Vendor Profile
Shoeisha Co., Ltd.
Address | 5 Funamachi Shinjuku-ku Tokyo, JAPAN ZIP:160-0006 |
---|---|
Representative Name | Mikio Sasaki |
Annual Revenue | closed |
No. of Employees | 130 |
Web Site URL |
IT/Information Book Front
SD item code:13051403
Detail | Price & Quantity | ||
---|---|---|---|
S1 |
Masashi Hirano (Author)
Supervised by Yosuke Hasegawa
Tsugumi Goto, Supervisor
Original text before translation
平野 昌士 (著)
はせがわ ようすけ 監修
後藤 つぐみ 監修
(169470)
JAN:9784798169477
|
(169470)
JAN:9784798169477
Wholesale Price: Members Only
1 pc /set
In Stock
|
Dimensions |
---|
Format: B5 size
Number of pages: 264 |
Specifications |
---|
Country of manufacture: Japan
Material / component: Format:Book (paper)
Year of manufacture: 2023
Product tag: None
|
Description
Essential Knowledge for Web Application Robustness! The perfect book to start your security learning! This book is an introduction to security, explaining the basic knowledge for developing secure web applications for front-end engineers. Until now, security has been an area of web application development with a strong image of being a [back-end job]. However, in order to make applications more secure, front-end engineers are also required to have basic knowledge of security and to practice specific countermeasures. In this book, you will learn basic topics such as [HTTP][origin], which are essential knowledge for web security, and the mechanisms of cyber attacks targeting the front-end such as [XSS][CSRF], through hands-on activities using sample applications as a stage. Of course, the course will also cover defensive techniques to protect users from attacks. In addition to countermeasures for each attack method, the course also covers practical vulnerability countermeasures useful in the development field, such as [implementation of authentication functions] and [secure use of JavaScript libraries], so you will find many hints for improving security that you can incorporate in your own development. *Table of Contents Chapter 1: Overview of Web Security Chapter 2: Hands-on Preparation for This Book Chapter 3 HTTP Chapter 4 Restricting Access Between Web Applications by Origin Chapter 5 XSS Chapter 6 Other Passive Attacks (CSRF, Clickjacking, Open Redirection) Chapter 7 Authentication*Authorization Chapter 8: Security Risks Targeting Libraries Appendix Study of topics not covered in this volume [Author] *Masashi Hirano Front-end engineer, Cybozu, Inc. He is a member of JSConf JP staff, organizes communities such as Kansai Node Gakuen, and is involved in OSS activities. He has written many articles for blogs and magazines, and given many lectures at events. [Supervisor] *Yosuke Hasegawa CTO, Secure Sky* Technology, Inc. He has discovered numerous vulnerabilities in Internet Explorer, Mozilla Firefox, and other web applications. He has given numerous lectures at Black Hat Japan 2008, Korea POC 2008, 2010, OWASP AppSec APAC 2014, CODE BLUE 2016, and others. *Tsugumi Goto Security Engineer, SecureSky*Technology, Inc. While engaged in vulnerability assessment work, he leads the creation and review of work manuals for the company's vulnerability assessors. |
More
Shipping Method | Estimated Arrival |
---|---|
Sea Mail | From Mar.6th to May.8th |
Air Mail | From Feb.18th to Feb.20th |
EMS | From Feb.17th to Feb.20th |
Pantos Express | From Feb.19th to Feb.24th |
DHL | From Feb.17th to Feb.19th |
UPS | From Feb.17th to Feb.19th |
FedEx | From Feb.17th to Feb.19th |
Some trading conditions may be applicable only in Japan.
This product (book) is subject to the Resale Price Maintenance Program. The law allows the manufacturer (publisher) to specify the sales price. We ask that your company also adhere to the resale price specified by us. In the unlikely event that you fail to do so, we may terminate the transaction. Thank you very much for your understanding and cooperation.
|
Other items from this category:
The perfect book to start your security learning!
This book is an introduction to security, explaining the basic knowledge for developing secure web applications for front-end engineers.
Until now, security has been an area of web application development with a strong image of being a [back-end job]. However, in order to make applications more secure, front-end engineers are also required to have basic knowledge of security and to practice specific countermeasures.
In this book, you will learn basic topics such as [HTTP][origin], which are essential knowledge for web security, and the mechanisms of cyber attacks targeting the front-end such as [XSS][CSRF], through hands-on activities using sample applications as a stage.
Of course, the course will also cover defensive techniques to protect users from attacks. In addition to countermeasures for each attack method, the course also covers practical vulnerability countermeasures useful in the development field, such as [implementation of authentication functions] and [secure use of JavaScript libraries], so you will find many hints for improving security that you can incorporate in your own development.
*Table of Contents
Chapter 1: Overview of Web Security
Chapter 2: Hands-on Preparation for This Book
Chapter 3 HTTP
Chapter 4 Restricting Access Between Web Applications by Origin
Chapter 5 XSS
Chapter 6 Other Passive Attacks (CSRF, Clickjacking, Open Redirection)
Chapter 7 Authentication*Authorization
Chapter 8: Security Risks Targeting Libraries
Appendix Study of topics not covered in this volume
[Author]
*Masashi Hirano
Front-end engineer, Cybozu, Inc.
He is a member of JSConf JP staff, organizes communities such as Kansai Node Gakuen, and is involved in OSS activities. He has written many articles for blogs and magazines, and given many lectures at events.
[Supervisor]
*Yosuke Hasegawa
CTO, Secure Sky* Technology, Inc.
He has discovered numerous vulnerabilities in Internet Explorer, Mozilla Firefox, and other web applications. He has given numerous lectures at Black Hat Japan 2008, Korea POC 2008, 2010, OWASP AppSec APAC 2014, CODE BLUE 2016, and others.
*Tsugumi Goto
Security Engineer, SecureSky*Technology, Inc.
While engaged in vulnerability assessment work, he leads the creation and review of work manuals for the company's vulnerability assessors.