
Fortified Web
A comprehensive guide to web application security and protection strategies
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.
Add to Cart failed.
Please try again later
Add to Wish List failed.
Please try again later
Remove from wishlist failed.
Please try again later
Adding to library failed
Please try again
Follow podcast failed
Please try again
Unfollow podcast failed
Please try again
$0.00 for first 30 days
Access a growing selection of included Audible Originals, audiobooks, and podcasts.
You will get an email reminder before your trial ends.
Audible Plus auto-renews for $7.95/mo after 30 days. Upgrade or cancel anytime.
Buy for $4.99
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
Pay using card ending in
By confirming your purchase, you agree to Audible's Conditions of Use, License, and Amazon's Privacy Notice. Taxes where applicable.
-
Narrated by:
-
Virtual Voice

This title uses virtual voice narration
Virtual voice is computer-generated narration for audiobooks.
About this listen
Looking to understand why web applications often fall prey to cyber threats? Chapter 3 is a goldmine, with its meticulously designed sections, ranging from software interaction with cybersecurity to securing the boundaries of web applications.
Want to understand protection methods for the most vulnerable entity, user data? Chapter 4 outlines techniques for securing user data in web applications and common pitfalls in user data protection. Chapter 5's detailed account of authentication and authorization, dissecting their roles in cybersecurity, best practices, and more, augments this knowledge.
Chapter 6 delves into the crucial aspect of web application security, that is, the overlooked element of secure coding practices. Understand the vulnerabilities that can be introduced through insecure coding. Chapters 7, 8, and 9 further enhance your knowledge with anti-malware strategies, the pivotal role of firewalls, and secure session & cookies management, respectively.
From preventing cross-site scripting in Chapter 10 to ensuring Security with HTTPS in Chapter 12, the content simplifies the most complicated aspects of web safety within an engaging narrative.
Discover the risk of outdated software dependencies in Chapter 13, and the importance of regular security audits for web applications in Chapter 14. The final chapter, Chapter 15, focuses on Incident Response & Recovery, a crucial component in the realm of cybersecurity.
"Fortified Web" acts as a comprehensive guide, catering to both beginners desiring a solid foundation in cybersecurity and those eager to update their knowledge. Embark on a fascinating exploration into the world of web security with "Fortified Web." Your guide to safeguard your web applications in the unparalleled digital landscape is waiting. Happy reading!
No reviews yet