Breaking News!
60% Off the Hottest Halloween Costumes & Accessories

Advanced ASP.NET Core 3 Security

Best Price (Coupon Required):
Buy Advanced ASP.NET Core 3 Security for $45.00 at @ Link.springer.com when you apply the 10% OFF coupon at checkout.
Click “Get Coupon & Buy” to copy the code and unlock the deal.

Set a price drop alert to never miss an offer.

1 Offer Price Range: $49.99 - $49.99
BEST PRICE

Single Product Purchase

$45.00
@ Link.springer.com with extra coupon

Price Comparison

Seller Contact Seller List Price On Sale Shipping Best Promo Final Price Volume Discount Financing Availability Seller's Page
BEST PRICE
1 Product Purchase
@ Link.springer.com
$49.99 $49.99

10% OFF
This deals requires coupon
$45.00
See Site In stock Visit Store

Product Details

Brand
Springer Nature
Manufacturer
N/A
Part Number
0
GTIN
9781484260142
Condition
New
Product Description

Incorporate security best practices into ASP.NET Core. This book covers security-related features available within the framework, explains where these feature may fall short, and delves into security topics rarely covered elsewhere. Get ready to dive deep into ASP.NET Core 3.1 source code, clarifying how particular features work and addressing how to fix problems. For straightforward use cases, the ASP.NET Core framework does a good job in preventing certain types of attacks from happening. But for some types of attacks, or situations that are not straightforward, there is very little guidance available on how to safely implement solutions. And worse, there is a lot of bad advice online on how to implement functionality, be it encrypting unsafely hard-coded parameters that need to be generated at runtime, or articles which advocate for certain solutions that are vulnerable to obvious injection attacks. Even more concerning is the functions in ASP.NET Core that are not as secure as they should be by default. Advanced ASP.NET Core 3 Security is designed to train developers to avoid these problems. Unlike the vast majority of security books that are targeted to network administrators, system administrators, or managers, this book is targeted specifically to ASP.NET developers. Author Scott Norberg begins by teaching developers how ASP.NET Core works behind the scenes by going directly into the framework's source code. Then he talks about how various attacks are performed using the very tools that penetration testers would use to hack into an application. He shows developers how to prevent these attacks. Finally, he covers the concepts developers need to know to do some testing on their own, without the help of a security professional. What You Will Learn Discern which attacks are easy to prevent, and which are more challenging, in the framework Dig into ASP.NET Core 3.1 source code to understand how the security services work Establish a baseline for understanding how to design more secure software Properly apply cryptography in software development Take a deep dive into web security concepts Validate input in a way that allows legitimate traffic but blocks malicious traffic Understand parameterized queries and why they are so important to ASP.NET Core Fix issues in a well-implemented solution Know how the new logging system in ASP.NET Core falls short of security needs Incorporate security into your software development process Who This Book Is For Software developers who have experience creating websites in ASP.NET and want to know how to make their websites secure from hackers and security professionals who work with a development team that uses ASP.NET Core. A basic understanding of web technologies such as HTML, JavaScript, and CSS is assumed, as is knowledge of how to create a website, and how to read and write C#. You do not need knowledge of security concepts, even those that are often covered in ASP.NET Core documentation.

Available Colors
Available Sizes

Reviews

0
0 reviews
5 stars
4 stars
3 stars
2 stars
1 star

Questions & Answers

Similar Products

Computational Biomechanics for Medicine

Computational Biomechanics for Medicine

$169.99
The nth-Order Comprehensive Adjoint Sensitivity Analysis Methodology, Volume II

The nth-Order Comprehensive Adjoint Sensitivity Analysis Methodology, Volume II

$179.99
Rodolphe Bresdin

Rodolphe Bresdin

$39.99
Who Would Win?: Ultimate Ocean Rumble

Who Would Win?: Ultimate Ocean Rumble

$3.74
Analog-to-Digital Conversion

Analog-to-Digital Conversion

$139.00
Nonverbale Kommunikation in der Fernsehwerbung

Nonverbale Kommunikation in der Fernsehwerbung

$74.99
Surface Geochemistry in Petroleum Exploration

Surface Geochemistry in Petroleum Exploration

$249.99
Reinforcement of Rubber

Reinforcement of Rubber

$109.99
Dynamical Corporate Finance

Dynamical Corporate Finance

$109.00
Medical Image Computing and Computer-Assisted Intervention - MICCAI 2011

Medical Image Computing and Computer-Assisted Intervention - MICCAI 2011

$54.99
Scientific Knowledge Communication in Museums

Scientific Knowledge Communication in Museums

$84.99
Peer-Led Team Learning: Evaluation, Dissemination, and Institutionalization of a College Level Initi

Peer-Led Team Learning: Evaluation, Dissemination, and Institutionalization of a College Level Initi

$109.99
Dieselmotor

Dieselmotor

$19.99
Treatise on the Shift Operator

Treatise on the Shift Operator

$89.00
Fundamentals of Pap Test Cytology

Fundamentals of Pap Test Cytology

$119.99
Concrete-Polymer Composites in Circular Economy

Concrete-Polymer Composites in Circular Economy

$59.99
Festigkeit und Formnderung

Festigkeit und Formnderung

$59.99
Reachability Problems

Reachability Problems

$54.99
Effiziente Zentralisierung in den Unternehmensbereichen IT und Finanzen

Effiziente Zentralisierung in den Unternehmensbereichen IT und Finanzen

$54.99
Applications of Stem Cells and derived Exosomes in Neurodegenerative Disorders

Applications of Stem Cells and derived Exosomes in Neurodegenerative Disorders

$199.99
Das Anreien in Maschinenbau-Werksttten

Das Anreien in Maschinenbau-Werksttten

$37.99
The Economics of Self-Destructive Choices

The Economics of Self-Destructive Choices

$54.99
Mercury Toxicity Mitigation: Sustainable Nexus Approach

Mercury Toxicity Mitigation: Sustainable Nexus Approach

$199.99
Challenges in Cataract Surgery

Challenges in Cataract Surgery

$99.99
Clinical Use of Antiviral Drugs

Clinical Use of Antiviral Drugs

$219.99
Dealing with Child Abuse and Neglect as Public Health Problems

Dealing with Child Abuse and Neglect as Public Health Problems

$64.99
Alte Gesellschaft  Neue Medien

Alte Gesellschaft Neue Medien

$59.99
Handbook of Topological Fixed Point Theory

Handbook of Topological Fixed Point Theory

$169.99
The Impact of Virtual, Remote and Real Logistics Labs

The Impact of Virtual, Remote and Real Logistics Labs

$54.99
Self-Defense in International Relations

Self-Defense in International Relations

$39.99
INT - Integrierte neurokognitive Therapie bei schizophren Erkrankten

INT - Integrierte neurokognitive Therapie bei schizophren Erkrankten

$59.99
Information and Communications Security

Information and Communications Security

$39.99
Allgemeine Physiologie

Allgemeine Physiologie

$59.99
Deep Learning and Medical Applications

Deep Learning and Medical Applications

$139.00
Der Heutige Stand der Physiologie des Hhenklimas

Der Heutige Stand der Physiologie des Hhenklimas

$59.99
Travel and Tourism: Sustainability, Economics, and Management Issues

Travel and Tourism: Sustainability, Economics, and Management Issues

$249.99
Captain Underpants and the Terrifying Return of Tippy Tinkletrousers (#9)

Captain Underpants and the Terrifying Return of Tippy Tinkletrousers (#9)

$5.96
A Buddhist Approach to International Relations

A Buddhist Approach to International Relations

$59.99
Designing Sustainability for All

Designing Sustainability for All

$59.99
Low Temperature Physics II / Kltephysik II

Low Temperature Physics II / Kltephysik II

$39.99
previous
next