by William Ballad, Tricia Ballad

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

17 Plan B: Plugging the Holes in Your Existing Application

It’s a lot harder to secure an application that’s already been written than it is to write it securely in the first place. Unfortunately, it’s also a much more common scenario. That’s just life, so in this chapter we give you some concrete ways to harden an existing application.

Set Up Your Environment

If you’re already using a three-stage deployment system, you’re ahead of the pack and odds are your code is more stable and more secure because of it. If not, read this section carefully and give some serious thought to implementing this type of system.

Using a Three-Stage Deployment

The three stages of deployment are development, test, and production. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required