Summary
Hopefully the material presented in this chapter provided you with a few important tips and, more importantly, got you thinking about the many attack vectors that your application and server face. However, it’s important to understand that the topics described in this section are but a tiny sliver of the total security pie. If you’re new to the subject, take some time to learn more about some of the more prominent security-related Web sites. Regardless of your prior experience, you need to devise a strategy for staying abreast of breaking security news. Subscribing to the newsletters both from the more prevalent security-focused Web sites and from the product developers may be the best way to do so. However, your strategic preference is somewhat irrelevant; what is important is that you have a strategy and stick to it, lest your castle be conquered.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Rights and permissions
Copyright information
© 2006 W. Jason Gilmore
About this chapter
Cite this chapter
(2006). Secure PHP Programming. In: Beginning PHP and PostgreSQL 8. Apress. https://doi.org/10.1007/978-1-4302-0136-6_21
Download citation
DOI: https://doi.org/10.1007/978-1-4302-0136-6_21
Publisher Name: Apress
Print ISBN: 978-1-59059-547-3
Online ISBN: 978-1-4302-0136-6
eBook Packages: Professional and Applied ComputingProfessional and Applied Computing (R0)Apress Access Books