- Paperback: 960 pages
- Publisher: Microsoft Press; 1 edition (September 2, 2003)
- Language: English
- ISBN-10: 0735618429
- ISBN-13: 978-0735618428
- Product Dimensions: 7.3 x 2.2 x 9.1 inches
- Shipping Weight: 4.1 pounds
- Average Customer Review: 4.5 out of 5 stars See all reviews (6 customer reviews)
- Amazon Best Sellers Rank: #2,965,238 in Books (See Top 100 in Books)
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
Improving Web Application Security: Threats and Countermeasures 1st Edition
Use the Amazon App to scan ISBNs and compare prices.
About the Author
Developed by senior editors and content managers at Microsoft Corporation.
If you are a seller for this product, would you like to suggest updates through seller support?
Top Customer Reviews
Now, why the 4 stars? Two reasons - 1. The author(s) are very repetitive. I read the section on countermeasures to SQL injection attacks 3 times in the book.
2. The countermeasures are demonstrated adequately but the attacks are not. For instance, what to do to thwart SQL injection attacks is explained with some examples. But what really is a SQL injection attack; plain description is not enough? Some non-trivial examples of those make sense because then you know the reason for deploying the countermeasures; what are you saving yourself against? Sort of, identifying the enemy.
Nevertheless, a great, comprehensive and practical tutorial.
Contrary to what the title may imply, in addition to ASP.NET this book also covers how security should be addressed in the building of Serviced components, Web Services and Remoting. The chapters on Code Access Security are among the clearest that can be found anywhere.
This book takes a holistic approach to Security in that it addresses threats to the network, host and application layers. The old adage of a chain is only as strong as its weakest link is taken to heart in the book so guidance is provided on how security should be addressed across tiers and at multiple layers. Secure app development across the entire software development and deployment lifecycle is considered within the scope of this book.
In addition to Secure Coding guidelines, Extensive guidelines are provided that show how the Network, Web Server, Application Server and Database Server should be secured.
One of the things that I like about this book is that the guidance that is provided is task and role based. So even though the book is 800+ pages, it can be very easily used as a ready reference.
Multiple checklists that deal with Design, Build, Securing and Assessment are given and can be used out of the box.
In short, don't wait. Go get it now!
From the book's introduction:
Part I, "Introduction to Threats and Countermeasures," identifies and illustrates the various threats facing the network, host, and application layers. The process of threat modeling helps you to identify those threats that can harm your application. By understanding these threats, you can identify and prioritize effective countermeasures.
Part II, "Designing Secure Web Applications," gives you the guidance you require to design secure Web applications. Even if you have deployed your application, we recommend that you examine and evaluate the concepts, principles, and techniques outlined in this part.
Part III, "Building Secure Web Applications," allows you to apply the secure design practices introduced in Part II to create secure implementations. You will learn defensive coding techniques that make your code and application resilient to attack.
Part IV, "Securing Your Network, Host, and Application," describes how you will apply security configuration settings to secure these three interrelated levels. Instead of applying security randomly, you will learn the rationale behind the security recommendations.
Part V, "Assessing Your Security," provides the tools you require to evaluate the success of your security efforts. Starting with the application, you'll take an inside-out approach to evaluating your code and design. You'll follow this with an outside-in view of the security risks that challenge your network, host and application.
.NET configuration, and web application do's and don'ts.
Very helpful when I configured a server which I rented from a dedicated machine hosting service.
Only reason for four stars rather than five, it is really based around Windows 2000 server. Needs to be updated for Windows 2003 server.
Before you consider buying any other .NET security book, get this one. It's worth every penny. It also has a companion volume, entitled "Building Secure ASP.NET Applications. Authentication, Authorization, and Secure Communication". Unfortunately, this book is not half as good as "Improving Web Application Security". Shame really. The books are supposed to complement each other, but "Improving Web Application Security" really stands out head and shoulders above the other. It's a must buy if you want to understand .NET web application security and the security architecture that underpins it.
At the same, I am setting up my web servers to track and trace people in and out the servers within the oranganization -- since my applications are running inside intranet.
Great book to have if security is you main concern!