Committee login






Small thumbnail

Dynamics of Large Structures and Inverse Problems

Mathematical and Mechanical Engineering Set Volume 5

Small thumbnail

Civil Engineering Structures According to the Eurocodes

Small thumbnail

Swelling Concrete in Dams and Hydraulic Structures

DSC 2017

Small thumbnail

Earthquake Occurrence

Short- and Long-term Models and their Validation

Small thumbnail

The Chemostat

Mathematical Theory of Microorganims Cultures

Small thumbnail

From Prognostics and Health Systems Management to Predictive Maintenance 2

Knowledge, Traceability and Decision

Small thumbnail

First Hitting Time Regression Models

Lifetime Data Analysis Based on Underlying Stochastic Processes

Small thumbnail

The Innovative Company

An Ill-defined Object

Small thumbnail

Reading and Writing Knowledge in Scientific Communities

Digital Humanities and Knowledge Construction

Small thumbnail

Going Past Limits To Growth

A Report to the Club of Rome EU-Chapter

Small thumbnail

Safety of Web Applications

Risks, Encryption and Handling Vulnerabilities with PHP

Éric Quinton, National Research Institute of Science and technology for Environment and Agriculture, France

ISBN: 9781785482281

Publication Date: April 2017   Hardback   224 pp.

130.00 USD

Add to cart




Web applications are prime targets for hackers. If a site has poor security, it is more susceptible to hacking, which could lead to sensitive information being leaked. Establishing appropriate security involves first analyzing risk, which consists of an evaluation of information confidentiality, integrity and availability along with a potential threat analysis, should security be breached.
An application must be structured correctly and the Model, View, Controller (MVC) model provides a good example to apply to the site architecture. This type of protection is based on correctly configured servers and encryption.
This book clearly explains how to test software security prior to going online as well as a comprehensive overview of the most common cyber-attacks and how to protect sites against them using PHP. Other sections include user information, rights management, encryption principles and advanced mechanisms to monitor completed actions.


1. Why Do Web Applications Need to be Secure?
2. Estimating Risk.
3. Encryption and Web Server Configuration.
4. Threats and Protecting Against Them.
5. Managing User Logins and Assigning Permissions.
6. Using the MVC Model to Structure the Application.
7. Implementing a Suitable Technical Platform and Testing the Application.

About the Authors

Éric Quinton is a database administrator and responsible for the security of information systems at the National Research Institute of Science and technology for Environment and Agriculture in France.


DownloadTable of Contents - PDF File - 116 Kb

0.02094 s.