Committee login






Small thumbnail

Nonlinear Theory of Elastic Plates

Small thumbnail

Exterior Algebras

Elementary Tribute to Grassmann's Ideas

Small thumbnail

From Pinch Methodology to Pinch-Exergy Integration of Flexible Systems

Thermodynamics Energy, Environment, Economy Set

Small thumbnail

Data Treatment in Environmental Sciences

Multivaried Approach

Small thumbnail

Gas Hydrates 1

Fundamentals, Characterization and Modeling

Small thumbnail

Smart Decisions in Complex Systems

Small thumbnail

Chi-squared Goodness-of-fit Tests for Censored Data

Stochastic Models in Survival Analysis and Reliability Set Volume 3

Small thumbnail

Baidu SEO

Challenges and Intricacies of Marketing in China

Small thumbnail

Supply Chain Management and Business Performance

The VASC Model

Small thumbnail

Asymmetric Alliances and Information Systems

Issues and Prospects

Small thumbnail

Safety of Web Applications

Risks, Encryption and Handling Vulnerabilities with PHP

Éric Quinton, National Research Institute of Science and technology for Environment and Agriculture, France

ISBN: 9781785482281

Publication Date: April 2017   Hardback   224 pp.

130.00 USD

Add to cart




Web applications are prime targets for hackers. If a site has poor security, it is more susceptible to hacking, which could lead to sensitive information being leaked. Establishing appropriate security involves first analyzing risk, which consists of an evaluation of information confidentiality, integrity and availability along with a potential threat analysis, should security be breached.
An application must be structured correctly and the Model, View, Controller (MVC) model provides a good example to apply to the site architecture. This type of protection is based on correctly configured servers and encryption.
This book clearly explains how to test software security prior to going online as well as a comprehensive overview of the most common cyber-attacks and how to protect sites against them using PHP. Other sections include user information, rights management, encryption principles and advanced mechanisms to monitor completed actions.


1. Why Do Web Applications Need to be Secure?
2. Estimating Risk.
3. Encryption and Web Server Configuration.
4. Threats and Protecting Against Them.
5. Managing User Logins and Assigning Permissions.
6. Using the MVC Model to Structure the Application.
7. Implementing a Suitable Technical Platform and Testing the Application.

About the Authors

Éric Quinton is a database administrator and responsible for the security of information systems at the National Research Institute of Science and technology for Environment and Agriculture in France.


DownloadTable of Contents - PDF File - 116 Kb

0.01835 s.