Building web apps that respect a user's privacy and security:
A recent survey from the Pew Research Center found that few Americans are confident about the security or privacy of their data--particularly when it comes to the use of online tools. As a web developer, you represent the first line of defense in protecting your user's data and privacy. This re...
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Sebastopol, CA
O'Reilly Media
[2017]
|
Ausgabe: | First edition. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781492042921/?ar |
Zusammenfassung: | A recent survey from the Pew Research Center found that few Americans are confident about the security or privacy of their data--particularly when it comes to the use of online tools. As a web developer, you represent the first line of defense in protecting your user's data and privacy. This report explores several techniques, tools, and best practices for developing and maintaining web apps that provide the privacy and security that every user needs--and deserves. Each individual now produces more data every day than people in earlier generations did throughout their lifetimes. Every time we click, tweet, or visit a site, we leave a digital trace. As web developers, we're responsible for shaping the experiences of users' online lives. By making ethical, user-centered choices, we can create a better Web for everyone. Learn how web tracking works, and how you can provide users with greater privacy controls Explore HTTPS and learn how to use this protocol to encrypt user connections Use web development frameworks that provide baked-in security support for protecting user data Learn methods for securing user authentication, and for sanitizing and validating user input Provide exports that allow users to reclaim their data if and when you close your service This is the third report in the Ethical Web Development series from author Adam Scott. Previous reports in this series include Building Web Apps for Everyone and Building Web Apps That Work Everywhere . |
Beschreibung: | Includes bibliographical references. - Description based on online resource; title from title page (Safari, viewed June 12, 2018) |
Umfang: | 1 Online-Ressource (1 volume) illustrations |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047629614 | ||
003 | DE-627-1 | ||
005 | 20240228120517.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2017 xx |||||o 00| ||eng c | ||
035 | |a (DE-627-1)047629614 | ||
035 | |a (DE-599)KEP047629614 | ||
035 | |a (ORHE)9781492042921 | ||
035 | |a (DE-627-1)047629614 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
100 | 1 | |a Scott, Adam D. |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Building web apps that respect a user's privacy and security |c Adam D. Scott |
250 | |a First edition. | ||
264 | 1 | |a Sebastopol, CA |b O'Reilly Media |c [2017] | |
264 | 4 | |c ©2017 | |
300 | |a 1 Online-Ressource (1 volume) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references. - Description based on online resource; title from title page (Safari, viewed June 12, 2018) | ||
520 | |a A recent survey from the Pew Research Center found that few Americans are confident about the security or privacy of their data--particularly when it comes to the use of online tools. As a web developer, you represent the first line of defense in protecting your user's data and privacy. This report explores several techniques, tools, and best practices for developing and maintaining web apps that provide the privacy and security that every user needs--and deserves. Each individual now produces more data every day than people in earlier generations did throughout their lifetimes. Every time we click, tweet, or visit a site, we leave a digital trace. As web developers, we're responsible for shaping the experiences of users' online lives. By making ethical, user-centered choices, we can create a better Web for everyone. Learn how web tracking works, and how you can provide users with greater privacy controls Explore HTTPS and learn how to use this protocol to encrypt user connections Use web development frameworks that provide baked-in security support for protecting user data Learn methods for securing user authentication, and for sanitizing and validating user input Provide exports that allow users to reclaim their data if and when you close your service This is the third report in the Ethical Web Development series from author Adam Scott. Previous reports in this series include Building Web Apps for Everyone and Building Web Apps That Work Everywhere . | ||
650 | 0 | |a Web applications | |
650 | 0 | |a Application software |x Development | |
650 | 0 | |a Web sites |x Access control | |
650 | 0 | |a Privacy, Right of | |
650 | 4 | |a Applications Web | |
650 | 4 | |a Logiciels d'application ; Développement | |
650 | 4 | |a Sites Web ; Accès ; Contrôle | |
650 | 4 | |a Application software ; Development | |
650 | 4 | |a Privacy, Right of | |
650 | 4 | |a Web applications | |
650 | 4 | |a Web sites ; Access control | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781492042921/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047629614 |
---|---|
_version_ | 1821494870858006528 |
adam_text | |
any_adam_object | |
author | Scott, Adam D. |
author_facet | Scott, Adam D. |
author_role | aut |
author_sort | Scott, Adam D. |
author_variant | a d s ad ads |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047629614 (DE-599)KEP047629614 (ORHE)9781492042921 |
edition | First edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03113cam a22004692 4500</leader><controlfield tag="001">ZDB-30-ORH-047629614</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120517.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2017 xx |||||o 00| ||eng c</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047629614</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047629614</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781492042921</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047629614</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Scott, Adam D.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Building web apps that respect a user's privacy and security</subfield><subfield code="c">Adam D. Scott</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Sebastopol, CA</subfield><subfield code="b">O'Reilly Media</subfield><subfield code="c">[2017]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2017</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 volume)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references. - Description based on online resource; title from title page (Safari, viewed June 12, 2018)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">A recent survey from the Pew Research Center found that few Americans are confident about the security or privacy of their data--particularly when it comes to the use of online tools. As a web developer, you represent the first line of defense in protecting your user's data and privacy. This report explores several techniques, tools, and best practices for developing and maintaining web apps that provide the privacy and security that every user needs--and deserves. Each individual now produces more data every day than people in earlier generations did throughout their lifetimes. Every time we click, tweet, or visit a site, we leave a digital trace. As web developers, we're responsible for shaping the experiences of users' online lives. By making ethical, user-centered choices, we can create a better Web for everyone. Learn how web tracking works, and how you can provide users with greater privacy controls Explore HTTPS and learn how to use this protocol to encrypt user connections Use web development frameworks that provide baked-in security support for protecting user data Learn methods for securing user authentication, and for sanitizing and validating user input Provide exports that allow users to reclaim their data if and when you close your service This is the third report in the Ethical Web Development series from author Adam Scott. Previous reports in this series include Building Web Apps for Everyone and Building Web Apps That Work Everywhere .</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Web applications</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Application software</subfield><subfield code="x">Development</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Web sites</subfield><subfield code="x">Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Privacy, Right of</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Applications Web</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Logiciels d'application ; Développement</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sites Web ; Accès ; Contrôle</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Application software ; Development</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Privacy, Right of</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Web applications</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Web sites ; Access control</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781492042921/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047629614 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:21:15Z |
institution | BVB |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 volume) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | O'Reilly Media |
record_format | marc |
spelling | Scott, Adam D. VerfasserIn aut Building web apps that respect a user's privacy and security Adam D. Scott First edition. Sebastopol, CA O'Reilly Media [2017] ©2017 1 Online-Ressource (1 volume) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references. - Description based on online resource; title from title page (Safari, viewed June 12, 2018) A recent survey from the Pew Research Center found that few Americans are confident about the security or privacy of their data--particularly when it comes to the use of online tools. As a web developer, you represent the first line of defense in protecting your user's data and privacy. This report explores several techniques, tools, and best practices for developing and maintaining web apps that provide the privacy and security that every user needs--and deserves. Each individual now produces more data every day than people in earlier generations did throughout their lifetimes. Every time we click, tweet, or visit a site, we leave a digital trace. As web developers, we're responsible for shaping the experiences of users' online lives. By making ethical, user-centered choices, we can create a better Web for everyone. Learn how web tracking works, and how you can provide users with greater privacy controls Explore HTTPS and learn how to use this protocol to encrypt user connections Use web development frameworks that provide baked-in security support for protecting user data Learn methods for securing user authentication, and for sanitizing and validating user input Provide exports that allow users to reclaim their data if and when you close your service This is the third report in the Ethical Web Development series from author Adam Scott. Previous reports in this series include Building Web Apps for Everyone and Building Web Apps That Work Everywhere . Web applications Application software Development Web sites Access control Privacy, Right of Applications Web Logiciels d'application ; Développement Sites Web ; Accès ; Contrôle Application software ; Development Web sites ; Access control |
spellingShingle | Scott, Adam D. Building web apps that respect a user's privacy and security Web applications Application software Development Web sites Access control Privacy, Right of Applications Web Logiciels d'application ; Développement Sites Web ; Accès ; Contrôle Application software ; Development Web sites ; Access control |
title | Building web apps that respect a user's privacy and security |
title_auth | Building web apps that respect a user's privacy and security |
title_exact_search | Building web apps that respect a user's privacy and security |
title_full | Building web apps that respect a user's privacy and security Adam D. Scott |
title_fullStr | Building web apps that respect a user's privacy and security Adam D. Scott |
title_full_unstemmed | Building web apps that respect a user's privacy and security Adam D. Scott |
title_short | Building web apps that respect a user's privacy and security |
title_sort | building web apps that respect a user s privacy and security |
topic | Web applications Application software Development Web sites Access control Privacy, Right of Applications Web Logiciels d'application ; Développement Sites Web ; Accès ; Contrôle Application software ; Development Web sites ; Access control |
topic_facet | Web applications Application software Development Web sites Access control Privacy, Right of Applications Web Logiciels d'application ; Développement Sites Web ; Accès ; Contrôle Application software ; Development Web sites ; Access control |
work_keys_str_mv | AT scottadamd buildingwebappsthatrespectausersprivacyandsecurity |