Committee login






Small thumbnail

Reliability Investigation of LED Devices for Public Light Applications

Durability, Robustness and Reliability of Photonic Devices Set

Small thumbnail

Aerospace Actuators 2

Signal-by-Wire and Power-by-Wire

Small thumbnail

Flash Memory Integration

Performance and Energy Considerations

Small thumbnail

Mechanics of Aeronautical Solids, Materials and Structures

Small thumbnail

Engineering Investment Process

Making Value Creation Repeatable

Small thumbnail

Space Strategy

Small thumbnail

Distributed Systems

Concurrency and Consistency

Small thumbnail

Fatigue of Textile and Short Fiber Reinforced Composites

Durability and Ageing of Organic Composite Materials Set Volume 1

Small thumbnail

Management of the Effects of Coastal Storms

Policy, Scientific and Historical Perspectives

Small thumbnail

Computational Color Science

Variational Retinex-like Methods

Small thumbnail

Safety of Web Applications

Risks, Encryption and Handling Vulnerabilities with PHP

Éric Quinton, National Research Institute of Science and technology for Environment and Agriculture, France

ISBN: 9781785482281

Publication Date: March 2017   Hardback   224 pp.

130.00 USD

Add to cart




Web applications are prime targets for hackers. If a site has poor security, it is more susceptible to hacking, which could lead to sensitive information being leaked. Establishing appropriate security involves first analyzing risk, which consists of an evaluation of information confidentiality, integrity and availability along with a potential threat analysis, should security be breached.
An application must be structured correctly and the Model, View, Controller (MVC) model provides a good example to apply to the site architecture. This type of protection is based on correctly configured servers and encryption.
This book clearly explains how to test software security prior to going online as well as a comprehensive overview of the most common cyber-attacks and how to protect sites against them using PHP. Other sections include user information, rights management, encryption principles and advanced mechanisms to monitor completed actions.


1. Why Do Web Applications Need to be Secure?
2. Estimating Risk.
3. Encryption and Web Server Configuration.
4. Threats and Protecting Against Them.
5. Managing User Logins and Assigning Permissions.
6. Using the MVC Model to Structure the Application.
7. Implementing a Suitable Technical Platform and Testing the Application.

About the Authors

Éric Quinton is a database administrator and responsible for the security of information systems at the National Research Institute of Science and technology for Environment and Agriculture in France.


DownloadTable of Content - PDF File - 116 Kb

0.01793 s.