Book description
Most enterprise applications today live on the network edge, right where attackers are focusing increasing attention and activities to gain access to your data. This practical report helps analyze your company’s vulnerabilities to common web application security threats, such as malicious bots, application exploits, API attacks, DDoS attacks, and server-based malware. You’ll learn proactive steps to implement services and strategies designed to protect online enterprise applications at the user edge.
Authors Stephen Gates, edge security evangelist and SME at Oracle Dyn, and Allan Liska, threat intelligence architect at Recorded Future, explore how advanced DNS services, web application firewall (WAF) services, bot management, API security, DDoS defenses, and malware protection solutions combine to protect your sites and applications from malicious attacks and bad actors.
- Understand the current web application threats landscape
- Prioritize availability, confidentiality, and integrity and manage associated security risks
- Explore the role of DNS in maintaining availability
- Learn how to approach cloud-based web application security
- Plan your strategy with a web application security checklist
Table of contents
- 1. Introduction
- 2. Threats Targeting Your Web Applications
- 3. Malicious Bots Threatening Web Applications
- 4. Prioritizing Your Web Application Security Defenses
- 5. Maintaining Availability: A DNS-Based Approach
- 6. Managing Threats to Data Confidentiality and Integrity
- 7. Web Application Security: Planning Your Next Move
Product information
- Title: Securing Web Applications
- Author(s):
- Release date: July 2018
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9781492040262
You might also like
book
Web Security for Developers
The world has changed. Today, every time you make a site live, you’re opening it up …
book
End-to-End Network Security: Defense-in-Depth
End-to-End Network Security Defense-in-Depth Best practices for assessing and improving network defenses and responding to security …
book
Practical Internet of Things Security - Second Edition
A practical, indispensable security guide that will navigate you through the complex realm of securely building …
book
Securing Network Infrastructure
Plug the gaps in your network's infrastructure with resilient network security models Key Features Develop a …