- Series: Expert's Voice in Open Source
- Paperback: 368 pages
- Publisher: Apress; 2nd ed. edition (December 10, 2010)
- Language: English
- ISBN-10: 1430233184
- ISBN-13: 978-1430233183
- Product Dimensions: 7.5 x 0.8 x 9.2 inches
- Shipping Weight: 1.7 pounds (View shipping rates and policies)
- Average Customer Review: 7 customer reviews
- Amazon Best Sellers Rank: #2,034,099 in Books (See Top 100 in Books)
To get the free app, enter your mobile phone number.
Pro PHP Security: From Application Security Principles to the Implementation of XSS Defenses (Expert's Voice in Open Source) 2nd ed. Edition
Use the Amazon App to scan ISBNs and compare prices.
The Amazon Book Review
Author interviews, book reviews, editors picks, and more. Read it now
Frequently bought together
About the Author
Chris Snyder is a software engineer at the Fund for the City of New York, where he helps develop next-generation websites and services for nonprofit organizations. He is a member of the executive board of New York PHP, and has been looking for new ways to build scriptable, linked, multimedia content since he saw his first Hypercard stack in 1988.
Top customer reviews
There was a problem filtering reviews right now. Please try again later.
- SQL injection: This book gives a great overview of what SQL injection is, how to identify vulnerabilities, how to fix them, and how to test your application
- Cross-site scripting: This was a good one for me. Much of the documentation on XSS is pretty vague. The authors did a good job of providing several detailed examples of cross-site scripting attacks, and how to defend against them.
- Validating and Sanitizing input: The authors really stress the importance of validating and sanitizing any input that comes into your application. They give examples of how to create validation libraries. However, one of my main disappointments with the book was that they failed to discuss PHP's filter_var functionality.
- Captchas: What they are and how to implement them.
- Securing RESTful services: Restricting access, authenticating and authorizing requests, and enforcing quotas and rate limits.
- How to secure UNIX
- How to secure your database
- Encryption: The authors discuss keeping your passwords safe by hashing, and how to protect other sensitive data by symmetrical or asymmetrical encryption
- SSL and SSH: Securing network connections via SSL and SSH. How to generate certificates and keys.
- Securing shared hosting
- Keeping production and development environments separate
- Keeping software up to date
These are just some of the focus areas of this book. It provides even more interesting and valuable information. While this book won't make you a security expert, it will put you well on the path of proper security-minded PHP coding.
If you bought the first edition of this book, you might be disappointment on how it was organized in the first edition; however, the second edition of this book will change your opinion forever. It is easy to follow, and the authors focus on only one specific area per chapter; as a result, it allows readers to focus on the specific security that they may either are not aware of the problems or want to get more in depth detail.
Overall, I think this book is not only good for the seasonal PHP programmers since they may only need some parts of security topics that related to their current projects but also good for the experience PHP programmer since they can use this book as reference.
I do not think this book is good for programmers who just start to learn PHP language since most of the topics in this book are for people who have worked in PHP for few years.