000 | 02754nam a22004095i 4500 | ||
---|---|---|---|
001 | vtls000541324 | ||
003 | RU-ToGU | ||
005 | 20210922081916.0 | ||
007 | cr nn 008mamaa | ||
008 | 160915s2014 xxu| s |||| 0|eng d | ||
020 |
_a9781484201480 _9978-1-4842-0148-0 |
||
024 | 7 |
_a10.1007/978-1-4842-0148-0 _2doi |
|
035 | _ato000541324 | ||
040 |
_aSpringer _cSpringer _dRU-ToGU |
||
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
082 | 0 | 4 |
_a005.82 _223 |
100 | 1 |
_aLepofsky, Ron. _eauthor. _9445838 |
|
245 | 1 | 4 |
_aThe Manager’s Guide to Web Application Security: _helectronic resource _bA Concise Guide to the Weaker Side of the Web / _cby Ron Lepofsky. |
260 |
_aBerkeley, CA : _bApress : _bImprint: Apress, _c2014. |
||
300 |
_aXX, 232 p. 11 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
520 | _aThe Manager's Guide to Web Application Security is a concise, information-packed guide to application security risks every organization faces, written in plain language, with guidance on how to deal with those issues quickly and effectively. Often, security vulnerabilities are difficult to understand and quantify because they are the result of intricate programming deficiencies and highly technical issues. Author and noted industry expert Ron Lepofsky breaks down the technical barrier and identifies many real-world examples of security vulnerabilities commonly found by IT security auditors, translates them into business risks with identifiable consequences, and provides practical guidance about mitigating them. The Manager's Guide to Web Application Security describes how to fix and prevent these vulnerabilities in easy-to-understand discussions of vulnerability classes and their remediation. For easy reference, the information is also presented schematically in Excel spreadsheets available to readers for free download from the publisher’s digital annex. The book is current, concise, and to the point—which is to help managers cut through the technical jargon and make the business decisions required to find, fix, and prevent serious vulnerabilities. | ||
650 | 0 |
_aComputer Science. _9155490 |
|
650 | 0 |
_aData encryption (Computer science). _9566260 |
|
650 | 1 | 4 |
_aComputer Science. _9155490 |
650 | 2 | 4 |
_aData Encryption. _9566261 |
710 | 2 |
_aSpringerLink (Online service) _9143950 |
|
773 | 0 | _tSpringer eBooks | |
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-1-4842-0148-0 |
912 | _aZDB-2-CWD | ||
999 | _c398699 |