Secure development for mobile apps : how to design and code secure mobile applications with PHP and JavaScript / author, J. D. Glaser.
By: Glaser, J. D.
Description: pages cm.ISBN: 9781482209037 (paperback).Subject(s): Application software -- Development | JavaScript (Computer program language) | Mobile communication systems -- Security measures | Mobile computing -- Security measures | PHP (Computer program language) | Portable computers -- Programming | COMPUTERS / Internet / General | COMPUTERS / Programming / Games | COMPUTERS / Software Development & Engineering / GeneralGenre/Form: Print books.DDC classification: 005.256 Summary: "Preface Amazingly, I grew up in the country and we never locked the doors to our house, or our cars. In school, no one broke into someone else's car or locker. If you put something down, you could pretty much rely on it being there when you got back. Family entered without knocking, and non-family never tried. This is no longer the case. Now, even though my house and car are locked, the virtual windows to my life, as well as a basement door I didn't even know existed, are open and under attack thanks to the internet. Now the situation is reversed. Family needs to knock several times before using the secret handshake thingy, and strangers enter anonymously and unannounced into my whatever. Security is something I wish I could do without. The business of building cool things as fast as possible without regard to consequence of theft is far more interesting. Out of necessity, security became a priority. What follows is some of what I've learned along the way. If any of these bits and bytes end up helping to protect you, then I win. I hope you enjoy the book. "--Current location | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|
On Shelf | QA76.9.A25 G535 2014 (Browse shelf) | Available | AU0000000001918 |
Browsing Alfaisal University Shelves , Shelving location: On Shelf Close shelf browser
No cover image available | ||||||||
QA76.9.A25 E325 2023 Computer security fundamentals / | QA76.9.A25 E43 2019 Understanding and applying cryptography and data security / | QA76.9 .A25 E75 2008 Hacking : the art of exploitation / | QA76.9.A25 G535 2014 Secure development for mobile apps : how to design and code secure mobile applications with PHP and JavaScript / | QA76.9.A25 G67 2020 Cyber breach response that actually works : organizational approach to managing residual risk / | QA76.9.A25 G685 2021 Ethical hacking : a hands-on introduction to breaking in / | QA76.9.A25 G75 2020 Cryptography apocalypse : preparing for the day when quantum computing breaks today's crypto / |
Includes bibliographical references and index.
"Preface Amazingly, I grew up in the country and we never locked the doors to our house, or our cars. In school, no one broke into someone else's car or locker. If you put something down, you could pretty much rely on it being there when you got back. Family entered without knocking, and non-family never tried. This is no longer the case. Now, even though my house and car are locked, the virtual windows to my life, as well as a basement door I didn't even know existed, are open and under attack thanks to the internet. Now the situation is reversed. Family needs to knock several times before using the secret handshake thingy, and strangers enter anonymously and unannounced into my whatever. Security is something I wish I could do without. The business of building cool things as fast as possible without regard to consequence of theft is far more interesting. Out of necessity, security became a priority. What follows is some of what I've learned along the way. If any of these bits and bytes end up helping to protect you, then I win. I hope you enjoy the book. "--