Provides an in-depth look at how to secure mobile users as customer facing information migrates from mainframe computers and application
servers to Web-enabled applications. Written by an industry expert, the
book explores the evolutionary changes that have occurred in data
processing and computing, personal and business communications, and
social interactions and networking on the Internet. It goes on to review all
the cybersecurity risks, threats, and vulnerabilities associated with Web enabled applications accessible via the Internet. Using examples and
exercises, the Second Edition incorporates hands-on activities to prepare
readers to secure web-enabled applications successfully.
-
Course Learning Outcomes
- » Analyze the impact of the internet and Web applications on the business world
- » Analyze the evolution of social media and social networking
- » Examines the mobile device and connectivity security
- » Compare and contrast Web-based risks
- » Analyze common website attacks, weaknesses, and security best practices
- » Describe the attributes and qualities of securing coding practices
- » Analyze the role and importance of audit and compliance with Web application security
- Analyze the role and importance of quality assurance testing for Web applications
- » Explain the value and importance of vulnerability and security assessments for web applications
- » Evaluate next-generation challenges in securing web applications and data
- » Construct a comprehensive lifecycle approach to Web application security
0.0
0 total
5
4
3
2
1