Goodreads helps you keep track of books you want to read.
Start by marking “Iron-Clad Java: Building Secure Web Applications” as Want to Read:
Iron-Clad Java: Building Secure Web Applications
Enlarge cover
Rate this book
Clear rating
Open Preview

Iron-Clad Java: Building Secure Web Applications

it was amazing 5.0  ·  Rating Details ·  6 Ratings  ·  2 Reviews
Proven Methods for Building Secure Java-Based Web Applications Develop, deploy, and maintain secure Java applications using the expert techniques and open source libraries described in this Oracle Press guide. Iron-Clad Java presents the processes required to build robust and secure applications from the start and explains how to eliminate existing security bugs. Best prac ...more
Paperback, 304 pages
Published September 9th 2014 by McGraw-Hill Education
More Details... edit details

Friend Reviews

To see what your friends thought of this book, please sign up.

Reader Q&A

To ask other readers questions about Iron-Clad Java, please sign up.

Be the first to ask a question about Iron-Clad Java

This book is not yet featured on Listopia. Add this book to your favorite list »

Community Reviews

(showing 1-30 of 45)
filter  |  sort: default (?)  |  Rating Details
Jeanne Boyarsky
Sep 28, 2014 Jeanne Boyarsky rated it it was amazing
Shelves: technology
It's taken me a while to write a review of “Iron-Clad Java: Building Secure Web Applications” because it motivated me to fix two security vulnerabilities in CodeRanch – clickjacking and brute force login. (and I didn't want to post this review until they were deployed)

The concepts were explained clearly in addition to tactics and patterns/anti-patterns. I particularly liked the emphasis on security vs usability. The explanation for the different types of XSS attacks and using encoding appropriat
...more
Mostafa Siraj
Jan 19, 2015 Mostafa Siraj rated it it was amazing
An excellent book about java security that covers the most important aspects of code security. The book also suggests multiple security libraries for security operations (not bounded by a technology provider).
Olivier
Olivier rated it it was amazing
Sep 22, 2016
Fizal
Fizal marked it as to-read
Jul 07, 2016
Adrian
Adrian added it
May 03, 2016
Vigi
Vigi rated it it was amazing
May 12, 2016
Narendra Shinde
Narendra Shinde marked it as to-read
Mar 14, 2016
Tanya Hristova
Tanya Hristova is currently reading it
Mar 13, 2016
Nick
Nick marked it as to-read
Feb 24, 2016
Caner Mirzabey
Caner Mirzabey marked it as to-read
Feb 20, 2016
Alex
Alex marked it as to-read
Jan 30, 2016
Vasilina Vlasova Kult
Vasilina Vlasova Kult is currently reading it
Aug 30, 2016
Miloš Milivojević
Miloš Milivojević marked it as to-read
Jan 26, 2016
Caroline Gordon
Caroline Gordon is currently reading it
Jan 24, 2016
Assem Mahmoud
Assem Mahmoud marked it as to-read
Jan 22, 2016
Henko Holtzhausen
Henko Holtzhausen marked it as to-read
Jan 12, 2016
Nurlan Akashayev
Nurlan Akashayev is currently reading it
Dec 27, 2015
James
James marked it as to-read
Dec 22, 2015
Sunil
Sunil marked it as to-read
Nov 24, 2015
Stelian
Stelian marked it as to-read
Nov 11, 2015
Dilip Roy
Dilip Roy marked it as to-read
Oct 22, 2015
Senya22
Senya22 is currently reading it
Jul 18, 2015
Sandra Jones
Sandra Jones marked it as to-read
Jul 15, 2015
Jens
Jens is currently reading it
Jul 07, 2015
julian
julian marked it as to-read
May 06, 2015
Joaobispo
Joaobispo marked it as to-read
Feb 19, 2015
Maroua Missaoui
Maroua Missaoui marked it as to-read
Feb 19, 2015
« previous 1 next »
There are no discussion topics on this book yet. Be the first to start one »

Goodreads is hiring!

If you like books and love to build cool products, we may be looking for you.
Learn more »

Share This Book